MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe


Cybersecurity and Threat Management

6 Important OS Hardening Steps to Protect Your Clients


Featured Post

6 Important OS Hardening Steps to Protect Your Clients

In order to provide clients with peace of mind, safeguard their sensitive information and differentiate your security services from the competition, here are six ways to harden customers' operating systems.

Read Now

How to Address Top SMB Cyber Security Challenges

Posted by Lily Teplow on August 17, 2018

How to Address Top SMB Cyber Security Challenges

When it comes to cyber security, the threats themselves—ransomware, phishing, etc.—are nothing we haven’t seen before. What is new, though, is the scope and the increased threat to small- and medium-sized businesses (SMBs).

Most SMBs today have a false sense of confidence; they don’t see themselves as worthy targets and assume they have nothing of value to an attacker. However, this leaves hackers thinking: “all the better to eat you with, my dear.”

But why is it that SMBs aren’t properly protected against today’s threats? Why are they so hesitant to change their cyber security strategy? To answer these questions, we did a little research into SMB security trends. Read on to learn which challenges they face and how you can position your managed security services as the solution.

Read More

Topics: SMB Trends, Cybersecurity and Threat Management, Managed Security Services

PGA of America Servers Hacked as Part of Ransom Scheme

Posted by Lily Teplow on August 14, 2018

PGA of America Servers Hacked as Part of Ransom Scheme

In an increasingly dangerous era of cybercrime, hackers have now found a new target: major golf tournaments. On August 8, news broke about the latest hacking attack against the Professional Golfers Association (PGA) servers, locking files and demanding ransom just days before the competition took place.

As an MSP, hacking and ransomware are not new concepts. However, news headlines typically only cover enterprise-level attacks, now including the PGA of America. So, how can you bring a major news story like this down to your SMB clients’ level?

In this post, we’ll take a closer look at the PGA server hack and how you can use this story to bring awareness to the need for your managed security services.

Read More

Topics: Industry News, Cybersecurity and Threat Management, Managed Security Services

How to Break Bad IT Security Habits

Posted by Meaghan Moraes on August 7, 2018

How to Break Bad IT Security Habits

It seems like there’s always that one employee who’s not only careless when it comes to IT security, but also resistant to changing their habits—that inevitable hole in your systems that could easily crash your business. As an IT provider offering managed security, you have quite the undertaking to assume the responsibility of minimizing human error and strengthening your clients’ security posture. The question is, what does it take to break the bad security habits that have been embedded in countless SMBs?

Read More

Topics: Cybersecurity and Threat Management, Security Awareness Training

5-Step Strategy for Selling Cybersecurity to SMBs

Posted by Aaron Branson on August 3, 2018

5-Step Strategy for Selling Cybersecurity to SMBs

How do you successfully sell cybersecurity to small-to- medium sized businesses (SMBs)? First, try saying that five times fast! If you’re a managed IT services provider (MSP) looking to grow revenue through managed security, you’ve come to the right place.

 

Read More

Topics: Sales and Marketing, Managed Security Services, Cyber Security

Ask the Experts: How Do I Sell Managed Security Services?

Posted by Lily Teplow on August 2, 2018

Ask the Experts: How Do I Sell Managed Security Services?

Did you know that almost 70 percent of organizations don’t believe their basic security software can block today’s cyber threats? What’s more, nearly half of the security risk that organizations face stems from having multiple security vendors and products. But what does this mean for you, the MSP?

There’s a ripe opportunity with managed security services. Adding security to your portfolio will not only allow you to better protect your clients, but also step in as their all-inclusive IT and security provider. So, how can you get there?

I’ve asked a couple of experts to share their advice and help answer the question that’s crossing every MSP’s mind: how do I sell managed security services?

Read More

Topics: Sales and Marketing, Managed Security Services

A Quick Guide to Incident Response Planning

Posted by Lily Teplow on August 1, 2018

A Quick Guide to Incident Response Planning

Given today’s security landscape, it’s more important than ever that businesses have a plan in place to respond to major cyber threats. These threats are becoming more and more sophisticated, leaving businesses less and less equipped to handle them. To even stand a chance against a security incident, your clients need an incident response plan—and it’s your job as an MSP to help them solidify this plan.

 

Read More

Topics: Data Protection, Cybersecurity and Threat Management, Incident Response

Redefining Cyber Security: Win SMB Clients with The Right Message

Posted by Meaghan Moraes on July 26, 2018

Redefining Cyber Security: Win SMB Clients with The Right Message

Your clients are the main target of today’s ever-evolving cyber attacks, so why isn’t selling managed security services easier? To effectively market and sell your cyber security offering, you have to change the SMB mindset with the right positioning strategies.

In our recent webinar, Redefining Cyber Security: Win SMB Clients with The Right Message, we walked through cyber security go-to-market tips for MSPs as well as security conversation talking points to ensure SMB clients are on board. Here is a recap of the key takeaways you can leverage in your business.

Read More

Topics: Webinar Highlights, Cybersecurity and Threat Management, Managed Security Services

Preparing Your MSP for Security: Tips from an Expert

Posted by Brandon Garcin on July 24, 2018

Preparing Your MSP for Security: Tips from an Expert

On a recent episode of MSP Radio, Joe and I sat down with Brian Downey, Senior Director of Product Management at Continuum, and mastermind about all things cyber security. Following the news of our acquisition of CARVIR and adding a suite of products to Continuum Security, Brian joined us to talk more about the security space and how MSPs can take advantage of the emerging cyber security category.

Keep reading for our key takeaways and tidbits of advice from Brian, and listen to the full episode below!

Read More

Topics: Cybersecurity and Threat Management, Podcast, Managed Security Services, Continuum Security

How Are SMBs Using the Cloud in 2018? [CHART]

Posted by Lily Teplow on July 20, 2018

How Are SMBs Using the Cloud in 2018? [CHART]

This year has ushered in many technological changes, most notably in the small- and medium-sized business (SMB) landscape. Your SMB clients are becoming more aware of how integral technology is to business success, leading to the adoption of things like mobile and cloud solutions. Given its ability to address both operational costs and budget constraints, it’s no surprise that the cloud is a top IT priority for SMBs. Cloud levels the playing field, providing a route to enterprise-grade applications, storage and computing infrastructure without the need to purchase and maintain on-premise hardware.

But how exactly are your clients and prospects utilizing the cloud, if at all? What are some of their top concerns and how can you convince them to partner with you for guidance with their cloud—and overall IT—strategy?

Read More

Topics: Cloud Computing, SMB Trends, MSP Sales Chart

Explaining Cyber Security to Your Clients

Posted by Meaghan Moraes on July 18, 2018

Explaining-Cyber-Security-to-Your-Clients

How do you explain to your SMB clients that their concept of cyber security is as relevant as yesterday’s breach news story? Would they believe you? Or worse, would they leave you? 

Think of your goals while considering theirs. Your eyes are on the prize; you’re emerging as a credible cyber security leader and expanding your managed services portfolio to include an advanced security offering. The managed security services market is projected to be worth $47.65 billion USD by 2023, after all.

Meanwhile, those SMBs that could benefit greatly from your security services typically assume that they’re already sufficiently protected from cyber threats with foundational tools. While they know that the modern security landscape—with threats advancing relentlessly—puts their businesses at risk, they have not yet bought into the urgency for a redefinition of cyber security in the context of their business future. Your client’s goal is to withstand cyber attacks and scale profitability—but they will not grasp that your managed security services are the bridge that can get them there unless that’s effectively conveyed.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

The SMB vs. Today’s Security Landscape: Connecting the Dots

Posted by Lily Teplow on July 11, 2018

The SMB vs. Today’s Security Landscape: Connecting the Dots

Over the past few years, IT news headlines have been dominated by cyber security—its latest hacks, threats and defensive advancements. However, with all of this attention given to the enormous amounts of data stolen or the enterprise-level costs, it becomes difficult for the need for security services to resonate with your SMB customers.

While the stakes are at an all-time high for virtually every business, MSPs are challenged with changing this perception of “impending doom” and educating SMBs on the real threats to their business. Keep reading to discover how you can bring the evolving security landscape down to the SMB level and convince these businesses of the value of your managed security services.

Read More

Topics: SMB Trends, Cybersecurity and Threat Management, Managed Security Services

5 Steps to Take After a Ransomware Infection

Posted by Hunter Smith on July 5, 2018

5 Steps to Take After a Ransomware Infection

As a managed IT services provider, it is vital that you do everything you can to prevent your clients’ machines from getting infected with any malicious software. Letting them know that they can take some simple precautions—like having adequate security software (antivirus and anti-malware) installed on their computer, applying OS security patches, not clicking on suspicious email links they don't recognize and not opening unexpected email attachments—can be game-changing for your role as their MSSP, security partner and advisor.

The five following tips will ensure you’re able to effectively communicate to your clients how to deal with ransomware and keep them as best protected as possible with your MSSP services.

Read More

Topics: Information Security, Cybersecurity and Threat Management

5 Sales Strategies to Win Over Your SMB Clients

Posted by Lily Teplow on July 3, 2018

5 Sales Strategies to Win Over Your SMB Clients

Like most MSPs, your target market falls into the small and medium-sized business (SMB) category—which is where most of today’s businesses in the U.S. fall. And, like any other business, SMBs need assistance in managing and maintaining their IT environments. Managed IT services can provide the proactive maintenance, enhanced security and technical expertise they seek, but how can you convince them to choose you in their search to find the right IT provider?

The key is to win over their technological hearts and minds. To do so, though, you must be intimately aware of how they prefer to be sold to. If you apply the following strategies to your sales efforts, you’ll easily find success with your SMB clients and prospects.

Read More

Topics: Sales and Marketing, SMB Trends, Lead Generation

9 Cyber Security Resources Every MSSP Should Be Reading

Posted by Meaghan Moraes on June 29, 2018

9 Cyber Security Resources Every MSSP Should Be Reading

As an IT service provider offering managed security services, it’s critical that you’re staying up-to-date on the latest cyber security trends and advancements. With the latest cyber security information, education and conversation at your fingertips, you’ll be well positioned to stay ahead of the curve on latest threats and keep your clients protected.

For your convenience, we’ve compiled key third-party resources, including blogs, publications and other educational resources, as well as a detailed cyber security glossary. Check out our list below to brush up on your security knowledge!

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

Seizing the IT Security Opportunity with Continuum Security

Posted by Lily Teplow on June 27, 2018

Seizing the IT Security Opportunity with Continuum Security

“I need more skilled people for our security team.” Over the past year and a half, this sentence has been uttered countless times from IT service providers across the globe. Cyber security has grown to become a major global issue—with hackers and sophisticated threats capitalizing on the fact that there’s a clear shortage of security talent today. With virtually every aspect of your clients’ personal and professional information at risk, it’s your job to keep them protected. To do so, you need an advanced security solution that can hold up to the test. 

Continuum Security provides the complete framework that MSPs require to effectively deliver cyber security services to their customers—and with our acquisition of security leader CARVIR, we have three exciting products that MSPs and MSSPs can begin leveraging immediately. In a recent webinar, Continuum CEO Michael George was joined by Continuum Senior Director of Product Management Brian Downey and CARVIR CEO Jay Ryerse to discuss the opportunities MSPs have in the security space and how to achieve success with Continuum Security. In this post, we'll take a look at some of the key takeaways so you can understand exactly what your SMB customers are demanding and how you can deliver.

Read More

Topics: Cybersecurity and Threat Management, Continuum Security

The Steep Cost of Poor IT Security [CHART]

Posted by Lily Teplow on June 22, 2018

The-Steep-Cost-of-Poor-IT-Security

Did you know that the average total cost of a successful cyber attack is over $5 million? Yup, you read that right—actually, $5,010,600 to be exact. Cyber security is not only getting more difficult for businesses to manage, it’s getting much more expensive. This is especially true when it comes to your small- and medium-sized business (SMB) clientele. Most SMBs lack the tools and talent needed to protect themselves from the evolving cyber landscape, making them easy targets and more likely to fall victim to an attack with disastrous financial consequences.

But what exactly is factored into the number above that makes it so high? In the chart below, we’ve gathered data from a Ponemon Institute report to outline the various costs associated with a successful cyber attack and what SMBs could be risking. Use this chart—in conjunction with the provided talking points—in your next sales meeting with clients or prospects to demonstrate just how vital it is to invest in your IT security solution.

Read More

Topics: Cybersecurity and Threat Management, MSP Sales Chart

Webroot’s 2018 Cyber Security Threat Report: 5 Findings to Keep with You in the Year Ahead

Posted by George Anderson on June 21, 2018

Webroot’s 2018 Cyber Security Threat Report: 5 Findings to Keep with You in the Year Ahead

Each year, a team of Webroot analysts and threat researchers take a look back at some of the most salient cyber threat trends to emerge over the previous year. With more than 40 million licensed endpoints and a threat intelligence platform capable of integrating information from billions of URLs, domains, IP addresses, files, and mobile apps, Webroot has the capacity to dive deep into the real-world threat landscape.

Here are five clear trends we saw emerge over the course of 2017.

Read More

Topics: Information Security, Cybersecurity and Threat Management

Transforming Managed Security: How to Offer Proactive, Detective and Responsive Security

Posted by Meaghan Moraes on June 19, 2018

Transforming-Managed-Security--How-to-Offer-Proactive,-Detective-and-Responsive-Security

Today, one in three security professionals lack the intelligence required to effectively detect and respond to cyber threats, according to a survey from Anomali. Where does this leave businesses, especially small-to-medium-sized businesses (SMBs) that are now the prime targets of cyber attacks? The reality is dire. In fact, 60 percent of SMBs go out of business within six months of a breach.

With advanced threats like hyper-targeted malware and ransomware, foundational security tools aren’t enough to keep SMB clients secure. Small businesses generally assume they are already protected from phishing, ransomware and insider threats, having historically secured their data firewalls, antivirus applications, or two-factor authentication. Those foundational security tools and policies are still required—but due to the modern threat landscape, additional layers of security need to be added into the equation to provide more complete and holistic protection.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services, Continuum Security

Painting a Picture for Better IT Security

Posted by Brian Downey on June 18, 2018

Painting a Picture for Better IT Security

For many of those brought up in a certain time, you will remember a painter on TV named Bob Ross. Bob Ross went viral before the internet and social media made going viral a thing. His soothing voice, well-maintained hairstyle and ability to casually add “little trees” to a canvas that would somehow come out at the end of his half hour show as a true work of art—it was mesmerizing. When I watched, I was always impressed by how he used all the tools he had at his disposal, whether it be brushes or sponges, to get the desired effect.

Now when it comes to painting, I’m no Bob Ross—in fact even finger-painting pushes my artistic limits. Because of this, I never had an appreciation for the tools of the trade. I never fully appreciated the need for the dozens of different brushes or sponges that Bob Ross was using, but I appreciated the result he was able to deliver with them.

While interesting, Bob Ross doesn’t seem to have much to do with cyber securitybut the two are actually more similar than you might expect.

Read More

Topics: Managed Security Services, Continuum Security

Enhancing Your Cyber Security Offering With Continuum Security

Posted by Brian Downey on June 15, 2018

Enhance-Your-Security-Offering-with-Continuum-Security

IT service providers are doing business in a world where they’re struggling to protect their clients who are constantly under fire from cyber threats. The nature and sophistication of today’s attacks are forcing MSPs to deliver security in a completely different way than they’ve approached RMM and BDR. Simply put: without the right protection and preventative measures in place, clients won’t stand a chance in the ever-changing threat landscape.

To combat this challenge, Continuum made an exciting announcement yesterday—we’ve acquired CARVIR to expand our security portfolio, enabling MSPs to offer enhanced security to clients. Today, I’d like to take a deeper dive into the three core products that make up the Continuum Security portfolio.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services, Continuum Security

Continuum Acquires Managed Security Leader CARVIR, Bringing New Security Products to All MSPs

Posted by Brian Downey on June 14, 2018

Introducing Continuum Security

Security is the single greatest threat to businesses today, yet the greatest opportunity for IT service providers. Therefore, we are excited to announce the expansion of Continuum Security, the advanced cyber security solution MSPs need to deliver the protections their clients demand, through the acquisition of CARVIR, a leader in monitored and managed security for the IT channel.

With this acquisition, we are able to expand our security portfolio and bring new capabilities to market, helping you meet the mounting security and compliance needs of your SMB clients. Keep reading to learn more about the acquisition and which exciting new features are available to you today.

Read More

Topics: Industry News, Managed Security Services, Continuum Security

BIG Announcement Tomorrow at 12:00pm EST

Posted by Lily Teplow on June 13, 2018

Something Big is Coming

 

Continuum will be making a BIG announcement on June 14, 2018 at 12:00pm EST. Mark your calendars, you’re going to want to hear this.

Read More

Topics: Industry News

10 Discovery Questions MSPs Should Be Asking Prospects and Clients

Posted by Lily Teplow on June 12, 2018

10 Discovery Questions MSPs Should Be Asking Prospects and Clients

To increase your chances of closing a deal, you need to understand the customer and their specific needs. Why might they be seeking help from a managed services provider? What problems are they trying to solve? What challenges are they facing? How can your IT services help overcome these challenges?

While no prospect wants to be ambushed with non-stop questions, well-crafted inquiries can make all the difference when it comes to winning new business. If you have prospects or clients willing to engage in a dialogue with you, use these key questions to gain a better understanding of their needs and accurately prescribe your services.

Read More

Topics: Sales and Marketing, Managed Security Services

The Worst Passwords You Could Possibly Use Are…

Posted by Lily Teplow on June 7, 2018

The Worst Passwords You Could Possibly Use Are

You tell your clients all the time about good password policies. You tell your friends and family. You may be able to rattle off in your sleep “unique, long strings of varied characters with multiple numbers, capitals, and special characters.” But just how many people are heeding the call for better security? Has the public started taking cyber security seriously?

Read More

Topics: Data Protection, Information Security

7 Vulnerabilities You Didn’t Know Existed in Your System Configuration

Posted by Lily Teplow on June 1, 2018

Today's businesses are hyper-focused on ensuring their IT environments are secure and protected from cyber threats. However, with all the attention being given to the front lines of defense, what happens if you leave the back door open to hackers and intruders?

Configuration errors, lack of IT controls, un-secure internal processes—these are all examples of vulnerabilities that could lead to security breach and major data loss. To decrease the chances of a successful breach, organizations can take simple countermeasures, such as working with an MSP to tighten IT security. But first, look out for these seven basic avenues that might be open to cyber criminals. 

Read More

Topics: Information Security, Cybersecurity and Threat Management

The Top 5 MSP Blog Posts of May 2018

Posted by Lily Teplow on May 31, 2018

May-2018-MSPblog-Roundup

As the saying goes, April showers bring May flowers. But what does May bring? In our case, it brought another month filled with valuable, business-driving content on the blog! This month’s roundup covers a range of topics including sales and marketing best practices, the benefits of live product demos, the FBI's recent cyber attack warning and more. 

Read on to discover the top five blog articles our readers couldn’t get enough of this month, with special bonus content at the end!

Read More

Topics: Sales and Marketing, Cybersecurity and Threat Management, Service Level Agreement

FBI Issues Cyber Attack Warning to US Businesses

Posted by Brian Downey on May 25, 2018

FBI-Issues-Cyber-Attack-Warning-to-US-Businesses

On Friday, the FBI issued a formal warning about a cyber attack that has the potential to compromise hundreds of thousands of home and small office routers worldwide.

As an MSP servicing small- and medium-sized businesses, your clients could be affected. This post will cover what MSPs need to know about this cyber attack warning, as well as how you should handle the issue with your clients.

Read More

Topics: Industry News, Cybersecurity and Threat Management

Watch Out for This Royal Wedding Scam

Posted by Lily Teplow on May 25, 2018

Watch Out for This Royal Wedding Scam

Ever since Prince Harry and Meghan Markle tied the knot last Saturday, my news feed has been flooded with Royal Wedding coverage, updates, opinion articles and quizzes. In fact, one of the quizzes I came across the other day was titled, “What’s Your Royal Guest Name?”

Seemingly innocent, this quiz provides you with “your new royal identity,” and has since swept the Internet. But, what makes this quiz so cleverly dangerous is that unbeknownst to those who are participating, their answers could help scammers get their hands on some sensitive data.

While it’s likely that you and your clients may not be taking quizzes like these (or maybe you are, I don’t judge), it’s yet another example of the power of social engineering and how easily people can be duped into divulging personal information. In this post, I’ll cover how this scam works and what you and your clients should look out for.

Read More

Topics: Industry News, Information Security

Thank You for Being Part of Our Award-Winning Blog

Posted by Lily Teplow on May 24, 2018

Thank You for Being Part of Our Award-Winning Blog

Today we are proud to announce that the MSPblog is a Gold Winner of the 2018 Hermes Creative Awards in the Blog Overall category! The Hermes Awards recognizes professional excellence in media conceptualization, writing, and design. With more than 6,000 entries from around the world in this year’s competition, the MSPblog is honored to have won a Gold Award. This achievement simply couldn’t have been possible without you, our valued readers and subscribers.

As a thank you, I’ve compiled some of my favorite blogging tips in hopes that it inspires you to create your own successful and award-winning blog.

Read More

Topics: Industry News, Blogging

5 Tips for MSPs Selling Security Awareness Training

Posted by George Anderson on May 22, 2018

5 Tips for MSPs Selling Security Awareness Training

In the past year, global ransomware debilitated entire sectors of some countries’ economies. Equifax was breached, exposing more than 140 million records. Yahoo owned up to losing control of 3 million users’ data. So, it’s no surprise that the cost of cybercrime has steadily risen each year for the past two years, to an average cost of $11.7 million per business.

According to the research firm Gartner, untrained users click 90 percent of links within emails from addresses outside the enterprise, resulting in 10,000 malware infections. By their calculations, the infections led to an overall productivity loss of 15,000 hours per year, which, at a cost of 15,000 times $85 (average wage), equals $1,275,000 in losses.  Verizon's annual Data Breach Investigation Report backs up Gartner's findings, pinning 90 percent of successful network breaches on users taking the bait in phishing attacks. 

But cybercrime and its associated costs can be reduced when end users are trained to be their employers’ first line of defense. Security awareness training results in reduced risk, businesses that are better protected against breaches, and more profitable MSPs.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Security Awareness Training

Which Vertical Has the Highest Cost of Security? [CHART]

Posted by Lily Teplow on May 18, 2018

Which Vertical Has the Highest Cost of Security?

Today, cyber security is seen as a horizontal practice that’s typically the same across all industries. No matter the vertical, businesses need things like firewalls, DNS, endpoint protection, antivirus and the like. However, this line starts to blur once you bring in various regulations and compliance.

What’s more, the industries that have special security policies and compliance standards in place are finding that they’re increasingly the target of cyber attacks. It seems as though to cyber criminals the harder the information to steal, the higher the price tag. This presents an opportunity for IT service providers to step in and help these vertically-specialized companies in bolstering their cyber defenses with managed IT and security services. So, how can you convince them?

Read More

Topics: Cybersecurity and Threat Management, MSP Sales Chart, Vertical Alignment

Breaking Down the Major Cyber Attack Methods Tricking MSPs

Posted by Meaghan Moraes on May 15, 2018

Breaking-Down-the-Major-Cyber-Attack-Methods-Tricking-MSPs

Every person in IT—really every person in business today—is hyper-aware of their risk of getting breached. It’s real, especially for small-to-medium-sized businesses that lack the advanced security tools and expertise needed to remain afloat. Hackers are relentless and lurking everywhere, and MSPs are ultimately responsible for their entry, and the resulting damage, to their clients’ networks.

In order to detect suspicious activity faster and minimize as much harm as possible, it’s crucial that you understand the methods employed by cyber criminals. MSPs offering cyber security services will benefit from the following breakdown, which details the most common cyber attack tactics, key warning signs and tips to remain protected.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

The Basics of Cyber Security Training for End-Users

Posted by Lily Teplow on May 10, 2018

The Basics of Cyber Security Training for End-Users

What’s the biggest risk to an organization’s information security? Hint: it has little to do with the technology. Rather, it is the action—or inaction—of their employees.

Human error has become a major weak point today; one that is easily exploited by cyber criminals. In fact, almost 90 percent of cyber attacks are caused by human error or behavior. Therefore, it’s vital that businesses have some form of cyber security training in place to educate employees on the importance of protecting sensitive information and what malicious threats to look out for.

As an IT services provider committed to protecting your clients and their business, the task of security education and training falls into your hands. Keep reading to discover which essential elements you should cover when providing security awareness training.

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Cyber Security Expertise: Demand Outweighs Supply

Posted by Britany DiCicco on May 8, 2018

Cyber-Security-Expertise-Demand-Outweighs-Supply

In a world of increasing data breaches and security threats, the need for talented cyber security professionals has never been more essential. However, many companies—and those who are responsible for protecting them—are quickly realizing that finding these tech-savvy and qualified candidates is a bigger challenge than they initially thought.

What does this cyber security skills gap mean for the businesses you serve, and for you as an IT service provider? Keep reading to explore more.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

20 Statistics to Help MSPs Sell Managed IT Services in 2018

Posted by Lily Teplow on May 2, 2018

20 Statistics to Help MSPs Sell Managed IT Services in 2017.png

Why should businesses leverage your managed IT services this year? When you’re making your sales pitch to clients and prospects, this is the question you need to answer to differentiate yourself from your competition. Sure, you have your value prop down and you’ve memorized your talking points to a tee, but what else can you use to convince clients and prospects of your MSP value?

They say that numbers speak louder than words, so here are a few numbers that we think speak volumes. It’s clear that the need for managed IT services isn’t going anywhere, but to help make your case, here are 20 statistics you can use to prove why businesses should partner with you.

Read More

Topics: Sales and Marketing, Backup and Disaster Recovery, SMB Trends, Cybersecurity and Threat Management

5 Core Components to a Cyber Security Offering

Posted by Chris Johnson on May 1, 2018

5 Core Components to a Cyber Security Offering

My career path has shifted in recent months, from running my own managed services company to jumping into the security space as a managed security services provider (MSSP). During this time, I’ve come to learn which tools are needed for the job and how to best utilize them to define a cyber security offering. 

The tools and resources an IT security provider leverages should be tied to both securing your business and protecting your clients, which means selecting the right ones is extremely important. For any foundational security offering, I’ve found that the following five tools and components are most essential to thriving, and surviving, in this market.

Read More

Topics: Data Protection, Cybersecurity and Threat Management

The Top 5 MSP Blog Posts of April 2018

Posted by Lily Teplow on April 27, 2018

Monthly-Blog-Roundup-April-2018

The month of April brought us many things: the start of baseball season, the oncoming of warmer weather (for most of us), and yet another 30 days filled with valuable, business-driving content on the blog! MSP sales and marketing seems to be the theme of this month’s roundup. Our most popular posts cover topics such as the keys to success in managed IT services, how to generate more leads, how to better prepare for sales conversations, and much more.

Read on to discover the top five blog articles our readers couldn’t get enough of this month, with special bonus content at the end of this post!

Read More

Topics: Business Development and Growth, Sales and Marketing, Data Protection, Blogging

Explaining the Cloud to End Users: 4 Things to Cover

Posted by Joseph Tavano on April 24, 2018

Explaining the Cloud to End Users: 4 Things to Remember

While cloud integration is virtually ubiquitous in modern computing, it is often misunderstood or misinterpreted outside of the IT industry. Outside of the sphere of tech insiders, where acronyms, jargon and abstract product names are commonplace, the idea of “The Cloud” can be shrouded in mystery from years of pop-culture confusion and misuse in fiction.

Read More

Topics: Data Protection, Cloud Computing

Phishing Scams: What You Need to Know to Avoid Them

Posted by Hunter Smith on April 11, 2018

Phishing-Scams-and-How-to-Avoid-Them

As a managed IT services provider (MSP), there are a myriad of security threats that you and your clients face today. One threat that constantly comes up is phishing scams. These scams can be fairly simple, yet very effective at duping the user and capturing their private information. Even the slightest clue to a username and/or password can give hackers all they need to break into private systems and steal information from companies and individuals—and for this reason, it’s crucial to be aware of phishing schemes, tactics and best practices for avoidance.

Read More

Topics: Tech Quick Tips, Data Protection, Information Security, Cybersecurity and Threat Management

Top 3 BDR Posts for World Backup Day 2018

Posted by Lily Teplow on March 30, 2018

Top 3 BDR Posts for World Backup Day 2018

What would you do if you lost everything? This is exactly the question that World Backup Day prompts you to consider when you land on their awareness website. Data is such a business driver today, but one small accident or failure could cause productivity and profit to come to a complete halt. For MSPs, an essential first step in building a successful business continuity plan for your clients is helping them recognize the need for backup and disaster recovery (BDR)—and what better day to start than the day before World Backup Day?

Read More

Topics: Industry News, Data Protection, Backup and Disaster Recovery

What to Do with All of That Data: Retention Best Practices

Posted by Lily Teplow on March 22, 2018

What to Do with All of That Data: Retention Best Practices

Data and corporate information are the lifeblood of your clients’ business—there’s no denying their importance. Today, organizations across all industries are tasked with ensuring that data is protected, retained, and accessible when needed, yet many lack the appropriate archiving and retention policies.

As an MSP, it’s your job to be your clients' strategic advisor and help them understand exactly what their retention requirements are for various business needs and data types. So, in honor of spring cleaning season, we’re providing you with best practices to help you tidy up your clients’ IT environment and implement retention policies for more secure, accessible data.

Read More

Topics: Data Protection, Backup and Disaster Recovery

Educating Prospects on IT Security: To Instill Fear or Not?

Posted by Chris Johnson on March 20, 2018

Educating Prospects on IT Security: To Instill Fear or Not?

In the cyber world, businesses are constantly being hammered with fear, uncertainty, and doubt (FUD)—with the hope that someone will come along and reassure them that it’ll all be OK. When selling security services, however, MSPs typically play on this FUD factor. We take advantage of the opportunity to “scare” prospects into buying IT security, yet in many cases, this approach may backfire.

The reason why I think this backfires boils down to one thing: the human condition. When we are threatened and backed into a corner, we tend to fight. And, when it comes to cyber security, our prospective clients are often so far backed into the corner that they begin to fight the wrong fight. To prevent this from happening, there are five key areas you need to focus on.

Read More

Topics: Sales and Marketing, Cybersecurity and Threat Management, Managed Security Services

6 Things You Should Never Leave On Your Desk at the Office: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on March 19, 2018

Six Things You Should Never Leave On Your Desk at the Office

There’s no denying the importance of having the right security software and tools in place to protect your customers—but what about physical workplace security? In this episode of The Weekly Byte, we outline six things you should never leave out on your desk at the office!

Read More

Topics: The Weekly Byte, Cybersecurity and Threat Management

How Dwell Time Can Impact Profitability [CHART]

Posted by Lily Teplow on March 16, 2018

How Dwell Time Can Impact Profitability

Did you know that the faster a cyber attack can be identified and contained, the lower the costs and damage? Dwell time, or the number of days a threat remains undetected within a given environment, can have significant impact on a company’s profitability. The more dwell time, the higher the rate of success for a cyber attack and the higher the costs associated with that attack. 

This is especially concerning for small- to medium-sized businesses (SMBs) who don’t have the proper cyber defenses in place to identify or contain today’s persistent threats—but partnering with an MSP or MSSP like you may be the answer. According to a study by Ponemon Institute, there’s a notable relationship between how quickly an organization can identify and contain a cyber threat, and the financial consequences. So, to help you sell clients and prospects on the value of IT security, we pulled compelling data from this study that you can use in your own sales presentations. See the chart below:

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services, MSP Sales Chart

The Journey to GDPR Compliance [PODCAST]

Posted by Brandon Garcin on March 7, 2018

The Journey to GDPR Compliance Podcast

If there’s one acronym we’ve heard time and time again this year, it’s GDPR. Standing for General Data Protection Regulation, GDPR is one of the more prominent discussion topics in our industry right now, and there’s a lot that both MSPs and vendors must do in order to show compliance when doing business with European citizens.

On this special podcast episode, we bring you a Q&A discussion between Paul Balkwell, Vice President of International Sales at Continuum, and Hunter Smith, Chief Information Security Officer at Continuum. Paul and Hunter discuss Continuum’s journey to GDPR compliance, provide a status update to our European partners and answer some frequently asked questions. Tune in now to learn more!

Read More

Topics: Industry News, Data Protection

8 Reasons Why Healthcare Providers Need Your MSP Expertise

Posted by Britany DiCicco on March 6, 2018

8 Reasons Why Healthcare Providers Need Your MSP Expertise

Through the eyes of a cyber criminal, a medical practice or a hospital is a gold mine with an abundance of patient information stored insecurely—just waiting to be hacked, confiscated, and either sold on the black market or held for ransom. Either way, cyber criminals can make a fortune from successfully hacking a healthcare organization—and because they are all too aware of this, the healthcare industry has become their primary target. 

A recent State of Privacy and Security Awareness Report surveyed over 1,000 medical professionals to better understand the cyber security awareness of healthcare sector employees. The key findings show just how poorly prepared the healthcare industry is to protect themselves against cyber criminals, and how much they could benefit from your MSP services.

Read More

Topics: Healthcare IT, Cybersecurity and Threat Management

The Best of MSP Blog Content: February 2018

Posted by Lily Teplow on March 1, 2018

Monthly-Blog-Roundup-Feb-18

Is it just me, or did February pass by in the blink of an eye? As we (quickly) approach the end of Q1, let’s take a look back at this past month’s top content that has helped our readers grow and scale their MSP business.

In this roundup, there’s a clear emphasis on cyber security—from testing your knowledge, to effectively selling it to customers and prospects. Also featured are helpful sales tips and confessions from a former technician. Keep reading to check out all five blog posts our readers couldn’t get enough of this February!

Read More

Topics: Sales and Marketing, Cybersecurity and Threat Management

Can You Spot the 6 Security Flaws in This Photo?

Posted by Lily Teplow on February 23, 2018

Can You Spot the 6 Security Flaws in This Photo?

As the cyber threat landscape continues to evolve, so too does the sophistication of cyber attacks. We’re all aware of the ongoing work that needs to be done to keep sensitive information safe from hackers and stay ahead of the threat landscape, but there’s another side to the coin, and that’s physical security.

Many offices don't enforce best practices for physical information security, and frankly may just not be aware of them. As their MSP, your job is to educate them on these best practices, both from a technology standpoint and from a physical standpoint.

So, it’s time to put your knowledge to the test. Can you find the six security flaws in this picture?

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Five Keys to Successful MSP Security Services: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on February 19, 2018

Five Keys to Successful MSP Security Services

There’s no denying that security services are more complex and nuanced than many other managed IT services—and in order to be successful as a security provider, there are a number of important factors and elements you’ll need to consider. In this episode of The Weekly Byte, we outline five of these and explain how you can drive success with each—tune in now to learn more!

Read More

Topics: Sales and Marketing, Information Security, The Weekly Byte, Managed Security Services

Cyber Security Myth: More Alerts Does NOT Mean More Security

Posted by Chris Johnson on February 16, 2018

Cyber Security Myth: More Alerts Does NOT Mean More Security

I recently had the unfortunate opportunity to deal with a piece of ransomware that has only been in circulation in its current form for a few weeks. It took less than an hour from the time it dropped its payload to the time it was caught, yet it still managed to tear through pretty much all the servers.

So you might be asking yourself, “why is Chris telling us all about this ransomware and the successful attack?” The reason is that no amount of blinking lights would have prevented this attack from happening. Could we have reduced the likelihood? Maybe. Could we have prevented it altogether? No. And the reason, at the end of the day, is because of people.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

Four Questions to Ask Prospects During Your Security Pitch: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on February 12, 2018

Four Questions to Ask Prospects During Your Security Pitch

Selling security can be tricky, especially during initial conversations where your prospects may not fully understand the importance of protecting their IT infrastructure. Fortunately, the right discovery questions can help you drive the conversation forward and uncover the right pain points to address via your service offerings. In this episode of The Weekly Byte, we outline four important questions to ask every prospect when selling security. Tune in now to learn more!

Read More

Topics: Sales and Marketing, Information Security, The Weekly Byte, Managed Security Services

The Financial Consequence of a Cyber Attack is Worsening [CHART]

Posted by Lily Teplow on February 9, 2018

The Financial Consequence of a Cyber Attack is Worsening [CHART]

Virtually every business today fears falling victim to cyber attack. This (rational) fear stems from not only the loss of productivity or sensitive information, but also for the financial burden it puts on the business—even well after the attack has been carried out. According to a study by Ponemon Institute and Accenture, the average annual number of security breaches increased almost 30 percent in 2017. But what financial consequences could these cyber security incidents have for your clients and prospects?

A better understanding of the cost of cyber crime could help SMB business owners bridge the gap between the escalating number threat actors and the investments they should make to secure their business. If you’re looking to effectively start the security conversation with prospective clients, here are some compelling statistics that speak to the immediate need for managed security services.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services, MSP Sales Chart

The Distinction Between MSP and MSSP [PODCAST]

Posted by Nate Teplow on February 7, 2018

The Distinction Between MSP and MSSP Podcast

A few years ago, we saw the industry make a significant transition from break/fix to what are now managed service providers (MSPs). Why? Because there was a need in the market for better, more robust IT services. Today, we’re seeing a similar trend—this time with cyber security.

The need for MSPs to bring security into their portfolios is very clear—and it’s a very significant shift. To talk more about how today’s market is converging toward security, we invited Joe Panettieri, Executive VP and Content Czar of ChannelE2E, on the latest episode of MSP Radio. Keep reading for Joe’s major takeaways on what defines an MSSP and how you can effectively bring new security services to market.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

5 Critical Cybersecurity Training Courses and Certifications

Posted by Meaghan Moraes on January 31, 2018

5-Critical-Cybersecurity-Training-Courses-and-Certifications.png

As an MSP, MSSP or IT service provider, you’re likely committed to effectively assessing vulnerabilities, securing networks and endpoints, and mitigating cybersecurity incidents in 2018. Of course, you know that the first line of defense against cyber threats in business is the employee, so ensuring that everyone in an organization is properly trained on security best practices is the vital first step. In fact, increased investment in employee training can reduce the risk of a cyber attack up to 70 percent, according to Wombat Security Technologies and the Aberdeen Group.

Both MSPs and their clients should be well versed in the latest cybersecurity developments and requirements—that’s why we’ve outlined five critical cybersecurity training courses and certifications built to ensure businesses are up-to-speed on security knowledge! Here are some key areas to consider.  

Read More

Topics: Information Security, Cybersecurity and Threat Management

The Future of the MSP: Expert Predictions for 2018

Posted by Lily Teplow on January 26, 2018

The Future of the MSP: Expert Predictions for 2018

By now, you’ve probably read plenty of predictions for the managed IT services industry in the new year. If not, here’s a brief summary: AI will take off, the cloud will become a big player for businesses, cyber security will continue to be a focal point, and IT services will be in higher demand. But which trends and changes in the market are actually worth watching?

Keep reading to discover key insights into the future of managed IT services and best practices you can put to use right away to align your MSP business for success in 2018.

Read More

Topics: Business Development and Growth, Backup and Disaster Recovery, Managed Security Services

How to Have the Security Conversation with Small Businesses That Don't Want to

Posted by Meaghan Moraes on January 23, 2018

How to Have the Security Conversation with Small Businesses That Don't Want to

For managed IT service providers working to bring a cybersecurity offering to market, it’s serendipitous that “cybersecurity” is at the tip of every small-to-midsize business’ (SMB) tongue… right? With hacks hogging headlines, small businesses will instinctively run to their MSP for security guidance and enhanced protection—in a perfect world. The reality is, the high frequency of debilitating data breaches has spawned a numbness to cyber attacks. The majority of SMBs today actually think they don’t need managed security services. That’s a major hurdle for aspiring MSSPs to overcome.

So, where does the answer lie? In the way you’re able to communicate with these skeptical SMBs. Once you and your client come to a cybersecurity strategy you can agree upon, you’re golden. And it all starts with flipping their perspective on what security really means.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

Meltdown and Spectre: What MSPs Need to Know and Communicate to Clients

Posted by Bill Hughes on January 16, 2018

Meltdown and Spectre: What MSPs Need to Know and Communicate to Clients

By now, you’ve probably seen two names swirling around every industry news headline. These, of course, are Meltdown and Spectre; two critical vulnerabilities found in current CPUs from Intel, AMD and ARM.

On Wednesday January 3, several researchers disclosed the security flaw in modern processors that could affect practically every Intel computer released in the last two decades—as well as the AMD and ARM chips in your laptops, tablets and phones. As people are (rightly) concerned, we’ve decided to assemble and organize all the information MSPs and IT service providers should understand about these vulnerabilities, how they could be exploited and how to communicate these vulnerabilities to your clients.

Read More

Topics: Industry News, Cybersecurity and Threat Management

5 Ways to Increase Cybersecurity Preparedness in 2018

Posted by Chris Johnson on January 12, 2018

5 Ways to Increase Cybersecurity Preparedness in 2018

Everyone in the managed IT services space has faced at least one or more cybersecurity challenges, whether with their clients or even their own internal IT infrastructure. From corrupted patches to malware, from DDOS to physical failure of equipment. While not all incidents were necessarily tied to hackers, they did have a negative impact on the businesses we try to support.

In this post, I am going to go over what I feel are the top five areas that any MSP, MSSP or IT service provider should be doing to help strengthen their security posture and face the onslaught of threats in 2018.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

Reasons to Use Managed IT Services in 2018

Posted by Meaghan Moraes on January 4, 2018

Reasons to Use Managed IT Services in 2018.png

As cited in TSIA’s The State of Managed Services 2017 report, managed services now represent 22 percent of services revenues, and overall net-new revenue for managed services continues to grow at a healthy average of 42 percent. It’s evident that the demand for managed services shows no signs of slowing down. In fact, a survey by Clutch.co shows that 69 percent of small- to medium-sized businesses (SMBs) hire at least one type of IT service provider. So, what is fueling this impressive level of adoption? Why are so many business owners fans of your business model? 

The following research illustrates the top reasons SMBs work with MSPs and IT solutions providers. As you build your 2018 sales strategy, pay attention to these main market drivers.

Read More

Topics: Sales and Marketing, Remote Monitoring and Management, SMB Trends

Happy New Year! Here's to a Successful 2018

Posted by Lily Teplow on January 1, 2018

Happy-2018.png

Happy New Year to all! 2017 was a remarkable year for the IT industry on a number of levels. Although we saw some challenges—specifically as it relates to cybersecurity—the developments in the IT market as a whole are very promising for MSPs and IT service providers. But before we set our sights on what we will achieve in 2018, let’s take a quick look back on the major accomplishments of the past year.

Read More

Topics: Industry News

Federal Health Officials: Lenient Security Practices to Blame for Quickening Pace of HIPAA Violations

Posted by Britany DiCicco on December 22, 2017

Federal Health Officials: Lenient Security Practices to Blame for Quickening Pace of HIPAA Violations

When a patient visits their local medical practice or community hospital, they are entrusting the organization with their most sensitive information—such as medical data, health insurance IDs and social security numbers. The medical practice that is left with this information has a team of doctors who promised to “first do no harm,” meaning that his or her first consideration is the patients’ well-being—which includes protecting their privacy. However, without the proper security tools in place, they are putting their patients at great risk for becoming victim to cybercrime and exposing their personal information.

Let’s take a closer look at why medical practices have become the primary target of cyber criminals and how it has called for a recent harshening in HIPAA regulations.

Read More

Topics: Information Security, HIPAA, Healthcare IT

The Accelerated Route to Success in the Managed Security Services Space

Posted by Meaghan Moraes on December 8, 2017

The Accelerated Route to Success in the Managed Security Services Space

The potential risks and damages associated with modern cyberattacks are escalating exponentially, and virtually every business has at least some level of vulnerability today. Without the right protection and preventative measures in place, your clients—particularly those in the SMB space—won’t stand a chance in today’s fast-paced and constantly changing threat landscape.

Security plays such an integral role in the modern IT environment. All service providers now need to be prepared to support it in order to survive and continue thriving. So how can MSPs accelerate their entry into the managed security space? The following points illustrate what it takes to build an effective, successful and scalable managed security services offering.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

10 Reasons Why Small Medical Practices and Community Hospitals Are the Principal Target of Cyber-Attacks

Posted by Britany DiCicco on December 1, 2017

10 Reasons Why Small Medical Practices and Community Hospitals Are the Principal Target of Cyber-Attacks

Cybercriminals are constantly searching for their next big exploitation opportunity, and medical practices are usually the target. In recent years alone, we’ve seen an avalanche of awful breach news that shook many medical organizations. But why are medical records such a popular target for cybercriminals, and what can be done about it?

If you’re a managed service provider (MSP) servicing the healthcare industry, your clients need to know exactly why they are a prime target for cybercriminals and how you can help bolster their defenses. If you’re looking to break into the healthcare vertical, the following ten reasons serve as your perfect argument to persuade medical practices to invest in your services.

Read More

Topics: Information Security, Healthcare IT, Cybersecurity and Threat Management

Protect Yourself and Clients from Malware

Posted by Hunter Smith on November 30, 2017

"Attention! We've detected malicious activity on your computer. Download antivirus now."

Spyware, Keyloggers, Scareware (described in example above), Ransomware and more. It seems like malware, or malicious software, lurks around every corner of the Internet, be it in a threatening email attachment or false online advertisement. There are now newer, subtler ways for your clients to have their personal data stolen, and few will be able to detect the warning signs of the various types of malware attacks before the damage is done and the data is lost. It is time to teach yourself and your clients how to prevent malware from causing unnecessary problems on your computers and servers.

Read More

Topics: Data Protection, Backup and Disaster Recovery, Mobile Device Management and IT Mobility, Cybersecurity and Threat Management

NotPetya, WannaCry and Locky Named Among Nastiest Ransomware of 2017

Posted by Webroot Ghost Blogger on November 21, 2017

NotPetya, WannaCry and Locky Named Among Nastiest Ransomware of 2017

Ransomware is one of the hottest topics in recent cybersecurity news, and with good reason. These threats are both pervasive and expensive. According to a recent survey of 500 managed service providers, nearly 90 percent of MSPs report their clients were hit by ransomware in the last year. In addition to the cost associated with any ransoms, 60 percent of MSPs reported spending multiple days remediating the fallout of a ransomware attack. And on top of that, 1 in 8 MSPs reported having paid the ransom themselves.

So, how do you protect your clients (not to mention your own MSP business) from a damaging ransomware attack? Per cybersecurity provider Webroot, one of the first steps is staying on top of threat-related news and trends. Webroot recently published their top 10 nastiest ransomware variants of 2017 list, and a lot of the names will come as no surprise to you.

 

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

Introducing: A Quick Guide to Marketing and Selling Cybersecurity

Posted by Lily Teplow on November 15, 2017

Quick-Guide-to-Marketing-and-Selling-Cybersecurity.png

The need to enhance cybersecurity is a given today for both Managed Service Providers (MSPs) and their clients. The constant news headlines containing “ransomware,” “cybercrime,” “data breach” or the like has made security top of mind for businesses of all sizes—prompting MSPs to start thinking more seriously about their cybersecurity services and how to best offer them to clients.

There is a huge opportunity for MSPs to pave the path to their clients’ success, but it all starts with cybersecurity sales. However, selling your managed security services isn’t always easy. Your focus and priority is on keeping your clients protected, yet this makes it difficult to find the time to create your own marketing campaigns. But, imagine if you could become a cybersecurity sales expert without doing all the heavy lifting…

Read More

Topics: Sales and Marketing, Cybersecurity and Threat Management, Managed Security Services

3 Milestones Every MSP Should Hit When Launching a Security Line of Business

Posted by Chris Johnson on November 14, 2017

3 Milestones Every MSP Should Hit When Launching a Security Line of Business

In previous articles, I have talked about the differences between MSP and MSSP and how important it is to practice what you preach as you look to differentiate yourself in the cybersecurity space. As we quickly approach the end of the year, I’d like to provide you all with a tried-and-true strategy for successfully launching your cybersecurity offering as a new line of business in 2018 and beyond.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

The Top 10 Ransomware Attacks of 2017

Posted by Lily Teplow on November 10, 2017

The Top 10 Ransomware Attacks of 2017

Dominating the threat landscape this year, ransomware has become an issue that all modern businesses need to worry about. While ransomware isn’t a new phenomenon, over the years it has grown from a mild annoyance to a shocking financial burden for many individuals and businesses today. Variants such as NotPetya, WannaCry, and Locky are among those that wreaked havoc for businesses worldwide this year—rising to become some of the most damaging ransomware attacks in history.

Recently, the Webroot threat research team released their list of the Top 10 Nastiest Ransomware Profiles, which highlights the most destructive ransomware of 2017. The list illustrates the reality of how cybercriminals will continue to develop new infections and capitalize on reliable, successful attack methods. Keep reading to discover the top ransomware attacks of this past year, what you might need to look out for in 2018, and how you can keep yourself and your clients protected from the threat of ransomware.

Read More

Topics: Information Security, Cybersecurity and Threat Management

The Evolution of Antivirus: Part Two

Posted by Meaghan Moraes on November 1, 2017

The-Evolution-of-Antivirus--Part-Two.png

As the conversation around cybersecurity shifts in tone, managed service providers (MSPs) are starting to rework the delivery of their services in tandem with the changing market. So, what do these shifts entail exactly? In The Evolution of Antivirus: Part One, we looked at what has been traditionally referred to as “antivirus,”  and how it can (and should) be thought of as complete endpoint protection—because security is no longer a general means of “protection.” Today, it should be seen as a multi-layered approach to securing specific client vulnerabilities and ensuring all endpoints are fully damage controlled.

In the second part of this series, we’ll focus on the strategic ways MSPs can adapt to this demonstrative need to effectively manage all endpoints—through the right security strategy and expertise—and set their business up to scale. Cyber threats will continue to change business as we know it, so here are some key ways to keep the cards in your favor.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

3 Steps to Delivering Profitable Security Services

Posted by Brian Downey on October 31, 2017

3-Steps-to-Delivering-Profitable-Security-Services.png

With the constant influx of threats and attacks, today’s cyber landscape may seem daunting—even downright scary—to most businesses. However, this evolving landscape presents a big opportunity for IT service providers looking to offer reliable cybersecurity services to clients. So, how can you ensure that these services will be profitable in years to come?

Clients are now looking to you to provide a comprehensive security environment, detect potential threats, and remediate said threats before they are able to do damage. In a recent webinar, I walked through the specific steps IT providers should take to deliver profitable security services. As a recap, I’d like to outline the three key takeaways so you can understand what it takes to properly deliver security services to your clients.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

IT Trick or Treat: Top 5 Scariest Cyber Threats of 2017

Posted by Lily Teplow on October 27, 2017

IT Trick or Treat: Top 5 Scariest Cyber Threats of 2017

We are living in a world where cybercrime is the greatest threat to every business. Today’s news headlines are littered with the latest data breach or attack, and these will only proliferate as the years go on. What’s more, attackers are even broadening their approach to cyberattacks in order to strengthen their potential impact, causing cybercrime damages to cost the world $6 trillion annually by 2021.

A new bar has been set for cybersecurity teams across all industries to defend their assets in the coming year. This is especially important for IT service providers, whose clients are trusting them to keep their IT systems and environments protected from harm. But in order to prepare for the future, sometimes you need to analyze and learn from the past. So, let’s take a look back on the top cyber threats the industry has had to face in 2017.

Read More

Topics: Mobile Device Management and IT Mobility, Cybersecurity and Threat Management, Managed Security Services, Internet of Things

The Evolution of Antivirus: Part One

Posted by Meaghan Moraes on October 25, 2017

The Evolution of Antivirus: Part One

In the past couple of years alone, the threat landscape has changed drastically. Viruses, Trojans, malware and similar programs are now a reality for modern businesses. Consequently, the need to vigilantly protect your clients’ endpoints from these threats is critical—and sometimes downright scary. With Halloween right around the corner, the conversation on where and how cyber attackers are haunting your clients’ systems is more timely than ever.

For many IT service providers, the shift in the threat landscape has led to a similar shift in how you define cybersecurity solutions. “Antivirus,” for instance, has become an outdated term. Antivirus is most commonly thought of as “a product that stops bad programs from infecting your device.” However, calling this “antivirus” is similar to calling every carbonated beverage “Coke.”

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

The Game Plan for Handling Your Clients’ Security, Coach CISO: Chapter 3 [VIDEO]

Posted by Meaghan Moraes on October 20, 2017

CoachCisoVideo3GIF-3.gif

In the game of bringing an effective managed security solution to market, IT service providers are beginning to rethink their plan. While robust cybersecurity services are largely powered by technology, end users need more to remain truly protected.

Are you leveraging the power of people to enhance your security offering? If you haven’t yet considered what this entails, the following points will help you devise a reliable game plan for fighting cybercrime and arm your clients with a comprehensive security solution.

Read More

Topics: Video, Cybersecurity and Threat Management, Managed Security Services

“KRACK” Attack: 3 Major Takeaways for IT Service Providers

Posted by Lily Teplow on October 18, 2017

“KRACK” Attack: 3 Major Takeaways for IT Service Providers

On Monday, a serious weakness was discovered in WPA2, a protocol that secures all modern protected Wi-Fi networks. The flaw allows potential attackers to leverage this vulnerability to break into the WPA2 security model and steal data flowing between wireless devices and the targeted Wi-Fi network. What’s so concerning about this particular attack—dubbed “KRACK,” which is short for key reinstallation attack—is that it works against all modern protected Wi-Fi networks, allowing attackers to not only read and steal information transmitted across Wi-Fi, but also potentially manipulate the data or insert malware.

So, what exactly is this KRACK attack and why is it so threatening? Considering that it is National Cyber Security Awareness Month, it’s even more critical that IT service providers understand what’s at stake given this newfound vulnerability. Here’s everything you need to know about the recent KRACK attack news, who’s most at-risk from this vulnerability, and the steps providers can take to mitigate these risks.

Read More

Topics: Industry News, Cybersecurity and Threat Management

Top 5 IT Security Posts for National Cyber Security Awareness Month

Posted by Lily Teplow on October 13, 2017

Top 5 Cybersecurity Posts for National Cybersecurity Awareness Month

October is known for many things—the oncoming of autumn, pumpkin spice products, and Halloween, to name a few. For IT service providers, however, this month is especially important because it is National Cyber Security Awareness Month.

Every year since 2004, October has been recognized as National Cyber Security Awareness Month in an effort to raise awareness about the importance of cybersecurity. As the threat landscape continues to grow and evolve, more and more businesses are demanding enhanced cybersecurity. Now, it’s up to IT providers like you to fulfill that need with your managed security services. In order to stay up-to-date on the latest threats and provide clients with the resources they need to stay safe online, we’ve rounded up our most popular cybersecurity blog posts from this year. Keep reading for endless tips on how you can increase your clients’ cyber resilience!

Read More

Topics: Industry News, Cybersecurity and Threat Management

Live from Navigate 2017: Day 3 Coverage

Posted by Lily Teplow on October 5, 2017

Navigate-Day-Three-Coverage.png

Greetings again from day three of our Navigate 2017 conference, focused on empowering our MSP partners with the tools and insight they need to define their path and achieve success in the IT space.

Day two was jam packed with informative breakout sessions, enlightening keynotes presentations, plenty of announcements and discussions about Continuum Security and much more! To briefly recap all that we covered in the past three days and the fun that we’ve had along the way, take a look at the video below:

Read More

Topics: Business Development and Growth, Industry News, Navigate 2017

Live from Navigate 2017: Day 1 Coverage

Posted by Lily Teplow on October 3, 2017

Live-from-Navigate-2017--Day-1-Coverage.png

Greetings from Navigate 2017, Continuum’s user conference focused on empowering our MSP partners with the tools and insight they need to define their path and achieve success in the IT space. Over the next three days, we will be live blogging this great event—covering all the valuable content, announcements, and highlights that Navigate has to offer. 

Here are our top stories from the first day of Navigate 2017.

Read More

Topics: Industry News, Cybersecurity and Threat Management, Navigate 2017

The MSSP’s Guide to Handling Major Security Threats and Attacks

Posted by Meaghan Moraes on September 20, 2017

The-MSSP’s-Guide-to-Handling-Major-Security-Threats-and-Attacks.png

Today, new cyber attacks seem to be occurring daily—never failing to one-up the last and deepen the fear among modern businesses. The biggest cyber scares in recent news involve Equifax and Kaspersky, two major companies that handle extremely sensitive data. The lack of cybersecurity in these two stories is particularly chilling because they bring to the forefront that everything—including personal identity and homeland security—is at risk.

So, how can MSPs step in and provide their clients the assurance that they’re keeping them protected—and how can this be best communicated? As MSPs march bravely into MSSP territory, the right approach to security will prove they can handle the cyber threats that continue to surround their clients’ networks. Let’s take a deeper look into these recent attacks and explore how MSPs and MSSPs can take control of cybersecurity threats such as these.

Read More

Topics: Industry News, Cybersecurity and Threat Management, Managed Security Services

Understanding HIPAA and Healthcare IT: Part 1

Posted by Britany DiCicco on September 15, 2017

Understanding HIPAA and Healthcare IT: Part 1

Before the beginning of 2017, Experian predicted that the healthcare sector would be the most targeted sector for cyber criminals to exploit. In May of this year, that prediction came to life when the malware known as WannaCry caused 37 of the health trusts in the UK’s National Health Service to shut down, eventually spreading across 150 countries. Unfortunately, this is just one of many cyber attacks that healthcare organizations have recently faced. Today, these organizations are seeking aid with HIPAA compliance and increased security, causing them to look to managed services providers (MSPs) for help.

Read More

Topics: Information Security, HIPAA, Healthcare IT

Preparing for Hurricane Irma: Final Reminders and Best Practices for MSPs

Posted by Lily Teplow on September 8, 2017

Preparing for Hurricane Irma: Final Reminders and Best Practices for MSPs

With Hurricane Irma set to make landfall this weekend, we wanted to provide several important reminders to both Continuum partners and other MSPs or IT service providers with customers in the affected area. 

The National Hurricane Center expects “severe hurricane conditions” over portions of the Florida peninsula and Florida Keys beginning late Saturday evening, and Florida Gov. Rick Scott said the storm has the potential to “catastrophically devastate” the state.

While public safety and rescue operations are always the top priorities following a disaster scenario, there are a number of other processes and practices IT providers must put into place to ensure that their customers are able to recover and resume operations as quickly as possible.

Read More

Topics: Industry News, Backup and Disaster Recovery

Navigate 2017 Is Sold Out!

Posted by Courtney Margossian on August 31, 2017

Navigate 2017 Is Sold Out

We said it would happen, and it finally has. Navigate 2017, the industry conference for managed services providers (MSPs) looking to grow their business and chart their path to success in the IT channel, is sold out!

Navigate is a three-day managed IT services event focused on bringing long-term growth and success to your MSP business. More than 500 Continuum partners have registered and will be headed to Las Vegas in October for the jam-packed content sessions and trainings, awesome evening events, and incredible keynote presentations that are a staple of this event. With all of this great partner-driven content, it’s no wonder why Navigate has sold out for its fourth year in a row. But did you miss your opportunity to register? Don’t fret, let’s take a look at all this event has to offer to take your organization to the next level and how you can get your chance to attend by joining our Navigate 2017 waitlist!

Read More

Topics: Industry News, Navigate 2017

Top 3 Takeaways from CompTIA ChannelCon 2017

Posted by Nate Teplow on August 25, 2017

Top 3 Takeaways from CompTIA ChannelCon 2017

It’s been almost a month since CompTIA ChannelCon 2017 wrapped up, and I finally found some time to sit down and digest all of the great content, ideas and meetings that came out of this year’s event. There’s so much going on in the IT industry and a lot for us all to be excited about, but we’re also faced with a number of challenges that we need to plan for and adapt to ensure the continued success of this industry.

To that note, I’ve summarized my top three takeaways from this year’s event that we should all keep in mind as we move forward together.

Read More

Topics: Business Development and Growth, Industry News, CompTIA

10 Security Questions That Will Help Prospects Realize Their Need for Your Services

Posted by Lily Teplow on August 17, 2017

10 Security Questions That Will Help Prospects Realize Their Need for Your Services

One of the biggest challenges for managed services providers (MSPs) looking to add new clients is that prospects don't always realize their need for managed IT services. A business that may be a prime candidate for your services may be operating under the mindset of, "I've come this far without your help, why should I pay for it now?" The tough part is getting these prospects to answer that question for themselves.

So, how do you go about getting your prospects to that "aha!" moment? You need them to truly understand the risks that are facing them. Once they do, there is a very good chance that they will realize that they can't afford to risk data loss, data breach or the downtime that many of these vulnerabilities present. Instead of preaching to your prospects for hours on end, try challenging them to answer a set of security questions for you to make them realize just how ill-prepared they may be.

Read More

Topics: Data Protection, Backup and Disaster Recovery, Cybersecurity and Threat Management

What Should MSPs Know About the HIPAA Security Rule?

Posted by Britany DiCicco on August 15, 2017

What Should MSPs Know About the HIPAA Security Rule?

Today, managed services providers (MSPs) who service clients in the healthcare industry have to worry about compliance—it’s simply part of the job. These MSPs offer their services to small- and medium-sized medical practices who rely on them to keep their security architecture safe and compliant with HIPAA (Health Insurance Portability and Accountability Act). Bearing the burden of this responsibility means that MSPs must have encyclopedic knowledge about HIPAA, and also have the proper security tools in place to meet the stringent requirements that are associated with HIPAA compliance.

As the healthcare industry continues to move away from paper processes and adopt new technologies, they are becoming increasingly prone to cyber attacks. It’s now more important than ever for MSPs to fully understand the HIPAA Security Rule and enable the medical practices they serve to remain compliant.

Read More

Topics: Information Security, HIPAA, Healthcare IT

10 Cybersecurity Statistics Every MSP Should Memorize

Posted by Meaghan Moraes on August 2, 2017

10 Cybersecurity Statistics Every MSP Should Memorize

Today, business professionals that do not consider cybersecurity a top concern may be living under a rock—and in actuality, the modern threat landscape should make them want to hide under one.

Managed IT service providers are realizing the importance of offering their clients security services because of, well, the numbers. The following ten statistics illustrate current cybersecurity threats to businesses, holes that leave many organizations vulnerable to cyber attacks, and the repercussions of not having a robust security strategy in place in today’s tumultuous IT landscape. Consider leveraging these facts in your conversations with clients and prospects to strengthen the way you sell your services and security expertise!

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Why Phishing is the Go-To Method for Cyber Criminals

Posted by Meaghan Moraes on July 28, 2017

Why Phishing is the Go-To Method for Cyber Criminals

The term “phishing” has been circulating the business realm for quite some time—largely because of its popularity amongst cyber criminals. Phishing is a type of social engineering attack that tricks victims into giving away information to cyber criminals posed as a trusted source. It’s an easy and effective way for criminals to hack sensitive systems and information, and the dangerous aspect is that it can come in many forms—the main one being email. Today, phishers, on average, launch a new attack every 30 seconds—and phishing schemes are growing increasingly sophisticated as cyber attackers use new tools and tactics to create authentic-looking emails.

Low-cost phishing and ransomware tools are very easy to get a hold of, and the attacks are just as easy to execute. So, what makes phishing such a successful method of cyber attack, and what can organizations do to protect themselves? In this post, we’ll dive into why phishing is so prevalent and how companies can work to mitigate these attacks.

Read More

Topics: Information Security, Cybersecurity and Threat Management

3 Cybersecurity Threats MSPs Need to Monitor and Manage in 2017

Posted by Lily Teplow on July 14, 2017

3 Cybersecurity  Threats MSPs Need to Monitor and Manage in 2017

In the growing and evolving cyber threat landscape, how can managed services providers (MSPs) ensure that they’re delivering on their promise to secure and protect their clients at all times? Let’s face it, managing and monitoring cyber threats is not an easy task. MSPs are now under immense pressure to be the IT security superhero for their clients, but if you haven’t yet established a security offering, it may stunt your MSP growth.

Luckily, there are tools out there that can help you uphold your commitment to security, even amongst the major threats that are merged with business today. Let’s take a look at the three most crucial cyber threats MSPs need to be aware of in 2017 and how you can keep your clients protected from them.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services, Internet of Things

Putting the S in MSSP: A Recap [SLIDESHARE]

Posted by Meaghan Moraes on July 12, 2017

Putting the S in MSSP: A Recap SlideShare

Today’s cyber threat landscape has caused a cloud of risk and uncertainty to loom over modern business. With the digital wave washing over organizations of all sizes, the potential of experiencing a cyber attack has expanded exponentially. IT security is now seen as a top priority, especially for small- and medium-sized businesses (SMBs) who are at high risk of completely shutting down if proper cyber defenses are not in place. As an MSP who serves these SMB clients, it’s up to you to step in and provide robust cybersecurity that can withstand the modern threat landscape and ensure businesses remain protected and set to scale.

Over the past six weeks, we’ve offered a step-by-step explanation of what it takes to evolve from MSP to managed security services provider (MSSP): the trusted, go-to security expert that offers the level of security that will effectively manage vulnerabilities and prevent clients from potential disasters. Now, let’s recap what steps you need to take to successfully bring an IT security offering to market.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 6: How Traditional IT Service Providers Can Embrace Cybersecurity Services in 2017

Posted by Meaghan Moraes on July 5, 2017

Putting the S in MSSP Part 6: How Traditional IT Service Providers Can Embrace Cybersecurity Services in 2017

Throughout the Putting the S in MSSP series, we’ve shared the building blocks for becoming a comprehensive managed IT services provider capable of keeping clients effectively protected from cyber threats. In part five, we discussed how to offer security-as-a-service in a way that enables both you and your clients to scale. To wrap up this cybersecurity series, we will ensure you understand how to properly define what robust cybersecurity looks like in 2017 so you can include security as part of your offering and prevent your clients’ businesses from becoming obsolete.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 5: Scaling Your Business with Security-as-a-Service

Posted by Meaghan Moraes on June 29, 2017

Putting the S in MSSP Part 5: Scaling Your Business with Security-as-a-Service

If you’ve been following our “Putting the S in MSSP” blog series, you’re well on your way to becoming a comprehensive MSSP who can secure and protect your SMB clients. However, when building and establishing this new line of business, how can you ensure that your security offering is built to scale?

In part four, we discussed top tactics for effectively speaking to SMBs about cybersecurity. In this post, we’ll focus on how to offer security-as-a-service in a way that enables both you and your clients to scale.  


Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

An MSP’s Guide to the Petya Ransomware Outbreak

Posted by Brian Downey on June 28, 2017

An MSP’s Guide to the Petya Ransomware Outbreak

The headline-grabbing nature of WannaCry put just about every IT and security team in reaction mode. Just one month after the WannaCry outbreak, we find ourselves reverting to reaction mode as the next batch of ransomware spreads across the globe—this time from the Petya family variant.

In a matter of hours, the new Petya ransomware spread its way across 65 countries. While WannaCry and Petya aren’t the first versions of ransomware, they are a new breed of ransomware, ones that use powerful exploits to enable rapid propagation within and to new organizations. As a managed services provider (MSP), it’s imperative that you understand this ransomware outbreak and how it can affect you or your clients’ businesses. Don’t know what Petya is or how you can stay protected? Here is your guide.

Read More

Topics: Industry News, Cybersecurity and Threat Management

The Next Big Thing for Continuum BDR? Introducing Archive.

Posted by Joseph Tavano on June 28, 2017

The Next Big Thing for Continuity247® Introducing Archive

As you already know, there is no one-size-fits-all solution for the backup needs of small- and medium-sized businesses (SMBs). Even the name of the SMB category itself is representative of this scenario. With an array of company sizes in various industries, the backup requirements will differ for numerous reasons.

To meet that demand, Continuum BDR is expanding to offer even more options for backup with its latest add-on, Archive. With Archive, MSPs using Continuum BDR are now able to offer a long-term backup and restore option for less time-critical data, all at a low cost. And, because it can be added to any Continuum BDR package (Local, Solo, Complete, or Flex), it can augment new or existing Continuum BDR end user packages in a variety of ways.

Read More

Topics: Data Protection, Backup and Disaster Recovery

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Posted by Meaghan Moraes on June 21, 2017

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure SMBs with the tools needed to tread the modern threat landscape without fear.


In part three
, we examined the lifecycle of a cyber attack and walked through how to devise a solid remediation plan and manage vulnerabilities. In this post, we’ll take that knowledge a step further and offer key tips on how MSPs should be framing the topic of cybersecurity to their clients.

Read More

Topics: Sales and Marketing, Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Posted by Meaghan Moraes on June 14, 2017

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure small- and medium-sized businesses (SMBs) with the tools needed to tread the modern threat landscape without fear.

In the first part of this series, we offered tips on how to begin defining and deploying the three pillars of cybersecurity. In part two, we went on to talk about the three major pitfalls of managing multiple security vendors. In this post, we will examine the lifecycle of a cyber attack, providing insight on how to devise a solid remediation plan and manage vulnerabilities.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 2: 3 Pitfalls of Managing Multiple Security Vendors

Posted by Meaghan Moraes on June 7, 2017

MSSP: 3 Pitfalls of Managing Multiple Security Vendors

As a managed IT services provider, you’ve served as the tech backbone of your clients for years, in a variety of ways. From RMM to BDR to security, your offerings provide small- and medium-sized businesses (SMBs) with the level of support, cost-efficiency and scalability they need to survive in the modern business world. Or so you hope.

"Putting the S in MSSP" is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. In part one of this series, we offered tips on how to properly define and deploy the three pillars of cybersecurity so you’re setting a solid foundation for your security services. In this post, we’ll highlight three major downsides to offering your clients security via a number of different vendors, and discuss best practices for implementing truly robust cybersecurity.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 1: Defining and Deploying the 3 Pillars of Cybersecurity

Posted by Meaghan Moraes on May 31, 2017

Putting the S in MSSP Part 1: Defining and Deploying the 3 Pillars of Cybersecurity

With increasingly complex threats flooding the modern IT landscape, small- and medium-sized businesses (SMBs) are struggling to keep their heads above water. We’ve all seen the stats, right? Malicious attacks are on the rise, and your SMB clients are increasingly (and successfully) becoming the targets. Unfortunately, this means that your IT services of yore simply aren’t enough to keep up with the ever-present, ever-evolving cyber threats that plague modern business. As an MSP, what is there left for you to do? The answer might be to adopt a managed security services provider (MSSP) model and integrate security services into your portfolio.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

How to Explain WannaCry to Your End Users

Posted by Meaghan Moraes on May 16, 2017

How to Explain WannaCry to Your End Users

Despite the term “cyber attack” now being virtually synonymous with “modern business,” the world has never seen anything like WannaCry before. This new strain of ransomware, also known as WanaCrypt0r and WCry, recently hit computers in 99 countries, spurring 75,000 cases of the ransomware around the world. It was a big one—the big one.

Read More

Topics: Industry News, Information Security, Cybersecurity and Threat Management

Orange Is the New Hack: 3 Cybersecurity Lessons for MSPs

Posted by Meaghan Moraes on May 2, 2017

Orange Is the New Hack: 3 Cybersecurity Lessons for MSPs

Hype surrounding the Netflix original series, Orange Is the New Black, got several shades darker this past weekend when a hacker literally stole the show. The hacker, who goes by “thedarkoverlord,” obtained and shared the first ten episodes of the coming season of Orange Is the New Black on Saturday after Netflix failed to meet their ransom requests.

The hack occurred at the postproduction company Larson Studios, a popular digital-mixing service in Los Angeles for television networks and movie studios. Thedarkoverlord also claimed to have stolen unreleased content from ABC, Fox, National Geographic and IFC, and threatened ransomware attacks on these networks, as well. The theft is merely the latest in a long line of ransomware attacks by cybercriminals over the past year. Specifically, this new development provides a perfect opportunity for managed IT services providers (MSPs) to ensure that clients are adopting a multi-layered approach to IT security.

Read More

Topics: Industry News, Information Security, Cybersecurity and Threat Management

7 Red Flags MSPs Should Identify to Reduce Cyber Attacks

Posted by Chris Thompson on April 27, 2017

7 Red Flags MSPs Should Identify to Reduce Cyber Attacks

Email hacking is one of the most common forms of cyber attacks today. It takes place every day and throughout the world. You may be familiar with the email attack that occurred in 2016 during the Presidential Election. John Podesta fell for a phishing attack, which led to the release of a decade’s worth of emails. The hacker posed as Google and alerted Podesta to change his password because of suspicious activity on his account. By clicking on the link within the email, hackers were granted full access to his inbox.

Situations like this happen to businesses of all sizes, and the rate of these cyber attacks is only increasing. As an MSP, your goal is to protect businesses against these attacks, which can be difficult if the employees are not properly trained to identify potential threats. People are tricked into giving hackers information because they are not aware of the warning signs to look out for. However, here is a list of seven red flags to look out for and include in your security training for your clients.

Read More

Topics: Information Security, Cybersecurity and Threat Management

Simplifying 3 Trends That Are Changing the IT Landscape

Posted by Meaghan Moraes on April 21, 2017

Simplifying 3 Trends That Are Changing the IT Landscape

Let’s face it, modern IT is complicated. With new components being continuously added to the mix, managing and securing the IT landscape requires new tools fit for the challenge. However, the last thing managed services providers (MSPs) need is yet another disparate management tool that adds more complexity to their services. Without cohesive IT and service level management, there will be serious disconnects—from servers and networks, to storage and end points. 

Amidst the changing tides of technology, MSPs can help their clients ensure IT service and business success with an integrated approach. The following are three growing trends that MSPs should understand how to embrace and capitalize on in order to achieve sustainable profitability and business growth.

Read More

Topics: Cloud Computing, SMB Trends, Mobile Device Management and IT Mobility

An MSP’s Guide to Combatting SMB Cybersecurity Challenges

Posted by Meaghan Moraes on April 7, 2017

An MSP’s Guide to Combatting SMB Cybersecurity Challenges

Ever since the internet became an indispensable tool in the business world, security risks have continued to grow more profound. Today, malware—specifically ransomware—is the biggest money-maker for cybercriminals in history. These types of attacks are real threats that no business can afford to ignore, especially small- and medium-sized businesses (SMBs).

Due to limited budget, bandwidth and resources, SMBs combat IT issues differently than large enterprises. Cybersecurity is a top concern for SMBs in particular, as this group is faced with the following challenges:

Read More

Topics: SMB Trends, Cybersecurity and Threat Management, Managed Security Services

3 Browser Extensions for Safe and Secure Browsing

Posted by Matt Mainhart on April 6, 2017

3 Browser Extensions for Safe and Secure Browsing.png

With the invention of the internet, almost everything is now one simple click away. Unfortunately, this luxury comes with certain consequences, such as companies being able track your every move as you browse. You might not know it, but the websites you and your clients visit are using one or more “trackers” to follow your browsing habits around the web and learn more about you. These internet shenanigans can come in many forms, like advertisement popups, unauthorized information gathering – you name it.

So, how are you protecting yourselves, or better yet, your clients? Check out these three browser extensions they can install to browse the internet (somewhat) shenanigan free. Share them with your clients in your next newsletter send to help make their browsing experience more secure!

Read More

Topics: Information Security, Client Quick Tips

4 Reasons Cybercriminals Have an Edge and How MSPs Can Shift the Dynamic

Posted by Scott Spiro on March 30, 2017

4 Reasons Cybercriminals Have an Edge and How MSPs Can Shift the Dynamic

Did you know that six years ago, cybersecurity didn’t even rank in the top ten risks prioritized by company boards? Today, we live in a world where cybercriminals seem to have the advantage as they continually find new ways to steal sensitive information. Despite organizations across the globe spending more than ever to manage cyber risk, attackers continue to get through.

So, what has caused cybercriminals to now have the upper hand? This is exactly the question that is answered in a recent report by Intel Security and McAfee. These new findings tell us that it could come down to misaligned incentives between the attacker and the defenders. For MSPs, this presents new opportunities to restructure services and internal processes to incentivize innovation and improve security services.

Read More

Topics: Industry News, Cybersecurity and Threat Management, Managed Security Services

Breaking Down the Dangers of Social Engineering

Posted by Lily Teplow on March 24, 2017

Breaking Down the Dangers of Social-Engineering

By now, we’re all familiar with the type of hacker who uses their technical skills to infiltrate computer systems and compromise sensitive data. It’s seen in news headlines across the globe today. However, there’s now another type of hacker who uses special tactics to exploit the one weakness that every organization has: human psychology.

This is more commonly known as social engineering, which is the art of manipulating people so they give up confidential information. Not only are social engineering attacks becoming more common against small- and medium-sized businesses (SMBs), they’re also becoming more sophisticated. This makes things very tough for the MSPs that aim to serve and protect those SMB clients. So, in order to stay a few steps ahead of cybercriminals, here’s what you should know about social engineering attacks and how MSPs can help prevent clients from falling victim to them.

Read More

Topics: Industry News, Cybersecurity and Threat Management

A Look at Today’s Changing Managed IT Services Landscape

Posted by Brandon Garcin on March 15, 2017

A Look at Today’s Changing Managed IT Services Landscape.png

The managed IT services market today is experiencing significant change. Businesses across all industries are becoming increasingly dependent on technology, and the skills gap in this industry continues to widen. What’s more, we’re beginning to see the potential for new legislation or policy that may impact how IT outsourcing services are delivered and consumed.

As these trends converge, MSPs must take a tactical approach to ensure that they’re aligning the right internal and external resources, putting the right processes in place and placing themselves on a path toward long-term success and stability.

Read More

Topics: Business Development and Growth, Industry News

3 Ways to Increase Laptop Security On-The-Go

Posted by Matt Mainhart on March 9, 2017

3 Ways to Increase Laptop Security On-the-Go.png

Allow me to paint a scary picture for you. You’re on the road for work and answering some emails from a client at the airport. Then you get thirsty, but you see that there’s an overpriced drink stand just a few steps away and you make the sacrifice of spending $4.00 on a bottle of water. As you break out your wallet and pay up, you turn around to see that your laptop is gone! You only stepped away for about 60 seconds and were just a few steps away. However, a thief saw this as a window of opportunity, and took it.

Now you and your boss are freaking out about confidential company information potentially getting into the wrong hands. As the world starts to spin, you find yourself asking “how could this happen?”

Now, we can snap back to reality. In order to prevent this unruly situation from happening to you, check out the three quick tips below for increased laptop security while you’re on-the-go.

Read More

Topics: Information Security, White-Label Resources, Client Quick Tips, Cybersecurity and Threat Management

Amazon S3 Outage: Three Takeaways for MSPs Following This Week’s Downtime Event

Posted by Brandon Garcin on March 2, 2017

Amazon S3 Outage-Three Takeaways for MSPs Following This Week’s Downtime Event.pngEarlier this week, Amazon Web Services’ S3 system suffered an outage for about four hours—leaving many websites and web-based services either partially or entirely inaccessible. S3, a cloud storage system (S3 stands for Simple Storage Service), experienced what Amazon referred to as “high error rates” that reportedly impacted websites like Slack, Trello, Imgur and many others. 

While these large-scale downtime events don’t happen too often—before this week the most recent sizable S3 outage was in 2015—they do present an opportunity for managed service providers (MSPs) to ensure they’ve got the right systems and processes in place to properly support their clients and minimize end user impact. Here are three reminders MSPs can take from this week’s outage:

Read More

Topics: Industry News, Backup and Disaster Recovery

What Is the Financial Impact of a Ransomware Attack? [CHART]

Posted by Lily Teplow on February 24, 2017

What Is the Financial Impact of a Ransomware Attack.png

Imagine for a moment that you receive a phone call from a client to hear that hundreds of their computers have been infected with ransomware, knocking critical systems offline and putting their organization’s entire operations at risk. What a nightmare, right? Unfortunately, this has been a reality for many unprepared small- and medium-sized businesses (SMBs) as we’ve seen ransomware reach new levels of maturity over the past couple of years.

Ransomware attacks can have a major impact on business continuity, productivity, reputation and much more, and dealing with one is not only time-consuming; it can be extremely costly. SMBs need to be fully aware of the threat posed by ransomware and make strengthening their IT defenses a top priority this year. However, if they’re hesitant or don’t yet have the proper defenses in place, how can you convince them to turn to an MSP like you for help? What other financial impacts could ransomware have on their business and why should they leverage your managed IT services to prevent a business-crippling attack?

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services, MSP Sales Chart

5 Simple Tips for Preventing Ransomware

Posted by Ben Barker on February 23, 2017

5 Easy Tips for Preventing Ransomware.jpg

Over the past year, we’ve seen ransomware grow and evolve at a rate we’ve never seen before. In fact, the FBI reported ransomware to be a $1 billion-dollar source of income for cyber criminals in 2016—and this year it’s showing no signs of slowing down. Any company or organization that depends on daily access to critical data—and can’t afford to lose access to it—should be most worried about ransomware. This includes the clients you serve and aim to protect. As an MSP, what exactly should you know about the threat of ransomware, where it’s headed and what steps can be taken to keep your clients protected?

Read More

Topics: Information Security, Webinar Highlights, Cybersecurity and Threat Management, Managed Security Services

A Look Back at 2016: The Year of Ransomware

Posted by Ben Barker on February 16, 2017

A Look Back at 2016-The Year of Ransomware.png

2016 had a lot of notable headlines. Whether it was the UK voting to Brexit, the popularity of "Pokémon GO," or the summer Olympics in Brazil, last year left no shortage of water cooler material. However, what isn't often talked about is the impact that cybercrime had on the world in 2016. As far as the tech space is concerned, last year was like nothing we have ever seen before. So, while the aforementioned headlines may have dominated the mainstream news cycles, 2016 was, by all measures, the year of ransomware.

Read More

Topics: Information Security, Webinar Highlights, Cybersecurity and Threat Management

How to Align Your Managed Services with SMB Business Priorities [CHART]

Posted by Lily Teplow on February 10, 2017

How to Align Your Managed Services with SMB Business Priorities.png

The small- and medium-sized business (SMB) clients you serve today are placing a high priority on technology. Actually, two-thirds of SMBs indicate technology is a primary factor in pursuing their business objectives for the year ahead. They’re looking to move beyond simply managing and maintaining their infrastructure to utilizing technology to solve their business’ top problems. Many SMBs are wanting to increase their investment in technology and IT expertise, but some barriers still exist.

As your prospects try to find the right service provider, they’re carefully thinking about how they can focus on core business objectives without worrying about their IT needs. But did they know that in outsourcing to an MSP like you, they can experience more growth with your proactive, predictable and preventative IT services?

Read More

Topics: Sales and Marketing, SMB Trends, MSP Sales Chart

GitLab Data Deletion Incident Demonstrates Need for True Business Continuity

Posted by Lily Teplow on February 2, 2017

GitLab Data Deletion Incident Calls for True Business Continuity.png

Have you ever experienced a major un-oh moment? You know, when something goes completely awry and your mind starts to race, palms start to sweat and the classic Homer Simpson “d’oh” echoes in your head. Well, that’s what I imagine recently happened to one of the system administrators at GitLab, a web service for hosting and syncing source code. News broke on Tuesday that GitLab had suffered a major backup restoration failure following an incident of accidental data deletion. According to the tech news site The Register, the incident was caused by an admin who was working late and might have accidentally deleted the wrong folder in a planned maintenance operation.

Whoops! It’s a textbook case of human error that can happen to any business – no matter how technically advanced or experienced. Nevertheless, this unfortunate incident highlights the incredible need to provide true backup and disaster recovery (BDR) to your clients so they don’t become the next headline.

Read More

Topics: Industry News, Backup and Disaster Recovery, Data Loss

What Are the Top 5 IT Challenges for SMBs in 2017?

Posted by Lily Teplow on January 27, 2017

What Are the Top 5 IT Challenges for SMBs in 2017.png

For most small- and medium- sized businesses (SMBs), IT is not their core function, but it’s necessary in making their business run. Most of these businesses want IT to work for them, but fear it will become a costly time suck that can take away from their primary business objectives. As today’s technology levels the playing field for SMBs, they’re now making the connection between strong IT investment and improved business performance.

However, the IT landscape continues to quickly change and shift – causing new challenges to emerge that forward-thinking SMBs need to consider as they grow their business. So, what exactly are these challenges and how can SMBs address them by investing in your managed IT services?

Read More

Topics: Sales and Marketing, SMB Trends

How Often Should You Test Your Disaster Recovery Plan? [CHART]

Posted by Lily Teplow on January 13, 2017

How Often Should You Test Your Disaster Recovery Plan chart.png

Are your clients willing to test their luck this Friday the 13th? As a savvy MSP, you know that having an effective backup and disaster recovery (BDR) solution and disaster recovery (DR) plan is a necessity in today’s business landscape – just in case your client opens an umbrella indoors and their whole IT network crashes. However, having these reliable solutions in place is of no value if the processes aren’t regularly tested. So, the question is this: what does your clients’ DR plan look like and when was the last time they had a DR drill test performed?

Read More

Topics: Data Protection, Backup and Disaster Recovery, MSP Sales Chart

Who Do You Need on Your Incident Response Team?

Posted by Joseph Tavano on January 5, 2017

Who-Do-You-Need-on-Your-Incident-Response-team.png

As the calendar switches over to the New Year, many business owners are taking account of their processes and preparing for success in the coming year. But how many are preparing to get hacked in 2017? Security experts are predicting that data breaches will continue to increase in frequency in the coming year, so the answer is: not enough.

Unfortunately, this means that the odds of your clients suffering a data breach are higher than ever. The days of SMBs assuming “it could never happen to me” have passed, and it’s time to have a plan in place to handle a nightmare situation like a data breach. One of the first components of that plan is to build an Incident Response Team.

Read More

Topics: Data Protection, Information Security, Data Loss

IT Security On-the-Go: Your Travel ITinerary

Posted by Mary McCoy on December 29, 2016

IT-Security-Travel.png

Suitcase: check. Phone charger: check. Boarding pass: check. When traveling, do you make a mental list of everything you need to remember to bring? With any business trip, there's a fair amount of planning involved, whether it's memorizing a conference schedule or booking lodging accommodations. Often, though, travelers forget about IT security, neglecting to properly prepare their devices for departure. 

According to the Kensington IT Security Survey Report, 25 percent of company employees reported IT theft in cars and transportation and more than 15 percent reported devices were stolen from their hotel or at the airport. Are you or your clients practicing unsafe IT habits on-the-go?

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Is Hard Drive Failure a Reality for SMBs? [CHART]

Posted by Lily Teplow on November 11, 2016

Is-Hard-Drive-Failure-a-Reality-for-SMBs-Chart.png

As an MSP, you understand how crucial business continuity and disaster recovery are for modern businesses. You’ve seen the downtime stats and you’ve dealt with disasters, but what does this look like from your clients’ point of view? Selling backup and disaster recovery (BDR) is a challenge for many MSPs, but it might be because small- and medium-sized businesses (SMBs) don’t fully understand the need for continuous uptime. If your prospective clients don’t have a business continuity plan in place or take for granted their ability to access data 24x7x365, ask them, “could your businesses survive a disaster?”

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, Data Loss, MSP Sales Chart

6 Important OS Hardening Steps to Protect Your Clients

Posted by Hunter Smith on November 9, 2016

6 Important OS Hardening Steps to Protect Your Clients.jpg

According to the 2016 Duo Trusted Access Report, fifty-three percent of Mac OS users are running either the fully patched, latest version of OS X, or the previous version, compared to thirty-five percent of Windows users on Windows 10 and 8.1. That means the majority of these operating systems are outdated.

As you know, proper patch management is critical to protecting client data and uptime, but it's just one of many security considerations. With Ransomware-as-a-Service and Angler, Bedep and Neutrino exploit kit adoption on the rise, MSPs must strengthen client defenses against outside attacks. When attempting to compromise a device or network, malicious actors look for any way in. Unbeknownst to many small- and medium-sized businesses, operating system vulnerabilities provide easy access. In order to provide clients with peace of mind, safeguard their sensitive information and differentiate your security services from the competition, here are six ways to harden customers' operating systems: 

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

4 Essentials MSPs Forget When Disaster Recovery Testing

Posted by Mary McCoy on October 26, 2016

4 Essentials MSPs Forget When Disaster Recovery Testing.jpg

By now, most MSPs recognize that offering backup is table stakes. Your clients can receive this service from any number of your competitors. In order to stand out and increase monthly recurring revenue (MRR), focus on the disaster recovery (DR) aspect of backup and disaster recovery (BDR). Offer your clients DR testing!

To fully capitalize on the advantages of DR testing, keep the following four best practices in mind when adding this service to your IT portfolio. 

Read More

Topics: Data Protection, Information Security, Backup and Disaster Recovery

Why Small Medical Practices Struggle with HIPAA Compliance [CHART]

Posted by Lily Teplow on October 21, 2016

Why Small Medical Practices Struggle with HIPAA Compliance.jpgDo you serve clients in the healthcare industry? As their MSP, you’re well aware that these organizations have a responsibility to their customers and patients to maintain the security of their data – which means that they must be HIPAA (Health Insurance Portability and Accountability Act) compliant. HIPAA has completely changed the way electronic medical and health records are created, received, modified, transmitted or stored, yet many practices still struggle to become and remain HIPAA compliant. Not only do they face exorbitant fines for violating HIPAA law, healthcare companies also can’t afford to lose clients’ trust in their ability to safeguard patient information. So how can your managed IT services help them do just that?

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, Healthcare IT, MSP Sales Chart

Mirai: The IoT Botnet Malware Behind Recent DDoS Attacks

Posted by Tyler Moffitt on October 18, 2016

IoT_Botnet_Malware_22Mirai22.jpg

Recently, the source code for the Internet of Things (IoT) botnet malware, Mirai, was released on hack forums. This type of malware was used last month in an historic distributed-denial-of-service (DDoS) attack against KrebsOnSecurity, which was estimated to have sent 650 gigabits per second of traffic from unsecured routers, IP cameras, DVRs and more to shut down the domain. Thanks to DDoS prevention measures by engineers at Akamai, the company protecting Krebs, the attack was unsuccessful; however, they report that this attack was nearly double the size of the largest one they’d previously seen.

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

4 New Encrypting Ransomware Variants to Watch Out for

Posted by Courtney Margossian on October 13, 2016

4_New_Encrypting_Ransomware_Variants_to_Watch_Out_for.jpg

Each day, Webroot discovers 6,000 phishing sources, 80,000 new malware and potentially unwanted applications and 51,000 new mobile malware. 

Cyber threats are even more sophisticated than they were last year and as they continue to grow, the business is ever-changing. And I do mean business. With payouts in the thousands of dollars and fewer barriers to entry, cybercrime has become a lucrative opportunity for the masses. Dubbed Ransomware-as-a-Service, there are now portals where anyone can create a ransomware payload for free. No coding or scripting knowledge is required. Instead, you simply have to input your specifications for the amount to charge, ransom payment window, late fee and more. What's the catch? The portal creator gets a cut of the profit you make. Still, the payout is significant and as business ventures like this grow in popularity, ransomware will become increasingly common.

To help protect your clients against the latest attack tactics, Tyler Moffit, Senior Threat Analyst of Webroot recently joined us for the webinar, Crypto Ransomware - The Who, What, Why and How. There were many takeaways from the program, available for download below, including overviews of four new encrypting ransomware variants. 

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

How to Calculate the Cost of Downtime for Your Clients

Posted by Mary McCoy on October 11, 2016

How_to_Calculate_the_Cost_of_Downtime_for_Your_Clients.jpgHow can you help your clients truly understand how downtime hurts their business? For companies today, there is only one universal standard by which they will "get it." That standard is money. The impact on the top and/or bottom line is often the deciding factor in any business decision, including the decision to purchase your business continuity services. As your clients' trusted partner and managed IT services provider (MSP), you're responsible for minimizing service disruptions and unplanned downtime. In order to do this, you first have to help your clients understand exactly what a downtime event can cost their business.

