6 Important OS Hardening Steps to Protect Your Clients


Featured Post

6 Important OS Hardening Steps to Protect Your Clients

In order to provide clients with peace of mind, safeguard their sensitive information and differentiate your security services from the competition, here are six ways to harden customers' operating systems.

Read Now

Matt Mainhart

Previously one of the main trainers on our white label IT Help Desk, Matt holds a CompTIA Executive Certificate in Channel Management, as well as CompTIA A+, CompTIA Cloud Essentials, HDI Service Center Team Lead and Six Sigma Green Belt Certifications.
Find me on:

Recent Posts

Why Security Awareness Training is an MSP’s Secret Weapon

Posted by Paula Griffin on March 18, 2019

4-Reasons-SAT

I used to think that cyber attacks were like riots. If they ever came my way, they'd arrive in the form of masked rebels who'd overtake my computer until it burst into flames!  

Even though cyber attacks may not be as vivid as I'd imagined, they can actually cause much worse damage than a computer exploding. They can cost your business time, money and even worse, your credibility. The reality is, hackers won't come loudly crashing through your windows, but will most likely be subtle enough that they'll walk right through your front door.

Read More

Topics: Cyber Security

Why Resiliency is the Future of BDR and Business Continuity

Posted by Dave LeClair on March 8, 2019

Backup-Resiliency

It is clear we live in an always-on world. Regardless of what vertical market a business serves, it is likely that customers expect 24x7x365 access to at least some, if not all, of its business services. Even for knowledge workers, ubiquitous broadband networking and mobile devices now let employees work anywhere and at any time. Downtime is simply not tolerated anymore. This need for constant data access and system uptime has caused a shift in how we think about data protection and business continuity over the years, particularly for SMBs.

Read More

Topics: BDR, Cyber Security

Why MSPs Should Advise Clients to Surpass the PCI DSS Baseline

Posted by Mark Cline on March 4, 2019

PCI-blog

By now, most of us have heard the terms PCI compliance, PCI DSS, or Payment Card Industry Compliance Data Security Standards. If you need a refresher before we dive in, review some quick PCI DSS facts. These terms have been flying around for quite some time and merchants have been complying, or attempting to comply, for years. If merchants are complying it begs the question, why do we still see data breaches? The PCI standard was created to build a baseline of security functions to protect card holder data, and it does just that. The standard is a great baseline for a security posture, but in no means does it end with a PCI self-assessment questionnaire (SAQ).

With the development of new payment technologies like more advanced point-of-sale (POS) terminals, we see the overall scope of PCI compliance diminishing. Less credit card data in scope means less risk. However, this line of thinking is a bit misleading because it can give the merchant a false sense of security.

Read More

Topics: Cyber Security

Dominating New Verticals in 2019: 7 Tips to Keep AEC Clients Cyber Secure

Posted by Josh Weiss on March 1, 2019

Dominate-New-Verticals-AEC

Traditional architecture, engineering and environmental consulting (AEC) firms are in the middle of a makeover, with spreadsheets and calculators taking a backseat to big data, technology and software. With increasing speed, AEC firms are utilizing technology-driven capabilities to provide more service offerings and improve efficiency. This means they require proactive cybersecurity strategies to protect their business. The bottom line is: AEC firms are making strategic investments in cyber security.

Read More

Topics: Business Growth, IT Services, Cyber Security

Seize the Security Opportunity with Continuum’s Global Cyber Security Roadshow

Posted by Meaghan Moraes on February 22, 2019

Introducing Continuum’s Global Cyber Security Roadshow

Dealing with today’s threat landscape can put a burden on most IT and security service providers. There are serious, complex issues you need to solve for your SMB clients—including phishing, brute-force attacks, the dark web, and much more. Without the proper knowledge, technology, and enablement materials, the promise of building an enduring security line of business could be shattered. 

To provide MSPs with everything they need to emerge as cyber security leaders, Continuum is bringing its Global Cyber Security Roadshow to IT service providers around the globe! Keep reading to discover what you’ll learn, where we’re heading and why you’ll want to be there.

