MSP Blog Logo


Business Growth


Help Desk



Sales & Marketing


Empowering Your MSP Business to Grow and Prosper—One Post at a Time


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

Managed IT Services Weekly Recap: June 16th

Posted June 21, 2014by Mary McCoy


Ready for another week's worth of important MSP stories and blog posts? From Cryptocurrency to BDR, we've got the latest. We'd like to consider ourselves your managed IT services RSS provider. Think we missed a notable headline? Drop a line in the comments section below! Without further ado, may we present your MSP weekly digest...






Continuum's Must-Read Blog Post This Week 

Can You Spot The 13 Security Flaws In This Photo?


With all of the recent security breaches in the news, it's easy to get caught up in the "technical" side of information security. Sure, there is a lot of work to be done to keep your information safe from hackers and malicious software programs, however, there's another side to the coin, and that's physical security. Many offices don't enforce best practices for physical information security, and frankly may just not be aware of them. As their MSP, your job is to educate them on these best practices, both from a technology standpoint and from a physical standpoint. Read more »  



What Is Going Wrong With BYOD?

CIO Online, , Tom Kaneshige, 

"CompTIA's spring survey of 400 IT and business executives shed light on what it calls the sorry state of BYOD: Depending on the size of the company, anywhere from 39 percent to 51 percent of respondents are not doing BYOD at all. Nada. Zip."  

BYOD - leverage the advantages while minimising risk with comprehensive data protection

ITWeb, , Gareth Tudor 

Questions to Ask Before You Buy Your Next Small Business Device

SMB Nation Blog, , Astro Brelsford  



Bitcoin security guarantee shattered by anonymous miner with 51% network power

Ars Technica, , Dan Goodin, 

"For the first time in Bitcoin's five-year history, a single entity has repeatedly provided more than half of the total computational power required to mine new digital coins, in some cases for sustained periods of time. It's an event that, if it persists, signals the end of the crypto currency's decentralized structure." 

Google Play Store Update Allows Apps to Silently Gain Control of Your Device

The Hacker News, , Mohit Kumar

Phishing mail says ‘DSVX virus’ detected in Your Yahoo Mail

National Cyber Security,  

Hacker mines $620K in cryptocurrency under victims' noses

Computerworld, , Gregg Keizer, 

"Planting malware to actually create digital funds, however, is a relatively new development, said [Pat] Litke, [a researcher at Dell SecureWorks' Counter Threat Unit (CTU),] and the evidence they collected on the Synology NAS-hijacking showed how lucrative the practice can be. That bodes ill."  

Stop sneaky hackers from launching DMA attacks

InfoWorld, , Roger A. Grimes, 

"Direct Memory Access (DMA) is a controller feature that has been available at least since the original IBM PC. It can be used by hackers to compromise your otherwise very heavily protected computer. Fortunately, there are steps you can take to minimize DMA-based attacks."  

85% of security professionals believe technology can't prevent attacks

TechRadar, , Juan Martinez

"The past 12 months have featured a string of notorious breaches and bugs - none more prevalent than the Heartbleed Bug, which infected software used by millions of web servers, retailers, operating systems, email and instant messaging services, and Target's point-of-sale breach, which exposed 70 million customer credit and debit cards numbers, as well as customer names, mailing addresses, email addresses, and phone numbers." 

3 Strategies for the New Era of Enterprise Cybersecurity

CIO Online, , John N. Stewart,  


Cloud Computing

Enterprise spend on public cloud IaaS to reach $650m by 2018

ZDNet, , Aimee Chanthadavong,   

"The research identified there's a growing trend in the adoption of a hybrid cloud model, which is expected to be in use by some 30 percent of enterprises by 2018. But on-premise IT is still considered a favoured choice. In fact, the study showed more organisations are implementing and considering private clouds, and are using virtualisation technology to implement a cloud architecture under their control."

Cloud Disaster Recovery: CIOs Must Lead

Information Week, , Jonathan Feldman,   

Five Burning Security Issues in Cloud Computing


Cloud, Mobile Collision Underline Critical Role of MSPs

The VAR Guy, @thevarguy, Elliot Markowitz, 

"This intersection of mobile device usage, management and integration with the adoption of cloud computing is putting solution providers in the catbird seat. In fact, many managed service providers already have begun transitioning their business models for this new opportunity by reinventing themselves, focusing on the user experience rather than server monitoring, and have learned how to upsell services in the era of cloud and mobility." 



Marketing Your IT Business? Use LinkedIn And Facebook

Business Solutions, , Bernadette Wilson

You can also connect with prospects through LinkedIn Groups — the site has numerous groups related many IT verticals and niche markets. By joining, you can DM (direct message) your fellow group members — including people who are not first connections. 

10 Types of Content and How to Use Them

SMB Nation Blog, , Tim Kelsey


Grab Bag MSP

Vertically-Focused IT Resellers Achieve Financial Success

SMB Nation Blog, , Astro Brelsford

"With improved enforcement of privacy laws and potential penalties for non-compliance, many vertical markets such as dental, healthcare, and the legal industries are seeking an easy to manage solution for the backup of both physical and virtual environments."

Autotask: Everyone Has an Opinion

SMB Nation Blog, , Harry Brelsford,  

Lead With BDR, Follow With Managed Services

Business Solutions, , Jay McCall, 

"After winning a backup and disaster recovery (BDR) implementation, an MSP changes its hotel client’s break-fix mentality and earns a 3x upsell with monthly recurring revenue." 

How to reinstall Windows 8 without losing your files and programs

ExtremeTech, , Tim Verry,   

How to Turn Customer Service Into a Profit Center

CIO Online, , David Taber

"Even when a customer isn't facing a crisis, customer service reps make extremely effective spies: Customers happily confide in them, as sales-driven pushiness doesn't scare off openness. On every call and email, reps should gather information to fuel an upsell cycle, even if somebody else completes the cycle."

IT hiring rises where it counts

Computerworld, , Patrick Thibodeau,  


Curious about the cloud and how it's driving today's managed IT services industry?

 Cutting-Through-the-Fog [eBook]


Meet Mary! Mary McCoy is a Senior Demand Generation Programs Manager at Continuum, where she's worked for over two years. Mary has consulted with hundreds of partners, lending website, blog and social media support. Before that, she graduated from the University of Virginia (Wahoowa!) with a BA in Economics and served as digital marketing intern for Citi Performing Arts Center (Citi Center), spearheading the nonprofit’s #GivingTuesday social media campaign. Like her school’s founder, Thomas Jefferson, Mary believes learning never ends. She considers herself a passionate, lifelong student of content creation and inbound marketing.

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus