MSP Blog Logo


Business Growth


Help Desk



Sales & Marketing


Empowering Your MSP Business to Grow and Prosper—One Post at a Time


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

Hunter Smith

As Chief Information Officer (CIO), Hunter is expected to take Continuum's IT operations to the next level of performance as our company continues its rapid growth and expansion. Most recently, Hunter served as Senior Vice President and Chief Technology Officer for Acadian Asset Management. Prior to Acadian, Hunter held positions at Plymouth Rock Companies as Director of Enterprise Technology Services as well as positions at Hobbs/Madison, MFS Investment Management and CSC Consulting. Hunter has a bachelor’s degree in computer science from Dartmouth College. He is responsible for all IT resources for Continuum’s U.S. and India locations.

Recent Posts

5 Steps to Take After a Ransomware Infection

Posted by Hunter Smith on July 5, 2018

5 Steps to Take After a Ransomware Infection

As a managed IT services provider, it is vital that you do everything you can to prevent your clients’ machines from getting infected with any malicious software. Letting them know that they can take some simple precautions—like having adequate security software (antivirus and anti-malware) installed on their computer, applying OS security patches, not clicking on suspicious email links they don't recognize and not opening unexpected email attachments—can be game-changing for your role as their MSSP, security partner and advisor.

The five following tips will ensure you’re able to effectively communicate to your clients how to deal with ransomware and keep them as best protected as possible with your MSSP services.

Read More

Topics: Cybersecurity and Threat Management, Information Security

Phishing Scams: What You Need to Know to Avoid Them

Posted by Hunter Smith on April 11, 2018


As a managed IT services provider (MSP), there are a myriad of security threats that you and your clients face today. One threat that constantly comes up is phishing scams. These scams can be fairly simple, yet very effective at duping the user and capturing their private information. Even the slightest clue to a username and/or password can give hackers all they need to break into private systems and steal information from companies and individuals—and for this reason, it’s crucial to be aware of phishing schemes, tactics and best practices for avoidance.

Read More

Topics: Tech Quick Tips, Data Protection, Information Security, Cybersecurity and Threat Management

Protect Yourself and Clients from Malware

Posted by Hunter Smith on November 30, 2017

"Attention! We've detected malicious activity on your computer. Download antivirus now."

Spyware, Keyloggers, Scareware (described in example above), Ransomware and more. It seems like malware, or malicious software, lurks around every corner of the Internet, be it in a threatening email attachment or false online advertisement. There are now newer, subtler ways for your clients to have their personal data stolen, and few will be able to detect the warning signs of the various types of malware attacks before the damage is done and the data is lost. It is time to teach yourself and your clients how to prevent malware from causing unnecessary problems on your computers and servers.

Read More

Topics: Data Protection, Backup and Disaster Recovery, Mobile Device Management and IT Mobility, Cybersecurity and Threat Management

6 Important OS Hardening Steps to Protect Your Clients

Posted by Hunter Smith on November 9, 2016

6 Important OS Hardening Steps to Protect Your Clients.jpg

According to the 2016 Duo Trusted Access Report, fifty-three percent of Mac OS users are running either the fully patched, latest version of OS X, or the previous version, compared to thirty-five percent of Windows users on Windows 10 and 8.1. That means the majority of these operating systems are outdated.

As you know, proper patch management is critical to protecting client data and uptime, but it's just one of many security considerations. With Ransomware-as-a-Service and Angler, Bedep and Neutrino exploit kit adoption on the rise, MSPs must strengthen client defenses against outside attacks. When attempting to compromise a device or network, malicious actors look for any way in. Unbeknownst to many small- and medium-sized businesses, operating system vulnerabilities provide easy access. In order to provide clients with peace of mind, safeguard their sensitive information and differentiate your security services from the competition, here are six ways to harden customers' operating systems: 

Read More

Topics: Information Security, Data Protection, Cybersecurity and Threat Management

7 Steps to Avoid a CryptoWall or CryptoLocker Infection

Posted by Hunter Smith on June 9, 2016

The big words in malware these days are CryptoLocker and CryptoWall, the two stalwarts of an emerging group of malware known as “ransomware.” And that term is a very apt categorization of what this type of malicious software does: it literally holds your data and files hostage, demanding ransom payment in order to unlock and regain access to your personal information.

Read More

Topics: Tech Quick Tips, Information Security, Data Protection, Cybersecurity and Threat Management

Top 3 Questions MSPs Have About HIPAA Compliance

Posted by Hunter Smith on June 1, 2016


HIPAA (Health Insurance Portability and Accountability Act) compliance is a complex, but critical issue for many businesses. For many of these businesses who outsource their IT management needs, the onus for ensuring HIPAA compliance falls on these managed services providers (MSPs), like yourself. Your clients in the healthcare industry will likely pepper you with lots of questions and concerns around staying HIPAA compliant and avoiding the costly consequences of a HIPAA violation.

Here are the three most commonly asked questions about HIPAA compliance for MSPs. 

Read More

Topics: HIPAA, Healthcare IT, Information Security, Data Protection

The Threat the FBI’s Internet Crime Complaint Center (IC3) Wants You to Know About:

Posted by Hunter Smith on March 4, 2015


In a recent public service announcement, the FBI’s Internet Crime Complaint Center (IC3) identified a global scam all small-to-medium-sized businesses should especially be aware of, Business Email Compromises (BECs)

Last year saw an influx of BECs, a startling trend that the FBI predicts will increase with more victims and higher total dollar loss in 2015.

Read More

Topics: Data Protection, Information Security

Top 5 IT Security Threats & Trends to Watch in 2015: IT SNAFU Day 12

Posted by Hunter Smith on December 25, 2014

We started off the 12 Days of IT SNAFUs by (horrendously) singing a little ditty about the 12 IT Nightmares of 2014 and now, as the year and this blog series draws to a close, we instead urge you to prepare for the influx of IT security issues coming your way. You may be well aware that this year was the worst for data breaches, but can your clients expect the same high volume of targeted attacks when they come back from the holidays? We've read and analyzed security prediction reports from ThreatTrack Security, Websense, Trend Micro, and more to bring you the top cybersecurity threats and trends to watch out for in 2015.

Make sure you don't drop the ball after the ball drops...

Read More

Topics: Industry News, Data Protection, Information Security

Cryptolocker Is Evolving...and It’s Getting Smarter

Posted by Hunter Smith on November 24, 2014

Viruses, diseases and bacteria evolve in our natural world, so it’s only fitting that malware, hacker scams and computer viruses evolve too. By now, you’re hopefully familiar with the Cryptolocker virus, a type of ransomware that will hold your files hostage until you pay a ransom in the form of currency and/or Bitcoins. However, the latest versions show that it has become smarter – which can be a bit scary for MSPs and IT security professionals.

Read More

Topics: Industry News, Data Protection, Information Security

Your Biggest Security Threat May Be Your Easiest Fix

Posted by Hunter Smith on October 9, 2014

If you wanted to learn about and safeguard against all of the security issues facing your managed IT services business, you’d easily get sucked into a Google search results black hole. In other words, trying to digest the depth and breadth of existing security concerns is as daunting as it is impossible.

So how can you protect your customers and help them increase their own security with this ever-expanding threat landscape? Identify the main problem. I’ve got news for you. It’s sitting not two feet from your desk. Yes, the biggest threat to your clients’ security is your own employees.

Read More

Topics: Information Security

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus