Ready for another week's worth of important MSP stories and blog posts? From Cryptocurrency to BDR, we've got the latest. We'd like to consider ourselves your managed IT services RSS provider. Think we missed a notable headline? Drop a line in the comments section below! Without further ado, may we present your MSP weekly digest...






Continuum's Must-Read Blog Post This Week 

Can You Spot The 13 Security Flaws In This Photo?


With all of the recent security breaches in the news, it's easy to get caught up in the "technical" side of information security. Sure, there is a lot of work to be done to keep your information safe from hackers and malicious software programs, however, there's another side to the coin, and that's physical security. Many offices don't enforce best practices for physical information security, and frankly may just not be aware of them. As their MSP, your job is to educate them on these best practices, both from a technology standpoint and from a physical standpoint. Read more »  



What Is Going Wrong With BYOD?

CIO Online, , Tom Kaneshige, 

"CompTIA's spring survey of 400 IT and business executives shed light on what it calls the sorry state of BYOD: Depending on the size of the company, anywhere from 39 percent to 51 percent of respondents are not doing BYOD at all. Nada. Zip."  

BYOD - leverage the advantages while minimising risk with comprehensive data protection

ITWeb, , Gareth Tudor 

Questions to Ask Before You Buy Your Next Small Business Device

SMB Nation Blog, , Astro Brelsford  



Bitcoin security guarantee shattered by anonymous miner with 51% network power

Ars Technica, , Dan Goodin, 

"For the first time in Bitcoin's five-year history, a single entity has repeatedly provided more than half of the total computational power required to mine new digital coins, in some cases for sustained periods of time. It's an event that, if it persists, signals the end of the crypto currency's decentralized structure." 

Google Play Store Update Allows Apps to Silently Gain Control of Your Device

The Hacker News, , Mohit Kumar

Phishing mail says ‘DSVX virus’ detected in Your Yahoo Mail

National Cyber Security,  

Hacker mines $620K in cryptocurrency under victims' noses

Computerworld, , Gregg Keizer, 

"Planting malware to actually create digital funds, however, is a relatively new development, said [Pat] Litke, [a researcher at Dell SecureWorks' Counter Threat Unit (CTU),] and the evidence they collected on the Synology NAS-hijacking showed how lucrative the practice can be. That bodes ill."  

Stop sneaky hackers from launching DMA attacks

InfoWorld, , Roger A. Grimes, 

"Direct Memory Access (DMA) is a controller feature that has been available at least since the original IBM PC. It can be used by hackers to compromise your otherwise very heavily protected computer. Fortunately, there are steps you can take to minimize DMA-based attacks."  

85% of security professionals believe technology can't prevent attacks

TechRadar, , Juan Martinez

"The past 12 months have featured a string of notorious breaches and bugs - none more prevalent than the Heartbleed Bug, which infected software used by millions of web servers, retailers, operating systems, email and instant messaging services, and Target's point-of-sale breach, which exposed 70 million customer credit and debit cards numbers, as well as customer names, mailing addresses, email addresses, and phone numbers." 

3 Strategies for the New Era of Enterprise Cybersecurity

CIO Online, , John N. Stewart,  


Cloud Computing

Enterprise spend on public cloud IaaS to reach $650m by 2018

ZDNet, , Aimee Chanthadavong,   

"The research identified there's a growing trend in the adoption of a hybrid cloud model, which is expected to be in use by some 30 percent of enterprises by 2018. But on-premise IT is still considered a favoured choice. In fact, the study showed more organisations are implementing and considering private clouds, and are using virtualisation technology to implement a cloud architecture under their control."

Cloud Disaster Recovery: CIOs Must Lead

Information Week, , Jonathan Feldman,   

Five Burning Security Issues in Cloud Computing


Cloud, Mobile Collision Underline Critical Role of MSPs

The VAR Guy, @thevarguy, Elliot Markowitz, 

"This intersection of mobile device usage, management and integration with the adoption of cloud computing is putting solution providers in the catbird seat. In fact, many managed service providers already have begun transitioning their business models for this new opportunity by reinventing themselves, focusing on the user experience rather than server monitoring, and have learned how to upsell services in the era of cloud and mobility." 



Marketing Your IT Business? Use LinkedIn And Facebook

Business Solutions, , Bernadette Wilson

You can also connect with prospects through LinkedIn Groups — the site has numerous groups related many IT verticals and niche markets. By joining, you can DM (direct message) your fellow group members — including people who are not first connections. 

10 Types of Content and How to Use Them

SMB Nation Blog, , Tim Kelsey


Grab Bag MSP

Vertically-Focused IT Resellers Achieve Financial Success

SMB Nation Blog, , Astro Brelsford

"With improved enforcement of privacy laws and potential penalties for non-compliance, many vertical markets such as dental, healthcare, and the legal industries are seeking an easy to manage solution for the backup of both physical and virtual environments."

Autotask: Everyone Has an Opinion

SMB Nation Blog, , Harry Brelsford,  

Lead With BDR, Follow With Managed Services

Business Solutions, , Jay McCall, 

"After winning a backup and disaster recovery (BDR) implementation, an MSP changes its hotel client’s break-fix mentality and earns a 3x upsell with monthly recurring revenue." 

How to reinstall Windows 8 without losing your files and programs

ExtremeTech, , Tim Verry,   

How to Turn Customer Service Into a Profit Center

CIO Online, , David Taber

"Even when a customer isn't facing a crisis, customer service reps make extremely effective spies: Customers happily confide in them, as sales-driven pushiness doesn't scare off openness. On every call and email, reps should gather information to fuel an upsell cycle, even if somebody else completes the cycle."

IT hiring rises where it counts

Computerworld, , Patrick Thibodeau,  


Curious about the cloud and how it's driving today's managed IT services industry?

 Cutting-Through-the-Fog [eBook]