MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

The-Ultimate-Guide-to-Success-in-Managed-IT-Services

Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

FBI Issues Cyber Attack Warning to US Businesses

Posted by Brian Downey on May 25, 2018

FBI-Issues-Cyber-Attack-Warning-to-US-Businesses

On Friday, the FBI issued a formal warning about a cyber attack that has the potential to compromise hundreds of thousands of home and small office routers worldwide.

As an MSP servicing small- and medium-sized businesses, your clients could be affected. This post will cover what MSPs need to know about this cyber attack warning, as well as how you should handle the issue with your clients.

Read More

Topics: Industry News, Cybersecurity and Threat Management

Watch Out for This Royal Wedding Scam

Posted by Lily Teplow on May 25, 2018

Watch Out for This Royal Wedding Scam

Ever since Prince Harry and Meghan Markle tied the knot last Saturday, my news feed has been flooded with Royal Wedding coverage, updates, opinion articles and quizzes. In fact, one of the quizzes I came across the other day was titled, “What’s Your Royal Guest Name?”

Seemingly innocent, this quiz provides you with “your new royal identity,” and has since swept the Internet. But, what makes this quiz so cleverly dangerous is that unbeknownst to those who are participating, their answers could help scammers get their hands on some sensitive data.

While it’s likely that you and your clients may not be taking quizzes like these (or maybe you are, I don’t judge), it’s yet another example of the power of social engineering and how easily people can be duped into divulging personal information. In this post, I’ll cover how this scam works and what you and your clients should look out for.

Read More

Topics: Industry News, Information Security

Thank You for Being Part of Our Award-Winning Blog

Posted by Lily Teplow on May 24, 2018

Thank You for Being Part of Our Award-Winning Blog

Today we are proud to announce that the MSPblog is a Gold Winner of the 2018 Hermes Creative Awards in the Blog Overall category! The Hermes Awards recognizes professional excellence in media conceptualization, writing, and design. With more than 6,000 entries from around the world in this year’s competition, the MSPblog is honored to have won a Gold Award. This achievement simply couldn’t have been possible without you, our valued readers and subscribers.

As a thank you, I’ve compiled some of my favorite blogging tips in hopes that it inspires you to create your own successful and award-winning blog.

Read More

Topics: Industry News, Blogging

3 Must-Read eBooks for Growing MSPs

Posted by Lily Teplow on May 23, 2018

3 Must-Read eBooks for Growing MSPs

To survive in today's MSP market, you need to be equipped with the best tools, technology and—most importantly—knowledge. As they say, knowledge is power, and today's most powerful MSPs are finding the following three eBooks to be real page-turners. 

In these must-read eBooks, discover how to overcome modern MSP pain points, capitalize on the IT security opportunity and set your business up for long-term profitability.

Read More

5 Tips for MSPs Selling Security Awareness Training

Posted by George Anderson on May 22, 2018

5 Tips for MSPs Selling Security Awareness Training

In the past year, global ransomware debilitated entire sectors of some countries’ economies. Equifax was breached, exposing more than 140 million records. Yahoo owned up to losing control of 3 million users’ data. So, it’s no surprise that the cost of cybercrime has steadily risen each year for the past two years, to an average cost of $11.7 million per business.

According to the research firm Gartner, untrained users click 90 percent of links within emails from addresses outside the enterprise, resulting in 10,000 malware infections. By their calculations, the infections led to an overall productivity loss of 15,000 hours per year, which, at a cost of 15,000 times $85 (average wage), equals $1,275,000 in losses.  Verizon's annual Data Breach Investigation Report backs up Gartner's findings, pinning 90 percent of successful network breaches on users taking the bait in phishing attacks. 

But cybercrime and its associated costs can be reduced when end users are trained to be their employers’ first line of defense. Security awareness training results in reduced risk, businesses that are better protected against breaches, and more profitable MSPs.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Security Awareness Training

How to Write Effective Marketing Copy: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on May 21, 2018

WB_102

With so many emails, datasheets, eBooks and other marketing assets being leveraged in the B2B buying process today, it can be difficult to stand apart from the crowd and craft copy that’s unique and compelling. Fortunately, the right mindset and a few best practices can help MSPs sharpen their writing and more effectively target prospects and customers. Tune in to this episode of The Weekly Byte to learn more!

Read More

Topics: Sales and Marketing, The Weekly Byte

Which Vertical Has the Highest Cost of Security? [CHART]

Posted by Lily Teplow on May 18, 2018

Which Vertical Has the Highest Cost of Security?

Today, cyber security is seen as a horizontal practice that’s typically the same across all industries. No matter the vertical, businesses need things like firewalls, DNS, endpoint protection, antivirus and the like. However, this line starts to blur once you bring in various regulations and compliance.

What’s more, the industries that have special security policies and compliance standards in place are finding that they’re increasingly the target of cyber attacks. It seems as though to cyber criminals the harder the information to steal, the higher the price tag. This presents an opportunity for IT service providers to step in and help these vertically-specialized companies in bolstering their cyber defenses with managed IT and security services. So, how can you convince them?

Read More

Topics: Cybersecurity and Threat Management, MSP Sales Chart, Vertical Alignment

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

Posted by Brandon Garcin on May 17, 2018

5-ways-to-imrpove-your-msp-service-level-agreement-sla.png

Service Level Agreements (SLAs) are a critical component of any modern MSP business. The goal of these documents is to provide clients with a detailed understanding of the scope of your services, define which parties have ownership over certain functions, and to set proper expectations for things like resolution times and escalation procedures. SLAs also provide both parties with a level of protection against legal action should an issue or misunderstanding arise—so they need to be crafted thoughtfully and carefully.

Read More

Topics: Business Development and Growth, Service Level Agreement

The Quick Guide to Marketing and Selling BDR

Posted by Lily Teplow on May 16, 2018

The Quick Guide to Marketing and Selling BDR

Backup and disaster recovery (BDR) is a must-have offering in managed IT services today. Yet, while many of the businesses you serve see the need for an effective business continuity strategy, the technology doesn’t necessarily sell itself.

Many organizations still have the mindset that traditional backup solutions or off-the-shelf software are sufficient, which makes it difficult for MSPs to convince them otherwise when selling BDR. So, whether you need guidance defining your go-to-market strategy or establishing the right messaging, this post will be your quick guide to yielding a higher ROI on your BDR sales and marketing efforts.

Read More

Topics: Sales and Marketing, Backup and Disaster Recovery

Breaking Down the Major Cyber Attack Methods Tricking MSPs

Posted by Meaghan Moraes on May 15, 2018

Breaking-Down-the-Major-Cyber-Attack-Methods-Tricking-MSPs

Every person in IT—really every person in business today—is hyper-aware of their risk of getting breached. It’s real, especially for small-to-medium-sized businesses that lack the advanced security tools and expertise needed to remain afloat. Hackers are relentless and lurking everywhere, and MSPs are ultimately responsible for their entry, and the resulting damage, to their clients’ networks.

In order to detect suspicious activity faster and minimize as much harm as possible, it’s crucial that you understand the methods employed by cyber criminals. MSPs offering cyber security services will benefit from the following breakdown, which details the most common cyber attack tactics, key warning signs and tips to remain protected.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus