Ready for another week's worth of important MSP stories and blog posts? From Cryptocurrency to BDR, we've got the latest. We'd like to consider ourselves your managed IT services RSS provider. Think we missed a notable headline? Drop a line in the comments section below! Without further ado, may we present your MSP weekly digest...
Continuum's Must-Read Blog Post This Week
With all of the recent security breaches in the news, it's easy to get caught up in the "technical" side of information security. Sure, there is a lot of work to be done to keep your information safe from hackers and malicious software programs, however, there's another side to the coin, and that's physical security. Many offices don't enforce best practices for physical information security, and frankly may just not be aware of them. As their MSP, your job is to educate them on these best practices, both from a technology standpoint and from a physical standpoint. Read more »
"CompTIA's spring survey of 400 IT and business executives shed light on what it calls the sorry state of BYOD: Depending on the size of the company, anywhere from 39 percent to 51 percent of respondents are not doing BYOD at all. Nada. Zip."
ITWeb, @ITWeb, Gareth Tudor
SMB Nation Blog, @smbnation, Astro Brelsford
"For the first time in Bitcoin's five-year history, a single entity has repeatedly provided more than half of the total computational power required to mine new digital coins, in some cases for sustained periods of time. It's an event that, if it persists, signals the end of the crypto currency's decentralized structure."
The Hacker News, @TheHackersNews, Mohit Kumar
National Cyber Security, @NCSbyHTCS
"Planting malware to actually create digital funds, however, is a relatively new development, said [Pat] Litke, [a researcher at Dell SecureWorks' Counter Threat Unit (CTU),] and the evidence they collected on the Synology NAS-hijacking showed how lucrative the practice can be. That bodes ill."
"Direct Memory Access (DMA) is a controller feature that has been available at least since the original IBM PC. It can be used by hackers to compromise your otherwise very heavily protected computer. Fortunately, there are steps you can take to minimize DMA-based attacks."
TechRadar, @techradar, Juan Martinez
"The past 12 months have featured a string of notorious breaches and bugs - none more prevalent than the Heartbleed Bug, which infected software used by millions of web servers, retailers, operating systems, email and instant messaging services, and Target's point-of-sale breach, which exposed 70 million customer credit and debit cards numbers, as well as customer names, mailing addresses, email addresses, and phone numbers."
"The research identified there's a growing trend in the adoption of a hybrid cloud model, which is expected to be in use by some 30 percent of enterprises by 2018. But on-premise IT is still considered a favoured choice. In fact, the study showed more organisations are implementing and considering private clouds, and are using virtualisation technology to implement a cloud architecture under their control."
The VAR Guy, @thevarguy, Elliot Markowitz, @elliotmark1
"This intersection of mobile device usage, management and integration with the adoption of cloud computing is putting solution providers in the catbird seat. In fact, many managed service providers already have begun transitioning their business models for this new opportunity by reinventing themselves, focusing on the user experience rather than server monitoring, and have learned how to upsell services in the era of cloud and mobility."
Business Solutions, @bsminfo, Bernadette Wilson
You can also connect with prospects through LinkedIn Groups — the site has numerous groups related many IT verticals and niche markets. By joining, you can DM (direct message) your fellow group members — including people who are not first connections.
SMB Nation Blog, @smbnation, Tim Kelsey
Grab Bag MSP
SMB Nation Blog, @smbnation, Astro Brelsford
"With improved enforcement of privacy laws and potential penalties for non-compliance, many vertical markets such as dental, healthcare, and the legal industries are seeking an easy to manage solution for the backup of both physical and virtual environments."
"After winning a backup and disaster recovery (BDR) implementation, an MSP changes its hotel client’s break-fix mentality and earns a 3x upsell with monthly recurring revenue."
CIO Online, @CIOonline, David Taber
"Even when a customer isn't facing a crisis, customer service reps make extremely effective spies: Customers happily confide in them, as sales-driven pushiness doesn't scare off openness. On every call and email, reps should gather information to fuel an upsell cycle, even if somebody else completes the cycle."
Curious about the cloud and how it's driving today's managed IT services industry?
By Gretchen Hoffman
By Susan Perez
By Christian Stephens