MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

The-Ultimate-Guide-to-Success-in-Managed-IT-Services


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

The Steep Cost of Poor IT Security [CHART]

Posted by Lily Teplow on June 22, 2018

The-Steep-Cost-of-Poor-IT-Security

Did you know that the average total cost of a successful cyber attack is over $5 million? Yup, you read that right—actually, $5,010,600 to be exact. Cyber security is not only getting more difficult for businesses to manage, it’s getting much more expensive. This is especially true when it comes to your small- and medium-sized business (SMB) clientele. Most SMBs lack the tools and talent needed to protect themselves from the evolving cyber landscape, making them easy targets and more likely to fall victim to an attack with disastrous financial consequences.

But what exactly is factored into the number above that makes it so high? In the chart below, we’ve gathered data from a Ponemon Institute report to outline the various costs associated with a successful cyber attack and what SMBs could be risking. Use this chart—in conjunction with the provided talking points—in your next sales meeting with clients or prospects to demonstrate just how vital it is to invest in your IT security solution.

Read More

Topics: Cybersecurity and Threat Management, MSP Sales Chart

Webroot’s 2018 Cyber Security Threat Report: 5 Findings to Keep with You in the Year Ahead

Posted by George Anderson on June 21, 2018

Webroot’s 2018 Cyber Security Threat Report: 5 Findings to Keep with You in the Year Ahead

Each year, a team of Webroot analysts and threat researchers take a look back at some of the most salient cyber threat trends to emerge over the previous year. With more than 40 million licensed endpoints and a threat intelligence platform capable of integrating information from billions of URLs, domains, IP addresses, files, and mobile apps, Webroot has the capacity to dive deep into the real-world threat landscape.

Here are five clear trends we saw emerge over the course of 2017.

Read More

Topics: Information Security, Cybersecurity and Threat Management

Selling Managed IT Services to the Modern Buyer

Posted by Nate Freedman on June 20, 2018

Selling Managed IT Services to the Modern Buyer

As an inbound marketing professional with my finger on the pulse of B2B revenue generation, there's one thing that I can say with certainty: if you wake up in the morning feeling like the process of marketing and selling managed services is a little bit different than it was yesterday, not to mention a year or even five years ago, it's not your imagination.

You're actually onto something pretty important that is definitely worth discussing: the modern MSP buyer has changed, probably in more ways than you realize. It’s now up to you, the MSP, to change with your buyers, or you're only going to find yourself left behind.

Read More

Topics: Sales and Marketing, Inbound Marketing

Transforming Managed Security: How to Offer Proactive, Detective and Responsive Security

Posted by Meaghan Moraes on June 19, 2018

Transforming-Managed-Security--How-to-Offer-Proactive,-Detective-and-Responsive-Security

Today, one in three security professionals lack the intelligence required to effectively detect and respond to cyber threats, according to a survey from Anomali. Where does this leave businesses, especially small-to-medium-sized businesses (SMBs) that are now the prime targets of cyber attacks? The reality is dire. In fact, 60 percent of SMBs go out of business within six months of a breach.

With advanced threats like hyper-targeted malware and ransomware, foundational security tools aren’t enough to keep SMB clients secure. Small businesses generally assume they are already protected from phishing, ransomware and insider threats, having historically secured their data firewalls, antivirus applications, or two-factor authentication. Those foundational security tools and policies are still required—but due to the modern threat landscape, additional layers of security need to be added into the equation to provide more complete and holistic protection.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services, Continuum Security

Painting a Picture for Better IT Security

Posted by Brian Downey on June 18, 2018

Painting a Picture for Better IT Security

For many of those brought up in a certain time, you will remember a painter on TV named Bob Ross. Bob Ross went viral before the internet and social media made going viral a thing. His soothing voice, well-maintained hairstyle and ability to casually add “little trees” to a canvas that would somehow come out at the end of his half hour show as a true work of art—it was mesmerizing. When I watched, I was always impressed by how he used all the tools he had at his disposal, whether it be brushes or sponges, to get the desired effect.

Now when it comes to painting, I’m no Bob Ross—in fact even finger-painting pushes my artistic limits. Because of this, I never had an appreciation for the tools of the trade. I never fully appreciated the need for the dozens of different brushes or sponges that Bob Ross was using, but I appreciated the result he was able to deliver with them.

While interesting, Bob Ross doesn’t seem to have much to do with cyber securitybut the two are actually more similar than you might expect.

Read More

Topics: Managed Security Services, Continuum Security

Enhancing Your Cyber Security Offering With Continuum Security

Posted by Brian Downey on June 15, 2018

Enhance-Your-Security-Offering-with-Continuum-Security

IT service providers are doing business in a world where they’re struggling to protect their clients who are constantly under fire from cyber threats. The nature and sophistication of today’s attacks are forcing MSPs to deliver security in a completely different way than they’ve approached RMM and BDR. Simply put: without the right protection and preventative measures in place, clients won’t stand a chance in the ever-changing threat landscape.

To combat this challenge, Continuum made an exciting announcement yesterday—we’ve acquired CARVIR to expand our security portfolio, enabling MSPs to offer enhanced security to clients. Today, I’d like to take a deeper dive into the three core products that make up the Continuum Security portfolio.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services, Continuum Security

Continuum Acquires Managed Security Leader CARVIR, Bringing New Security Products to All MSPs

Posted by Brian Downey on June 14, 2018

Introducing Continuum Security

Security is the single greatest threat to businesses today, yet the greatest opportunity for IT service providers. Therefore, we are excited to announce the expansion of Continuum Security, the advanced cyber security solution MSPs need to deliver the protections their clients demand, through the acquisition of CARVIR, a leader in monitored and managed security for the IT channel.

With this acquisition, we are able to expand our security portfolio and bring new capabilities to market, helping you meet the mounting security and compliance needs of your SMB clients. Keep reading to learn more about the acquisition and which exciting new features are available to you today.

Read More

Topics: Industry News, Managed Security Services, Continuum Security

BIG Announcement Tomorrow at 12:00pm EST

Posted by Lily Teplow on June 13, 2018

Something Big is Coming

 

Continuum will be making a BIG announcement on June 14, 2018 at 12:00pm EST. Mark your calendars, you’re going to want to hear this.

Read More

Topics: Industry News

10 Discovery Questions MSPs Should Be Asking Prospects and Clients

Posted by Lily Teplow on June 12, 2018

10 Discovery Questions MSPs Should Be Asking Prospects and Clients

To increase your chances of closing a deal, you need to understand the customer and their specific needs. Why might they be seeking help from a managed services provider? What problems are they trying to solve? What challenges are they facing? How can your IT services help overcome these challenges?

While no prospect wants to be ambushed with non-stop questions, well-crafted inquiries can make all the difference when it comes to winning new business. If you have prospects or clients willing to engage in a dialogue with you, use these key questions to gain a better understanding of their needs and accurately prescribe your services.

Read More

Topics: Sales and Marketing, Managed Security Services

How to Add New Products and Services to Your Website: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on June 11, 2018

WB_106

As an MSP, it’s exciting to expand your portfolio, improve your service delivery and bring new products to your customersbut if you aren't effectively marketing those new offerings, you might struggle to get the traction and adoption you’re looking for. In this episode of The Weekly Byte, we explore how you can leverage your website as a powerful marketing tool when adding new products or services to your portfolio!

Read More

Topics: Sales and Marketing, Website Optimization and Design, The Weekly Byte

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus