Network security is of prime importance in today's world, hence network scanning, or rather network vulnerability scanning, has a crucial role to play as regards the overall security of any enterprise and the data that it handles.

Here's a look at the top 10 useful network vulnerability scanning tools available today:

Long-time SMB Nation tribal members will likely recall our love affair with the Intel “Network Unit of Computing” (NUC) during our 2014 WW Office 365 “Get Modern” tour. This palm-sized PC was one of my favs. So you might imagine my joy when I landed next to Myron Mason from ASI (distributor) at the recent 

This is a case of teaching an old dog (backups) a new trick or two. Granted the backup conversation is a well-travelled road. Sticking with the dog analogy, when studying a range of backup reports, I felt like I was chasing my tail. Then I took a closer look at

I’ve had some very interesting conversations about email and protecting your identity and infrastructure. A little context is in order. First – one man’s quick view of infrastructure security history – not necessarily in order:

As a wrap up to the SolarWinds MSP EmpowerMSP 2018 event, I interview newly arrived SolarWinds MSP executive Marco Muto. Muto was "acquired" when his firm, Trusted Metrics, was purchased in early July 2018. He offers a fresh view into his role and his roadmap.

In this Harry Brelsford’s “HOW TO” contribution, the case for use automation to drive efficiency in your technology consulting and managed services provider practice is asserted. You will learn about the following approaches:

I'm on an email theme right now as it's both an essential tool and a popular IT attack vector. This blog is to highlight a cool tool to provide email address protection. And it's been brought to market by well-known player David Hughes. Peeps will remember Hughes from Boston-based Reflexion that was acquired by Sophos.

The most recent Tech Tuesday covers an increasingly tranding topic: phising! We discuss definitions that include the tighter band of spear phising. And as always, we have a bit of fun with "gone fishing" jokes. Seriously - a few examples are shown as well as some great analysis from Redmond Magazine. Finally, we suggest a couple

Migration watch: Windows 10 in August continued to gain ground in user share and should supplant Windows 7 as the most popular version of Windows in October.

By Gregg Keizer

windows 10 100714105 large

Windows 10 last month recorded its strongest growth since January, accelerating the timeline when the newer operating system will overtake the venerable Windows 7.

Welcome back from summer everyone! It’s time to focus on work. And it’s time to focus on the future by attending select technology conferences. Participating in a conference is essential to your professional development and much more.

In today's Tech Tuesday segment on Northwest Digital News here, Kevin and Kylie discuss five conferences you should consider this Fall before the turkey gets the hot foot.

Connect your things, solve problems, make money. Learn how you can deliver recurring, continuous value with these six IoT business models.

6 number six



According to the McKinsey Global Institute, IoT will have a total potential impact of up to $11.1 trillion a year by 2025. With so much opportunity, it makes sense why so many companies are looking to connect their devices and enter the IoT arena.

Leading SMB MSP thought leader shares his deep insights into the recently completed CompTIA ChannelCon 2018 conference. Palachuk is seen frequently at leading industry conferences as a speaker and community leader. In my humble opinion, what makes this part of the GeekSpeak is that Karl does a call out to Internet of Things (IoT).