June is here, and so is your weekly dose of snackable MSP headlines! Have you been keeping up? Did you miss anything? No worries. We've got your back! Without further ado, may we present your MSP weekly digest...
Continuum's Must-Read Blog Post This Week
As a managed IT services provider (MSP) your goal is to build strong, long-term relationships with your clients. This relationship is usually defined by the quality of your work and the value you are delivering to the client. A great way to demonstrate this value is to perform Quarterly Business Reviews (QBRs). These are an important component of your service offering and help set you apart as an elite MSP partner, rather than just a vendor. Read more »
M.A. Polce Consulting Blog, @mapolce, Jessica Katz
"What this botnet does is completely compromise your computer, and then use it to create other bots just like it, kind of like a zombie horde. These bots can send spam, steal sensitive information, and even execute distributed denial-of-service attacks, which can have the annoying effect of preventing the end-user from accessing their own computer. The malware spreads by users clicking on infected websites and emails, asking them to view their bank statement."
Malware Creation Breaks All Records in First Quarter of 2014, with 160,000 New Samples Every Day, According to PandaLabs Quarterly Report
IT Business Net, @ITBusinessNet
"Panda Security, The Cloud Security Company, has announced the latest findings of the PandaLabs Quarterly Report for Q1 2014. The main conclusions of the study include the fact that malware creation has broken all records during this period, with 15+ million new samples overall, and more than 160,000 new samples appearing every day."
Forbes, @Forbes, Rebecca Scorzato
Hey You! Get on My Cloud!
ZD Net, @ZDNet
"In a detailed 50-page report, Gartner heaped praise on AWS, highlighting its diverse customer base, aggressive pricing strategy, and the broadest range of use-cases, including enterprise and mission-critical applications."
Dynadot, @Dynadot, Justin Narayan
IT Security Expert Blog, @SecurityExpert
"The rise of cloud computing is undeniable and unstoppable, information security professionals have to accept resistance to cloud is futile. The Cisco 2014 Annual Security Report, projects cloud network traffic will grow more than threefold by 2017, with businesses executives eyeing up cloud as the silver bullet in eliminating expensive IT hardware."
Secure on Your IT Security?
Navigation Arts, @NavigationArts, Christina Phillips
FierceHealthIT, @FierceHealthIT, Susan D. Hall
"The massive data breaches at Target and eBay could be a taste of what's in store for the healthcare industry, according to a report from security rating firm BitSight Technology."
ITProPortal, @ITProPortal, Edward Jones
TechRepublic, @TechRepublic, Frank Ohlhorst
"Avoiding security disasters often means knowing what your risks are to begin with - a process that is often referred to as risk management. However risk management doesn't come without some risks of its own."
Kaspersky Lab, @kaspersky, Brian Donohue
FYI - BYOD & MDM
PC Magazine, @PCMagz, Fahmida Y. Rashid, @zdFYRashid
"The small business has to figure out how to address the myriad security concerns accompanying these mobile devices with a small—or non-existent—IT staff and limited budget. Greater mobility means correspondingly higher risks for data theft and leakage, especially if the device is lost or stolen. A compromised device can also act as a backdoor to the corporate network."
Redmond Magazine, @RedmondIT, Kurt Mackie
Smart Data Collective, @SmartDataCo
"Most companies that have a BYOD policy in place need an MDM solution to keep threats of security attacks such as keyloggers, phishers, Trojans and malicious apps at bay. MDM also helps establish protocols regarding personal devices in the workplace. These include guidelines for acceptable use, how to avoid dangerous activities and understanding dangerous applications."
BYOD Costs Can Be Hidden
Midsize Insider, @MidsizeInsider, Shawn Drew
"Instead of waiting for a disaster to strike, ask data and backup disaster recovery (BDR) customers from the start for any essential information needed at the time of an emergency -- always be prepared."
By Richard Harber
By Gretchen Hoffman
By Gretchen Hoffman