RCP Tech Library

See our Free Webcasts.

Free Guides from rcpmag.com’s editors

Free White Papers from our Sponsors

  • Partner Profile - How eSentire MDR Expands Microsoft 365's Security Capabilities

    Partners focused on Office 365 E5 subscription sales can pack a lot more value into the Microsoft bundle's already impressive security feature set through new Managed Detection and Response (MDR) Services from eSentire.

  • 2021 Webroot BrightCloud Threat Report

    In this report, we’ll break down a broad range of threat activity, offer insights into the trends we’ve observed, discuss wide-reaching impacts across industries, geographies, companies and people, and reveal what our threat experts expect to see in the coming year.

  • eBook: Hacker Personas

    Staying informed on today’s ever-changing cybersecurity landscape is vital for mitigating threats and keeping businesses safe. This educational eBook, the sequel to the popular “Why Hacker’s Hack” series, explores cybercriminal personas and who is most likely to fall prey to these scam artists. Learn why it’s important to get informed on their methods, motives and strategies of choice.

  • Carbonite Data Protection & Cyber Resilience

    Data protection is a balancing act between the need to protect data and the need to protect access to data. The trick lies with deploying the right protection across the different systems and types of data.

  • The Hidden Costs of Ransomware

    The true cost of ransomware infections includes more than just the ransomware payment. Even with security measures in place, defensive layers must be implemented to reduce the threat surface area. We spoke with business leaders and IT professionals to find out how their organizations were affected by ransomware, beyond losing access to their data and paying a ransom.

  • Lockdown Lessons eBook

    They say the best defense is a good offense, but in cybersecurity we often say the best defense is prevention. Yet, as cybercriminals continue to innovate and refine their methods, the truth is complete prevention of attacks may never be fully possible.

  • The Definitive Guide to Sales

    Owners of early stage MSPs often wait too long before hiring a sales team, resulting in stalled growth or a stressed-to-the-limit CEO. To get serious about growth, MSPs have to become laser-focused on improving their sales and building a performance sales team.

  • The Definitive Guide to IT Security

    In this definitive guide, Liongard contributors Art Chavez (Information and Application Security Architect) and Vincent Tran (CISSP, Founder and COO) will take you through the various ways your MSP can protect itself and your customers, including:

  • 8 Essential Features You Need in Your Next Healthcare Collaboration Solution

    In healthcare operations, every meeting has the potential to impact the well-being of patients, making the right collaboration solution essential. This ebook describes the eight crucial features your next collaboration tool must have.

  • 8 Essential Features to Look for in Your Next Classroom Collaboration Solution

    Digital technology has completely revolutionized the learning experience. A critical element of digital learning is unified communications and collaboration (UCC) solution. This ebook lays out the eight crucial features a classroom UCC platform must have.

  • 8 Essential Features to Look for in Your Next Business Collaboration Solution

    A company that can improve collaboration between employees, clients, and leaders will have a natural advantage over more siloed competitors. This ebook describes eight features that should be a part of your next collaboration solution.

  • How Secure is Your Cloud Data?

    While the public health crisis will eventually fade, flexible remote work arrangements are likely here to stay. Remote workers may continue to be as productive as before, or better, but only if their cloud data and applications are safe from the common causes of data loss.

  • COVID-19 Clicks - How Phishing Capitalized on a Global Crises Infographic

    We surveyed 7,000 office workers in the US, UK, Australia/New Zealand, Germany, France, Italy and Japan on their understanding of phishing, their email and click habits, and how their online lives have changed since the beginning of the COVID-19 pandemic. Here’s an overview of the findings from around the globe.

  • The Radicati Group - Endpoint Security - Market Quadrant 2020

    An Analysis of the Market for Endpoint Security Revealing Top Players, Trail Blazers, Specialists and Mature Players.

  • Hacker Personas - The Infiltrator

    The hacker persona known as “The Infiltrator” slips through cracks you may not know about. We often leave back doors open for cyberthieves to walk through and take what they want. This type of hacker, who exploits our systems’ hidden cracks, is known as “The Infiltrator,” and his favorite exploit is the DDoS attack. One way to secure the back door is though DNS over HTTPS, or DoH.

  • Hacker Personas - The Opportunist

    This type of hacker, who uses charitable causes and hardships to disguise criminal activity, is known as “The Opportunist.” The more you know about them, the better prepared you’ll be to spot their tricks and protect your business.

  • Hacker Personas - The Impersonator

    Cybercriminals are using more sophisticated attacks that trick targets into thinking fraudulent emails are from legitimate personal or business contacts. This type of hacker persona is known as “The Impersonator,” and he has a few highly manipulative tricks up his sleeve like: business email compromise (BEC), domain and website spoofing, and deep fakes and AI-driven attacks. Want to learn more about the tricks impersonators use to steal data from unsuspecting targets?