Read More

Topics: Cyber Security

Continuum Security Empower: How to Avoid Selling Security Like You’re Selling Tires

Posted by Brian Downey on February 20, 2019

Continuum-Security-Empower

Last year I decided to buy snow tires for my wife’s car. I suggested she call a shop and make an appointment, but instead, she came back to me with a menu of options—speed ratings, noise ratings, treadwear comparisons and a variety of prices. It was a lot to take in, and I quickly realized that what I thought would be a two-minute process might actually take longer to understand than I’d anticipated. It was only September, so I told her I’d take some time to mull it over before calling back. Then life happened: kids’ hockey games, work, projects around the house, and before I knew it, we were opening Christmas presents and I still hadn’t taken a look at these tires. So at that point, I decided I might as well wait until next year.

Read More

Topics: Cyber Security, Continuum Security

Why MSPs are Getting Serious About Dark Web Monitoring

Posted by Tim Weber on February 15, 2019

Why-MSPs-are-Getting-Serious-about-Dark-Web-Monitoring

One of the most important aspects of my job is to determine not only what specific products we are going to recommend/sell to our client base, but also—at a prioritization level—what areas we (and our clients) should be focusing on. I think we can all agree that there is no shortage of solutions out there. Some are incredibly relevant and needed; others, not so much.

As an MSP, it's important to be able to recommend the right tools and capabilities that will help your clients propel their business forward—especially when it comes to cyber security. 

Read More

Topics: Cyber Security

5 Easy Ways to Improve Your Client’s Website Security

Posted by Larry Monuteaux on February 6, 2019

5-Ways-to-Improve-Your-Clients-Website-Security.jpg

You just finished ramping up a new client. Everyone is logging on using complex passwords, the workstations and servers are on a regular patching schedule, the servers are getting backed up, the Wi-Fi is configured, and the printer is shared. The whole environment is running like a well-oiled machine—you’ve thought of everything! Or have you?

Well, if your client has a website (and who doesn’t, these days?), then they are probably going to ask you about that too. As their MSP, you are handling all of their computing needs, right? If you think that doesn’t involve making sure their website is secure, think again.

Read More

Topics: Cyber Security

The Top 5 MSP Blog Posts of January 2019

Posted by Meaghan Moraes on January 31, 2019

Monthly-Blog-Roundup-Jan2019

What are the keys to selling security services? Which tools should MSPs take advantage of? Where is the managed IT services market headed? We answer these questions and more in our roundup of the MSPblog's most popular posts of January 2019.

See below for the top five blog articles our readers couldn’t get enough of this month.

Read More

Topics: Sales and Marketing, Cyber Security

3 Winning Tactics to Approach Clients about Cyber Security

Posted by Derek Marin on January 24, 2019

3-Winning-Tactics-to-Approach-Clients-About-Cybersecurity

It’s tempting to simply slap your company logo on templated pitch decks and hit the phones. But, we all know how this ends—the one-size-fits-all playbook is dated and ultimately ineffective. And besides, upgrading isn’t the same as selling to a prospect!

Clients expect their MSP's protection. In addition, the client's general perception of cyber security is influenced by their MSP. In this blog post, I'll offer some key tips on how to guide your clients to purchase more cyber security services, including understanding their personal views on security, how to perceive that they may be interested, and some simple email templates to arrange an upgrade meeting. 

Read More

Topics: Sales and Marketing, Cyber Security

Building Your Security Go-to-Market Plan on Sales Basics

Posted by Jennifer Bleam on January 23, 2019

Building-Your-Security-Go-to-Market-Plan-on-Sales-Basics

One of the biggest questions I’m asked when it comes to selling security is HOW to sell it. Whether you’re selling to new prospects or talking to existing clients during QBRs—at some point, you’ll have to have a sales conversation.

You may feel panicked at simply the thought of talking about security, especially if you don’t feel like an expert. Rest assured that you know a LOT more than the end user does. Stick to the basics and you’ll do just fine! In this post, we'll break down how to leverage that foundational sales knowledge when developing your security go-to-market plan. 

Read More

Topics: Sales and Marketing, Cyber Security

Explaining "Your Security Value Proposition" to Your Clients [VIDEO]

Posted by Meaghan Moraes on January 14, 2019

Explaining-Your-Security-Value-Prop

As a growth-oriented MSP emerging as a cyber security leader, it’s crucial that you know your security value proposition like the back of your hand. More specifically, you need to be able to effectively articulate your security value prop to your clients and prospects.

Since your SMB client-base is now the primary target of cyber attacks, they require the utmost protection with advanced tools and protocols. And, that’s exactly what they rely on you for—in fact, that may assume that their level of cyber security has been “good enough” for years.

Read More

Topics: Cyber Security, Explaining IT Series

Exciting IT Channel Progress: What the CMIT Acquisition Means for MSPs

Posted by Meaghan Moraes on January 10, 2019

Exciting-IT-Channel-Progress-What-the-CMIT-Acquisition-Means-for-MSPs

2019: what a time to be in the managed services industry. With the rise of cyber security, the quest to solve the skills gap, and increased investment in mergers and acquisitions to name a few, there's been a lot of fascinating movement as of late—and Continuum and our partners are here for it. 

The recent acquisition of CMIT Solutions by private equity firm Craftmans Capital speaks to this exciting time. Read on for more details on this new development and advice for MSPs working to find that secret recipe for success in this market.

Read More

Topics: Business Growth, IT Services, Cyber Security

PCI DSS Back to Basics: Quick Tools and Tips for MSPs

Posted by Mark Cline on January 8, 2019

PCI-DSS-Compliance

When it comes to the PCI DSS compliance discussion with your clients, things can get confusing fast. Merchants have many voices telling them various bits of information about their compliance—the bank, the payment processor, the POS solution provider, the POS integrator and so on. Most of the time, the information provided is out of context, incomplete or flat-out incorrect. As their IT service provider, you can play a central role in cutting through the confusion and providing a clear path to compliance.

Oftentimes, the best way to optimize your client relationships is getting back to basics. The following PCI DSS reminders and suggestions will help you effectively step in as the technology advisor and resource your customers will rely on to clarify the complexities of the IT channel. 

Read More

Topics: Cyber Security

Breaking: Hackers Target MSPs to Infiltrate SMB Data

Posted by Meaghan Moraes on January 3, 2019

Hackers-Target-MSPs

Data Resolution, a managed services provider (MSP) in California was hit by a Ryuk ransomware attack—the same malware strain that recently infected printing and delivery operations for multiple major U.S. newspapers—on Christmas Eve. As of August 2018, Ryuk ransomware had netted attackers over $640,000.

While Data Resolution, which has between 11 and 50 employees, assured customers that their managed enterprise resource planning (ERP) databases were safe, it’s unclear how much data was allegedly impacted. 

Read More

Topics: IT Services, Cyber Security

5 Cyber Security Realities that Didn’t Exist 5 Years Ago

Posted by Meaghan Moraes on January 3, 2019

5 Cyber Security Realities

A lot can change in five years. Think of where we are today—now flash back five years to 2014. What was happening? The Winter Olympics in Sochi, the Ice Bucket Challenge, and we were only on iPhone 6. The world looked a bit differently then, and business concerns and priorities were different too—especially for small-to-medium-sized businesses (SMBs).

In 2014, customer acquisition and retention and business growth were top goals for SMBs, top IT priorities were social media and mobility solutions, and within the top five challenges for SMBs was data protection, recovery and business continuity. It’s interesting to compare these areas to SMB budgeting priorities for 2019.

Read More

Topics: Cyber Security

The Top 5 MSP Blog Posts of 2018

Posted by Meaghan Moraes on January 1, 2019

Top-5-Posts-of-2018.png

Happy New Year! What are your New Year’s resolutions for 2019? Maybe you’re hoping to devote more time to growing your managed services business, fill your lead pipeline or break into the cybersecurity space. These are all great goals to have, but to actually achieve them, you might need a little help.

Lucky for you, we’ve rounded up our top five posts from the MSPblog this year. With tips and best practices on mastering the MSP sales process, making strategic business decisions, incorporating security into your portfolio, optimizing your tech talent and much more, you’ll be set up for success in the new year. Take a look at our top posts below to get a head start on your resolutions!

Read More

Topics: Business Growth, Sales and Marketing, Cyber Security

3 Mobile Security Quick Tips to Share with Clients

Posted by Matt Mainhart on December 26, 2018

3-Mobile-Security-Tips.png

We live a mobile lifestyle. Our mobile devices keep us connected, and we can do anything from our mobile devices - from anywhere in the world. Online banking, hotel reservations, email – all can be accessed with a tap of the finger.

If you forget your phone at a restaurant, at work, or at the pub – how confident are you that nobody else can access your information?

While browsing the Internet, how confident are you that your information is only being viewed by you?

Follow these steps for a confidence boost in your mobile security:

Read More

Topics: RMM, IT Services, Cyber Security

2019 Will Be (Another) Year of Security: Will You Be Ready?

Posted by Joseph Tavano on December 18, 2018

2019-Will-Be-Another-Year-of-Security

In the early 2000s, cloud architecture and the advent of cloud-supported technology poised IT service providers to expect a major disruption in both their service delivery and business models. That didn’t happen; cloud-based technology integrated into the channel comfortably, supporting and strengthening IT business objectives and evolving the role of the managed IT service provider.

Read More

Topics: Cyber Security

Explaining "Ransomware" to Your Clients [VIDEO]

Posted by Meaghan Moraes on December 17, 2018

How-to-Explain-Ransomware

With cybercrime damages set to cost the world $6 trillion annually by 2021, the pressure is on for cyber security teams across industries to defend their assets. This especially rings true for managed service providers entrusted to keep their clients' IT systems and environments protected.

Companies of all sizes are being attacked today because there are now more sophisticated attackers, and the attacks are broad-based and less targeted. Advanced forms of malware, like ransomware, are now major threats to businesses—and small- to medium-sized businesses (SMBs) are now the primary targets of these attacks

Read More

Topics: Cyber Security, Explaining IT Series

8 Security Metrics All MSPs Should Be Tracking

Posted by Lily Teplow on December 11, 2018

8 Security Metrics All MSPs Should Be Tracking

As you begin to offer clients with a comprehensive cyber security solution, one of the first steps you should take is to identify which security metrics you need to measure. Why? Because you simply can’t manage what you don’t measure.

While some aspects of security—such as the integrity of the solution or provided peace of mind—may be difficult to quantify, below we’ve compiled eight essential security metrics that every MSP should be tracking.

Read More

Topics: Cyber Security

Understanding the Essential Eight: The Key to Multi-Layered Security

Posted by Elliot Seeto on December 6, 2018

Understanding-the-Essential-Eight--The-Key-to-Multi-Layered-Security

As we come to the close of our Understanding the Essential Eight series, I hope you’ve had the chance to digest all of our discussions and can utilise these tips when speaking with clients around the importance of proper security practices. Remember, it is not just us as an industry providing these recommendations, governments are too.

While these basic strategies can be used to raise awareness in sales conversations, as well as through ongoing training and support, I’d like to take this opportunity to wrap a nice bow on the series and discuss the key to establishing a multi-layered security strategy.

Read More

Topics: Cyber Security, Continuum Security

Breaking Alert Issued Against SamSam Ransomware

Posted by Lily Teplow on December 4, 2018

Breaking-Alert-Issued-Against-SamSam-Ransomware

On Monday, December 3, the FBI and Department of Homeland Security (DHS) issued an alert for SamSam ransomware—also known as MSIL/SAMAS.A—after identifying certain cyber threat actors using the ransomware to target industries in the United States and worldwide.

In this post, we cover the breaking news and what MSPs should take note of, how the SamSam ransomware works, and what you can do to protect against it.

Read More

Topics: IT Services, Cyber Security

A 5-Step Guide to Going to Market with Your Security Solution

Posted by Joseph Tavano on December 4, 2018

A 5-Step Guide to Going to Market with Your Security Solution

Most MSPs who have some experience in the channel understand what it takes to start offering new products to their clients; whether it is a new service, an add-on or additional form of IT support, the rollout can differ greatly. However, when it comes to offering an advanced security solution, there is little comparison—it is an entire category of products and services that are being introduced.

In order to successfully go to market in the cyber security space, MSPs need to solidify a plan well in advance of their solution’s public availability.

Read More

Topics: Sales and Marketing, Cyber Security

The Top 5 MSP Blog Posts of November 2018

Posted by Lily Teplow on November 29, 2018

November-Blog-Roundup

What are the keys to an MSP marketing plan for 2019? How can you explain the cloud to your clients? What tools are needed to build a cyber security offering? We answer these questions and more in our monthly roundup of the MSPblog's most popular posts.

See below for the top five blog articles our readers couldn’t get enough of this November.

Read More

Topics: Business Growth, Sales and Marketing, Cyber Security

13 Essentials for Building a Cyber Security Offering

Posted by Joseph Tavano on November 20, 2018

13 Essentials for Building a Cyber Security OfferingIn the modern world of advanced cyber security, you’ll need a lot more than consumer-grade antivirus and firewall applications to get the job done. Your clients have entrusted you with the logistics surrounding the safety and security of their IT environment, and to that end, you’ll need to arm yourself with the right stack of software and services to best protect them.

Read More

Topics: Cyber Security

4 Ways to Create Upsell Opportunities with Your Clients: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on November 19, 2018

The Weekly Byte Episode 118

Upselling or cross-selling your existing clients can be tricky—and just because someone has purchased one or two of your services doesn’t mean they’re guaranteed to buy into your full portfolio. Tune into this episode of The Weekly Byte to discover which tactics and processes you can leverage to drive successful upsell conversations with existing customers!

Read More

Topics: Sales and Marketing, The Weekly Byte, Cyber Security

Important Tips for Improving Password Security

Posted by Lily Teplow on November 8, 2018

Password-Security-Tips

Sometimes it is the simplest or most obvious things that can be easily overlooked or taken for granted in life. The IT space is no different and many of the most basic elements, like password management, can oftentimes be overlooked. While it’s not the sexiest of topics, passwords are something we use every day and should be at the forefront of any security plan.

Read More

Topics: Cyber Security

Where Does the Managed Services Market Stand Today?

Posted by Joseph Tavano on November 6, 2018

Where-Does-the-Managed-Services-Market-Stand-Today-

In the last quarter of 2018, it should come as a surprise to no one that the managed services market is changing, and the catalyst for that change is cyber security. This year, market dynamics and emerging trends came to a head to cause meaningful disruption in the managed services in the industry. So, where does the managed services market stand today? To understand that, it’s important to see how we got here.

Read More

Topics: Cyber Security

4 Cyber Security Resources to Improve Your Go-To-Market Strategy: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on November 5, 2018

The Weekly Byte Episode 117

Cyber security doesn’t sell itself, and your go-to-market strategy needs to be well-established before you begin engaging in sales conversations with clients and prospects. In this episode of The Weekly Byte, we explore four resources you can download and use immediately to help you enhance your security content library!

Read More

Topics: Sales and Marketing, The Weekly Byte, Cyber Security

Understanding the Essential Eight: Multi-Factor Authentication and Daily Backups

Posted by Elliot Seeto on November 1, 2018

Understanding the Essential Eight: Multi-Factor Authentication and Daily Backups

As we near the end of our series on understanding the Essential Eight, we’re leaving the easiest strategies for last—but they’re no less important in the grand scheme of security best practices. In this post, we’ll cover how to limit access to sensitive information with multi-factor authentication, as well as how to ensure easy recoverability with daily data backups.

Read More

Topics: Cyber Security

The Top 5 MSP Blog Posts of October 2018: Halloween Edition

Posted by Lily Teplow on October 31, 2018

October-Blog-Roundup-Halloween

Happy Halloween! It’s time to break out the cobwebs and the candy, because another month of managed IT services blog posts is on the books. To get you in the Halloween spirit, we’ve rounded up our spookiest, our scariest, and our most frightening blog posts of the past month.

See below for the top five blog articles our readers couldn’t get enough of.

Read More

Topics: Cyber Security

Why MSPs Should Avoid Security Scare Tactics this Halloween: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on October 29, 2018

The Weekly Byte Episode 116

When selling cyber security, MSPs will often attempt to “scare” their customers into purchasing a new solution—but the reality is that these tactics can end up doing more harm than good. Tune into this episode of The Weekly Byte to discover why you shouldn’t try to scare your clients when it comes to security (and what you should be doing instead)! 

Read More

Topics: Sales and Marketing, The Weekly Byte, Cyber Security

Understanding the Essential Eight: Configuring Microsoft Office Macro Settings and Restricting Administrative Privileges

Posted by Elliot Seeto on October 25, 2018

Understanding the Essential Eight: Configuring Microsoft Office Macro Settings and Restricting Administrative Privileges

In our previous post about understanding the Essential Eight, we covered best practices on application whitelisting and user application hardening. In case you missed it, you can read it here.

This week, we want to take you through why you should consider configuring Microsoft Office macro settings and restrict administrative privileges to prevent malware delivery and limit the extent of security incidents.

Read More

Topics: Cyber Security

How Do Businesses Stand a Chance Against Today’s Cyber Security Landscape?

Posted by Lily Teplow on October 24, 2018

How Do Businesses Stand a Chance Against Today’s Cyber Security Landscape?

Ah security. We constantly hear and talk about it, yet it continues to be the piece of the puzzle that so many companies struggle with. It’s such a major issue, in fact, that the entire month of October has been named National Cyber Security Awareness Month—and this week, we’re focusing on the importance of securing critical infrastructure from cyber threats. However, many businesses fail to do so without the help of an MSP.

There’s a clear need for more advanced cyber security in the SMB market—a topic that was covered on a recent episode of MSP Radio. Hosts Brandon and Joe were joined by Al Silva, CEO of Murphy, McKay & Associates, where he shared his perspective on why today’s businesses need better security and how you as an MSP can approach those conversations. Keep reading for the highlights of this episode.

Read More

Topics: Cyber Security

Preparing Your MSP for Security: Tips from an Expert

Posted by Brandon Garcin on July 24, 2018

Preparing Your MSP for Security: Tips from an Expert

On a recent episode of MSP Radio, Joe and I sat down with Brian Downey, Senior Director of Product Management at Continuum, and mastermind about all things cyber security. Following the news of our acquisition of CARVIR and adding a suite of products to Continuum Security, Brian joined us to talk more about the security space and how MSPs can take advantage of the emerging cyber security category.

Keep reading for our key takeaways and tidbits of advice from Brian, and listen to the full episode below!

Read More

Topics: Cyber Security, Continuum Security

Seizing the IT Security Opportunity with Continuum Security

Posted by Lily Teplow on June 27, 2018

Seizing the IT Security Opportunity with Continuum Security

“I need more skilled people for our security team.” Over the past year and a half, this sentence has been uttered countless times from IT service providers across the globe. Cyber security has grown to become a major global issue—with hackers and sophisticated threats capitalizing on the fact that there’s a clear shortage of security talent today. With virtually every aspect of your clients’ personal and professional information at risk, it’s your job to keep them protected. To do so, you need an advanced security solution that can hold up to the test. 

Continuum Security provides the complete framework that MSPs require to effectively deliver cyber security services to their customers—and with our acquisition of security leader CARVIR, we have three exciting products that MSPs and MSSPs can begin leveraging immediately. In a recent webinar, Continuum CEO Michael George was joined by Continuum Senior Director of Product Management Brian Downey and CARVIR CEO Jay Ryerse to discuss the opportunities MSPs have in the security space and how to achieve success with Continuum Security. In this post, we'll take a look at some of the key takeaways so you can understand exactly what your SMB customers are demanding and how you can deliver.

Read More

Topics: Cyber Security, Continuum Security

Transforming Managed Security: How to Offer Proactive, Detective and Responsive Security

Posted by Meaghan Moraes on June 19, 2018

Transforming-Managed-Security--How-to-Offer-Proactive,-Detective-and-Responsive-Security

Today, one in three security professionals lack the intelligence required to effectively detect and respond to cyber threats, according to a survey from Anomali. Where does this leave businesses, especially small-to-medium-sized businesses (SMBs) that are now the prime targets of cyber attacks? The reality is dire. In fact, 60 percent of SMBs go out of business within six months of a breach.

With advanced threats like hyper-targeted malware and ransomware, foundational security tools aren’t enough to keep SMB clients secure. Small businesses generally assume they are already protected from phishing, ransomware and insider threats, having historically secured their data firewalls, antivirus applications, or two-factor authentication. Those foundational security tools and policies are still required—but due to the modern threat landscape, additional layers of security need to be added into the equation to provide more complete and holistic protection.

Read More

Topics: Cyber Security, Continuum Security

Painting a Picture for Better IT Security

Posted by Brian Downey on June 18, 2018

Painting a Picture for Better IT Security

For many of those brought up in a certain time, you will remember a painter on TV named Bob Ross. Bob Ross went viral before the internet and social media made going viral a thing. His soothing voice, well-maintained hairstyle and ability to casually add “little trees” to a canvas that would somehow come out at the end of his half hour show as a true work of art—it was mesmerizing. When I watched, I was always impressed by how he used all the tools he had at his disposal, whether it be brushes or sponges, to get the desired effect.

Now when it comes to painting, I’m no Bob Ross—in fact even finger-painting pushes my artistic limits. Because of this, I never had an appreciation for the tools of the trade. I never fully appreciated the need for the dozens of different brushes or sponges that Bob Ross was using, but I appreciated the result he was able to deliver with them.

While interesting, Bob Ross doesn’t seem to have much to do with cyber securitybut the two are actually more similar than you might expect.

Read More

Topics: Cyber Security, Continuum Security

Enhancing Your Cyber Security Offering With Continuum Security

Posted by Brian Downey on June 15, 2018

Enhance-Your-Security-Offering-with-Continuum-Security

IT service providers are doing business in a world where they’re struggling to protect their clients who are constantly under fire from cyber threats. The nature and sophistication of today’s attacks are forcing MSPs to deliver security in a completely different way than they’ve approached RMM and BDR. Simply put: without the right protection and preventative measures in place, clients won’t stand a chance in the ever-changing threat landscape.

To combat this challenge, Continuum made an exciting announcement yesterday—we’ve acquired CARVIR to expand our security portfolio, enabling MSPs to offer enhanced security to clients. Today, I’d like to take a deeper dive into the three core products that make up the Continuum Security portfolio.

Read More

Topics: Cyber Security, Continuum Security

Continuum Acquires Managed Security Leader CARVIR, Bringing New Security Products to All MSPs

Posted by Brian Downey on June 14, 2018

Introducing Continuum Security

Security is the single greatest threat to businesses today, yet the greatest opportunity for IT service providers. Therefore, we are excited to announce the expansion of Continuum Security, the advanced cyber security solution MSPs need to deliver the protections their clients demand, through the acquisition of CARVIR, a leader in monitored and managed security for the IT channel.

With this acquisition, we are able to expand our security portfolio and bring new capabilities to market, helping you meet the mounting security and compliance needs of your SMB clients. Keep reading to learn more about the acquisition and which exciting new features are available to you today.

Read More

Topics: IT Services, Cyber Security, Continuum Security

Load More
RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]