MSP Corner

Cisco Secure Firewall vs. Palo Alto NGFW: What’s the Real Difference?

When it comes to network security, two names always come up in conversation: Cisco and Palo Alto Networks. Both are heavy hitters in the cybersecurity world, and if you’re trying to decide between the Cisco Secure Firewall and Palo Alto’s Next-Generation Firewall (NGFW), you’re definitely not alone. Let’s break it down in plain English—no jargon[…] Read

Published by Jordi Vilanova, Cloudtango

Microsoft Teams vs VoIP

Your clients have likely used the same VoIP provider for years. It’s familiar. It works. So why change it? Because “good enough” isn’t enough anymore. With today’s distributed teams, growing security threats, and demand for unified tools, traditional VoIP systems are showing their age. In fact, Gartner predicts that by 2026, 75% of business voice[…] Read

Published by John Saund, 360 Visibility

Windows Server 2019 EOL: What You Need to Know

On January 9, 2024, Windows Server 2019 officially ended mainstream support. While Microsoft will continue to provide security updates until January 9, 2029, the operating system isn’t receiving new features or bug fixes. What does that mean for you? Is it time to upgrade, or can you stick with Server 2019 while you focus on[…] Read

Published by Garrett Wiesenberg, Corsica Technologies

AI Strategy: 7 Real-World Examples That Drive Business Value

Your AI journey starts here. Artificial intelligence is transforming how businesses operate, compete, and grow. Whether you’re just beginning to explore AI’s potential or looking to refine your existing approach, developing a comprehensive AI strategy is essential for success in today’s digital landscape. What could AI look like for your business? Where can you leverage AI for[…] Read

Published by Brian Harmison, Corsica Technologies

Selecting the Right Microsoft Identity Management Solution

The digital landscape is continuously evolving, prompting organisations to prioritise secure and efficient identity management systems. The rapid evolution, and occasional rebranding, of Microsoft’s Identity-as-a-Service (IDaaS) offerings can leave developers and architects  a little confused. This article covers a few of the options of Microsoft Identity Management Solutions. What is IDaaS? Identity-as-a-service (IDaaS) refers to cloud-based solutions[…] Read

Published by Peter Luetchford, Transparity

IT Standardization: The Key to Cutting Costs and Boosting Security

As an IT decision-maker, you understand the challenges of managing a complex technology environment. For example, when every department in your organization uses different hardware, software, and security protocols, IT becomes difficult to manage, troubleshoot, and scale. That’s why standardizing your IT stack is one of the smartest decisions you can make– a decision that[…] Read

Published by Andrea Grainger, Proper Sky

How AI Is Changing the Modern SOC Forever

A recent article in The Hacker News discussed the emergence of SOC 3.0—the latest iteration of the modern SOC (Security Operations Center). The SOC of the future will use sophisticated AI tools to detect and respond to threats at scale. Whether you use SOC as a service or run your own SOC internally, it’s essential to understand these[…] Read

Published by Ross Filipek, Corsica Technologies

From Stored XSS to Account Takeover: How Vulnerabilities Combine into Major Risks

Recently, during a web application penetration test, we uncovered a situation where a combination of seemingly small vulnerabilities led to a major security breach. We found a stored Cross-Site Scripting (XSS) flaw in the comments section of a support ticketing system. This, paired with weak session security, allowed us to hijack a user’s account. While[…] Read

Published by Maxwell Adams, Cybaverse

Why SMEs are Replacing Legacy Phone Systems with Microsoft Teams Phone

Landlines and traditional PBX systems are going extinct and for good reason. Today’s businesses need more than just voice calling. They need a unified, secure, and cloud-native platform that scales with hybrid work and doesn’t drain IT resources. That’s exactly why Managed Service Providers (MSPs) are increasingly recommending Microsoft Teams Phone System to their small[…] Read

Published by John Saund, 360 Visibility

Penetration Testing Services 101

Penetration Testing Services 101 Are you easy to hack? That’s the big question. Yet many organizations don’t even know where their weaknesses lie. Penetration testing (AKA pen testing) solves this problem. This is a service provided by a company that specializes in cybersecurity and ethical hacking. The goal of the exercise is simple: Try to breach a[…] Read

Published by Breanna Brown, Corsica Technologies