MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Managed IT Services Weekly Recap: May 19th

Posted May 24, 2014by Mary McCoy

weekly_recap_blog-may19-23[1]Kick off Memorial Day weekend with a full week of channel news and blog posts! This week, we're talking all the latest MSP headlines. Are you in the know? Think we missed a buzzworthy story? Send us the article link in the comment section below! Without further ado, may we present your MSP weekly digest... 

 

 

 

 

Continuum's Must-Read Blog Post This Week

Profitability KPIs You Should be Tracking

profitability-KPIs-you-should-be-tracking-1

In today’s increasingly-digital business landscape, everything is measurable. Whether it’s the ROI of a given marketing initiative, the effectiveness of an entire sales department, or an average cost of new customer acquisition, one thing is clear: businesses with a strong analytics program in place have a significant advantage over those that don’t.  Read more »


Viruses:

eBay hit with massive security breach, asks all users to change passwords

The Verge, @verge, Russell Brandom, @russellbrandom

"The breach compromised a database containing a list of encrypted passwords that, once released in the wild, could potentially be decrypted through publicly available tools."

Ransomware Today

HackSurfer, , Gwen Harkness,   

Ancient 'STONED' Virus Signatures found in Bitcoin Blockchain

The Hacker News, @TheHackersNews, Wang Wei

 

Industry Power Players

Cisco continues its push towards SaaS-based security services

ComputerWeekly, @ComputerWeekly, Caroline Baldwin

“The traditional approach to security was from product perspective,” he said. “But security is far more than products and technologies, it requires the right set of people, analytics and capabilities.”

Google buys enterprise BYOD startup Divide

ZDNet, @ZDNet, Rachel King, @rachelking 

Who Might Buy Rackspace? It's a Big List

Bloomberg Businessweek, @BW, Nick Summers, @nicksummers 

Windows XP's U.S. farewell tour to last most of '14

Computerworld, @Computerworld, Gregg Keizer, @gkeizer 


Key Studies & Findings:

Spiceworks: MSP's Price, Reputation Are Key Factors for IT Executives

MSPmentor, @mspmentor, Dan Kobialka, @dkobialka 

Forrester: 'Shadow IT' Cannot Be Ignored

Talkin' Cloud, @talkin_cloud, Dan Kobialka, @dkobialka 

"Forrester noted 43 percent of respondents said they believed shadow IT practices were major threats to their respective organizations. In addition, 46 percent of respondents said they believed SaaS providers make unrealistic or overstated claims."

SunGard identifies managed services adoption trends

Automated Trader, @automatedtrader


A Number's Game:

10 Technologies That Are Revolutionizing Healthcare IT [Slideshare]

Vala Afshar,   

21 Content Curation Tools

WebMarketingToday, @WebMarketToday, Kunle Campbell, @KunleTCampbell 

5 Levels of Mobile Security

Before It's News, @beforeitsnews

"Each business should assess their own response and preparation for mobile security while also considering the level of security required for their specific needs. Some organizations like healthcare and financial require a higher level of security due to the sensitivity of information exchanged and the regulatory compliance requirements."


In the workplace:

Change your company culture and get onto the cloud

InfoWorld, @infoworld, David Linthicum, @DavidLinthicum 

"Today, cloud computing has real momentum. Projects are beginning to ramp up, despite opposition around the use of public cloud resources. However, if a business pushes cloud computing onto an IT culture that simply won't have it, the project becomes so difficult that it is likely to fail."

Protect Your Bottom Line by Making Sure Your Business is Compliant

PCWorld, @pcworld, Charles Ripley

‘Rogue employees’ are the biggest threat to information security

Business Technology, @BizTechReport, Natasha Clark

"Employees don’t always have to be malicious to cause a security threat – many are unaware of the risks associated with their actions, and inadequate staff training could further increase this risk."

Message to IT: Lead the Charge in Creating the Workplace of the Future

TEC Communications, @TEC_Comm, Carl Wiese, @carl_wiese  

Building An Information Security Policy, Part 5: Managing Identities

Network Computing, @NetworkComputin, Natalie Timms, @angel_face444 

Disaster Communication for Small Business

Windows IT Pro, @WindowsITPro

 

Miss any news from the previous weeks?
View Past Recaps

Meet Mary! Mary McCoy is a Senior Demand Generation Programs Manager at Continuum, where she's worked for over two years. Mary has consulted with hundreds of partners, lending website, blog and social media support. Before that, she graduated from the University of Virginia (Wahoowa!) with a BA in Economics and served as digital marketing intern for Citi Performing Arts Center (Citi Center), spearheading the nonprofit’s #GivingTuesday social media campaign. Like her school’s founder, Thomas Jefferson, Mary believes learning never ends. She considers herself a passionate, lifelong student of content creation and inbound marketing.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus