Latest Managed IT, Cybersecurity, Cloud + DevOps News

    Firefox 83 introduces HTTPS-Only Mode

    Firefox 83 introduces HTTPS-Only Mode

    By Christoph Kerschbaumer, Julian Gaibler, Arthur Edelstein and Thyla van der Merwe | November 17, 2020 | Mozilla

    CONTINUE READING

    BCS365 Named to 2019 MSP 501 List of Top Managed Services Providers

    Managed Services Providers

    Rockland , MA July 16, 2019 – BCS365™ announced today that it has again been named to the Channel Futures MSP 501 List (“MSP 501”). BCS earned the No. 144 spot on the 2019 list of the 501 top Managed IT Service Providers (“MSPs”) worldwide.

    CONTINUE READING

    BCS365 Recognized as Cisco Collaboration SaaS Authorization Partner

    Authorization Partner

    Rockland , MA – BCS365™ announced today that Cisco has certified that it has earned the designation of Collaboration SaaS Authorization Partner. BCS365 has met all of the rigorous program requirements and criteria for Cisco certified personnel levels required of a Collaboration SaaS Authorization Partner.

    CONTINUE READING

    BCS365 Named to Inc. 5000 List of the Fastest Growing Private Companies for Second Consecutive Year

    Second Consecutive Year

    BCS365 announced today that for the second consecutive year it has been named to Inc. Magazine’s list of the 5000 fastest growing private companies.

    CONTINUE READING

    5G Industry: Providing Reliable MSP Support During Rapid Growth

    CaseStudy 5GNetwork

    Challenge Headquartered in San Diego, this founder of 5G silicon chip technology, was under contract with an MSP who was not fulfilling their IT support needs. The provider was not consultative, did not adhere to ITAR compliance practices and was overcharging for their services. The company needed to find a reliable MSP partner who could fulfill their IT support needs 24/7 while also meeting their growth needs as they rapidly expanded.

    CONTINUE READING

    True Raw Null Explained: From Code to Security Risk

    A Women Lab Technician Testing Something In Lab

    Attackers often exploit the gaps developers didn't consider. An unexpected null value in an authentication function can be a golden ticket, allowing them to bypass security controls. This was the case with a critical bug in NextAuth.js, where a function returned null instead of a user token. This kind of flaw, a true raw null state that the system wasn't designed to handle, is a major red flag. It demonstrates why proactive threat detection is so essential. You need to monitor for anomalous behavior, not just known threats, to catch the subtle issues that can compromise your entire security posture.

    CONTINUE READING