MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Cybersecurity Education & Tips for the "It Won't Happen to Me" SMB [eBook]

Posted April 20, 2016by Mary McCoy

wile-e-coyote-danger-gif.gif

source: http://giphy.com/gifs/mTXSKTk3BsT6w

82 percent of small- and medium-sized businesses claim they're not targets for attacks as they don't have anything worth stealing.

If you struggle to successfully sell your managed security services offering, chances are your prospects and clients underestimate the need for consistent, vigilant monitoring and maintenance. They think what they're currently doing is enough. In fact, when discussing the business-crippling threat of a data compromise or data loss, you've likely heard the following objections:

  1. That will never happen to me.
  2. It's a risk I'm willing to take. 

The sad truth is that potential clients hold these beliefs because there's a widespread lack of cybersecurity education and awareness in the workplace today. In Cybersecurity Tips for Employees: The Complete Guide to Secure Behavior Online and in the Office, our newest eBook, we help MSPs bridge that gap by providing a comprehensive overview of threats and best practices with physical, email, account management, mobile and website browsing security. 

Are your contacts playing into hackers' hands without even knowing it?

Take a Peak Before Downloading!

Here is a brief excerpt from a chapter detailing username and password management strategies:


Eight Tips to Strengthen Password Security

  1. Change passwords at least every three months for non-administrative users and 45-60 days for admin accounts.
  2. Use different passwords for each login credential.
  3. Avoid generic accounts and shared passwords.
  4. Conduct audits periodically to identify weak/duplicate passwords and change as necessary.
  5. Pick challenging passwords that include a combination of letters (upper and lower case), numbers and special characters (e.g. <$>, <%> and <&>).
  6. Avoid personal information such as birth dates, pet names and sports.
  7. Use passwords or passphrases of 12+ characters.
  8. Use a Password Manager such as LastPass where users need just one master password.
  9. Don’t use a browser’s auto-fill function for passwords.


You can find and share more actionable lists like this one when you download Cybersecurity Tips for Employees: The Complete Guide to Secure Behavior Online and in the Office. 

When your prospects and clients read this eBook, they'll have a better appreciation for the expanding threat landscape and how it's jeopardizing their companies' data. Not only that, they'll discover that they can depend on you for data protection technology, education and expertise. Now that's a winning cybersecurity combination they can't deny!


Download your eBook now!

Get-Cybersecurity-Tips-for-Employees-The-Complete-Guide-to-Secure-Behavior-Online-and-in-the-Office-eBook

Meet Mary! Mary McCoy is a Senior Demand Generation Programs Manager at Continuum, where she's worked for over two years. Mary has consulted with hundreds of partners, lending website, blog and social media support. Before that, she graduated from the University of Virginia (Wahoowa!) with a BA in Economics and served as digital marketing intern for Citi Performing Arts Center (Citi Center), spearheading the nonprofit’s #GivingTuesday social media campaign. Like her school’s founder, Thomas Jefferson, Mary believes learning never ends. She considers herself a passionate, lifelong student of content creation and inbound marketing.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus