MSP Blog Logo

Cyber Security

Business Growth

Sales and Marketing

IT Services

Subscribe


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

The-Ultimate-Guide-to-Success-in-Managed-IT-Services


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

Elliot Seeto

Elliot has been in the IT space for over 10 years. Having started out his career in a Support and Operational capacity, he quickly moved into Technical Sales focused roles. His ability to relate to his previous support experiences allow him a unique perspective to provide the right solutions and insight to his client base. As a Technical Account Manager with Continuum in APAC, he is focused on helping partners grow their business while promoting Continuum’s brand throughout the region.

Recent Posts

Understanding the Essential Eight: The Key to Multi-Layered Security

Posted by Elliot Seeto on December 6, 2018

Understanding-the-Essential-Eight--The-Key-to-Multi-Layered-Security

As we come to the close of our Understanding the Essential Eight series, I hope you’ve had the chance to digest all of our discussions and can utilise these tips when speaking with clients around the importance of proper security practices. Remember, it is not just us as an industry providing these recommendations, governments are too.

While these basic strategies can be used to raise awareness in sales conversations, as well as through ongoing training and support, I’d like to take this opportunity to wrap a nice bow on the series and discuss the key to establishing a multi-layered security strategy.

Read More

Topics: Cyber Security, Continuum Security

Understanding the Essential Eight: Multi-Factor Authentication and Daily Backups

Posted by Elliot Seeto on November 1, 2018

Understanding the Essential Eight: Multi-Factor Authentication and Daily Backups

As we near the end of our series on understanding the Essential Eight, we’re leaving the easiest strategies for last—but they’re no less important in the grand scheme of security best practices. In this post, we’ll cover how to limit access to sensitive information with multi-factor authentication, as well as how to ensure easy recoverability with daily data backups.

Read More

Topics: Cyber Security

Understanding the Essential Eight: Configuring Microsoft Office Macro Settings and Restricting Administrative Privileges

Posted by Elliot Seeto on October 25, 2018

Understanding the Essential Eight: Configuring Microsoft Office Macro Settings and Restricting Administrative Privileges

In our previous post about understanding the Essential Eight, we covered best practices on application whitelisting and user application hardening. In case you missed it, you can read it here.

This week, we want to take you through why you should consider configuring Microsoft Office macro settings and restrict administrative privileges to prevent malware delivery and limit the extent of security incidents.

Read More

Topics: Cyber Security

Understanding the Essential Eight: Application Whitelisting and User Application Hardening

Posted by Elliot Seeto on September 12, 2018

Understanding the Essential Eight: Application Whitelisting and User Application Hardening

If you’ve been keeping up with our Understanding the Essential Eight series, over the past two weeks we’ve covered what the Essential Eight is and how you can get started with patching best practices. This week, we’ll take you through application whitelisting and user application hardening—two important areas that are often overlooked.

 

Read More

Topics: Cyber Security

Understanding the Essential Eight: What It Is and Why It’s Important

Posted by Elliot Seeto on August 29, 2018

Understanding the Essential Eight: What It Is and Why It’s Important

Are you aware of the Australian Cyber Security Centre (ACSC) Essential Eight? From a recent survey conducted from Australian MSPs, the answer has overwhelmingly been no. Yet the follow-up question is: why not?

In short, the Essential Eight is a guide to help organizations mitigate cyber security incidents caused by various cyber threats. Over the next two months, we’ll be exploring these essential strategies, breaking down each one to raise awareness and provide some guidance on why it’s so important to keep these in mind.

Read More

Topics: IT Services, Cyber Security

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]