Read More

Topics: Revenue Growth and Profitability, Data Protection, Backup and Disaster Recovery

How BDR Can Protect SMBs Against Unplanned Data Loss [CHART]

Posted by Lily Teplow on October 7, 2016

Do you struggle with selling your backup and disaster recovery (BDR) solution? If so, you’re not alone. Selling BDR to small- and medium-sized businesses (SMBs) is a major challenge for many MSPs, especially when you’re overwhelmed with common excuses like “backup isn’t that important,” or “data loss could never happen to me!” So how can you effectively combat these misconceptions and convince potential clients that they need your managed IT services?

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, MSP Sales Chart

Mr. Robot is Shining a Light on Cybersecurity

Posted by Joseph Tavano on October 6, 2016

robot_deb3g_mediagallery_impose.png

image: http://www.usanetwork.com/mrrobot/photos

The show creators are paying attention to the IT industry, so it might be time to pay attention to them.

One of the breakout cable TV show hits of 2015, Mr. Robot wrapped up its second season (don’t worry, no spoilers in this article), and has been gaining traction with viewers ever since the show premiered. The show centers on Elliot Alderson, a cybersecurity engineer by day and a hacker by night. The plot has tons of twists and turns, making it easy to binge watch over the course of a rainy weekend.

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Will You Be Prepared When a Downtime Event Strikes? [CHART]

Posted by Lily Teplow on September 23, 2016

Did you know that 50% of small- and medium-sized businesses (SMBs) have no backup or disaster recovery plan in place? With all the risks that come with severe data loss and extended downtime, it’s surprising that these people aren’t doing more to safeguard their business. If you have clients or prospects that may be hesitant to invest in a backup and disaster recovery (BDR) solution, use this chart to help make the sale!

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, MSP Sales Chart

How MDM Can Fend off Threats to Endpoint Security [CHART]

Posted by Lily Teplow on September 16, 2016

Mobility is a necessary part of the modern workplace. Mobile devices improve business efficiency and productivity, but they also have the ability to expose and compromise company data. If your client’s endpoints aren’t being protected by a solution like Mobile Device Management (MDM), vulnerabilities have a higher likelihood of being successfully exploited. To determine if clients and prospects are ready to invest in your MDM solution, ask them this: are you fully protected against today’s endpoint security threats?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Mobile Device Management and IT Mobility, MSP Sales Chart

Addressing Data Security Threats from Shadow IT

Posted by Franklyn Peart on September 13, 2016

According to IDC, business file sync and share is one of, if not the most popular cloud service with small- and medium-sized businesses (SMBs). However, this solution often causes shadow IT–related problems and unsanctioned company data access, though it is viewed by businesses as a productivity enabler.

Read More

Topics: Data Protection, Information Security, Navigate 2016

How Managed Services Fulfills the IT Needs of SMBs [CHART]

Posted by Lily Teplow on September 9, 2016

One of the biggest challenges in selling managed IT services is that small- and medium-sized businesses (SMBs) may underestimate the need to invest in IT expertise. As a savvy MSP, you know that these businesses are continuing to grow more dependent on modern technologies and systems. So how can you convince them to protect their IT infrastructure with your managed services?

Read More

Topics: Business Development and Growth, Sales and Marketing, SMB Trends, MSP Sales Chart

Why SMBs Need to Disaster-Proof Their Business [CHART]

Posted by Lily Teplow on September 2, 2016

Are your clients’ businesses going to be able to operate normally after a disaster strikes? Catastrophes such as floods, employee error and hardware failure can wreak havoc on businesses of all sizes if their data isn’t secured properly – making the recovery process very demanding, time-consuming and expensive. This is especially true for small- and medium-sized businesses (SMBs) who haven’t taken preventative measures and preparations. Without a reliable backup solution or disaster recovery plan, how can your clients ensure that their data is protected from the elements?

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, MSP Sales Chart

Can Managed Services Bridge the IT Skills Gap for SMBs? [CHART]

Posted by Lily Teplow on August 26, 2016

Can-Managed-Services-Bridge-the-IT-Skills-Gap-for-SMBs.png 

The IT skills gap phenomenon isn’t a new concept, but it has become increasingly evident in the past several years. Most small- and medium-sized businesses (SMBs) have the same IT needs as larger organizations, but unfortunately lack the necessary internal bandwidth and resources. With new IT rules being written every day, complicated by the internet of Things (IoT) and an increasingly mobile workforce, IT professionals need to stay up-to-date and receive the latest certifications to cover their bases. As conditions continue to evolve, how can SMBs deal with the widening skills gap?

Read More

Topics: Sales and Marketing, SMB Trends, Client Acquisition and Management, MSP Sales Chart

Why SMBs Need Business Continuity & Data Management [CHART]

Posted by Lily Teplow on August 19, 2016

Have you and your clients grown numb to statistics showing the amount of digital data being generated in today’s IT landscape? The small-and medium-sized businesses (SMBs) you serve rely on 24x7x365 access to a myriad of data for day-to-day operations, customer understanding and essential business metrics. Due to the abundance of business-critical information, protecting and managing big data has become their top priority. However, many SMBs have not fully connected the dots between developing and implementing business continuity as a data preservation strategy and growing business profitability as a result.

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, MSP Sales Chart

Why BDR is the Answer to Costly Downtime [CHART]

Posted by Lily Teplow on August 5, 2016

Do your clients know what an hour of downtime could cost their organization? Outages can impact businesses of all shapes and sizes and however major or minor, ultimately lead to downtime – which can be quite costly and potentially destroy a business’ margins and reputation. Without a proper backup solution in place to safeguard their valuable data, businesses risk closing up shop when a disaster strikes.

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, MSP Sales Chart

Why IT Security Is a Top Concern for SMBs [CHART]

Posted by Lily Teplow on July 29, 2016

Although security is one of the most talked about topics in the IT channel today, there’s a widespread lack of education and awareness in the workplace. Small and medium-sized businesses (SMBs) are welcoming more technology into their everyday environment, but the rapid development of this technology is also accompanied by changes in cybersecurity and Internet threats.

Read More

Topics: Sales and Marketing, Data Protection, Information Security, SMB Trends, MSP Sales Chart

Are Your Employees Risking Sensitive Company Data? [CHART]

Posted by Lily Teplow on July 22, 2016

In today’s job landscape, the ability to access work files and email on-the-go has become part of everyday operations. Smartphones and tablets continue to flood the workplace, and your clients’ employees are storing a lot of important data on them. So how can they ensure that the corporate data being accessed through these mobile devices stays secure?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Mobile Device Management and IT Mobility, MSP Sales Chart

A Bad Case of Stagefright: Vulnerability Resurfaces in Apple Devices

Posted by Joseph Tavano on July 21, 2016

Imagine this scenario:

You woke early from a great night of sleep, well rested. The sun is shining outside. It’s Saturday, and you have no plans whatsoever, for the first time in a long time. The day is yours to make it whatever adventure you choose it to be. The world isn’t perfect, but right now life is good.

You take your phone off the charger, and notice tat you have no messages. Odd! You typically have a few, if only from social media. Further investigation reveals your contact list is gone. Emails, texts, messages, and photos too. Apps, data—everything has been wiped from your phone! While you were sleeping, the attacker gained access to all of your sensitive data through your phone, locked you out of your email and banking accounts, and gained access to your business’ secure network. And to make matters worse, you don’t know how it happened.

Read More

Topics: Industry News, Information Security, Mobile Device Management and IT Mobility

HIPAA 2016 - New Audits Under Way

Posted by Mary Crogan on July 21, 2016

According to HealthcareInfoSecurity.com, the Department of Health and Human Services Office of Civil Rights (OCR), which is responsible for HIPAA enforcement, has launched phase two of their HIPAA Audit Program in an effort to review the policies and procedures adopted by covered entities and their business associates.

If the OCR auditors come knocking, will you and/or your clients be ready?

Read More

Topics: Industry News, HIPAA, Healthcare IT

Pokémon GO and What It Means for MSPs

Posted by Lily Teplow on July 19, 2016

Over the past two weeks, cartoon creatures have officially taken over our world. If you haven’t seen them, it’s because they’re only visible when playing the new game, “Pokémon GO”. This free smartphone game fuses virtual technology with the physical world, causing it to quickly become a cultural phenomenon and the biggest mobile game in U.S. history.

However, Pokémon GO’s rapid rise in popularity has also raised some major security concerns. While millions of users wander the world searching for Squirtles and Pikachus, they may not be aware of what they’re giving up in return for playing the game.

Read More

Topics: Industry News, Information Security, Mobile Device Management and IT Mobility, Cybersecurity and Threat Management

Data Casualties in Healthcare Cyber Attacks [CHART]

Posted by Mary McCoy on July 15, 2016

Do you have any upcoming, in-person meetings with prospects in the healthcare vertical that you're hoping to close into clients? If so, you're probably working out your plan of attack. Distributing printed collateral is smart, but I recommend you also develop a formal, company-branded presentation that draws your audience in. In developing the content for your deck, keep it as customer-centric as possible. What's going to resonate with the audience you pitch to? What do they need to know in order to understand the value of your managed IT services?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Healthcare IT, MSP Sales Chart

HIPAA Business Associate Violation Results in $650K Fine

Posted by Mary McCoy on July 7, 2016

The HIPAA Security Rule is in full effect! The first Business Associate HIPAA penalty made news Tuesday, following a data breach incident two years prior. Who's atoning for this cardinal data sin? The Catholic Health Care Services (CHCS) of the Archdiocese of Philadelphia, a nonprofit organization now forced to pay a $650,000 fine. As a business associate legally obligated to adhere to federal regulation, CHCS is being held financially responsible for the breach of six nursing facilities, compromising 412 patients' Protected Health Information (PHI).

While many MSPs are compelled and encouraged to meet the demand for HIPAA compliance by serving the lucrative healthcare vertical, let this ruling serve as a wake-up call that there are costly consequences when MSPs themselves aren't compliant. What led to this unprecedented turn of events, and how can you prevent your MSP practice from suffering the same fate? Here's the Who, What, When, Where, Why and How, our data breach MSP debrief!

Read More

Topics: Industry News, Information Security, Backup and Disaster Recovery, Healthcare IT, Data Loss

Human Error: The Biggest Risk to Client Data?

Posted by Lily Teplow on June 30, 2016

We all make mistakes. I mean, we’re only human after all. But did you know that according to CompTIA’s Trends in Information Security study, human error actually accounts for 52 percent of security and data breaches? Yikes, looks like being human can be a big cause for concern when it comes to any business’s data security.

Although human error is normal and inevitable in some cases, it can be more of a threat to businesses than most are aware of – including your clients! Backup and disaster recovery (BDR) plays an important role in ensuring that these mistakes don’t turn into serious problems. Read on to discover how you can inform your clients of these threats and protect them against potential data disasters.

Read More

Topics: Data Protection, Backup and Disaster Recovery, Cybersecurity and Threat Management, Data Loss

What MSPs Can Learn from the TeamViewer Breach

Posted by Mary McCoy on June 8, 2016

Last week's unsettling discovery of the TeamViewer data breach caused widespread anxiety and public outcry about the remote access tool's network security. While the remote access software company firmly denies any allegations that they were hacked, countless users (including many in the U.K.) flocked to Reddit and other social media sites to report that their accounts had been compromised, giving hackers remote access to their desktops. Although TeamViewer has faced backlash for blaming the breach on careless user behavior, no matter who's to blame in the scenario, this attack highlights the need to teach users stronger password management policies and the importance of a BDR solution. What else can MSPs take away from the TeamViewer breach, and what do users need to know?

Read More

Topics: Industry News, Data Protection, Information Security, Backup and Disaster Recovery, Data Loss

The Intangible Costs of Data Breach and Data Loss

Posted by Joseph Tavano on June 2, 2016

The monetary cost of a data breach or data loss, and all the concomitant penalties that arise with it, are substantial and well documented. A single data breach can cripple or close a small business. However, for the smaller percentage that manages to survive, there are also numerous issues to deal with following a data loss event that could lead to significant monetary loss.

Read More

Topics: Data Protection, Backup and Disaster Recovery, Continuum BDR, Data Loss

HIPAA Compliance Checklist - Updated for 2016

Posted by Brandon Garcin on May 20, 2016

HIPAA (Health Insurance Portability and Accountability Act) compliance is designed to protect patient privacy and set standards for how medical records can be shared and how they must be safeguarded. HIPAA compliance isn’t just for those directly within the healthcare industry, however - in fact, nearly anyone dealing with electronic Protected Health Information (ePHI) including doctors, hospital technicians and yes, the healthcare Managed IT Services Providers (MSPs) who manage hospital computers and networks in the cloud are required to be HIPAA compliant.

What does that mean for YOU?

Read More

Topics: Industry News, HIPAA, Healthcare IT

4 Need-to-Know Ransomware Trends & Findings

Posted by Mary McCoy on May 12, 2016

Ransomware is everywhere right now. Whether it's in the news coverage of latest exploits or in that seemingly harmless attachment sitting in your inbox, malware is running rampant! But beyond the ransomware basics like "email phishing is a major threat vector" and "cybercriminals demand Bitcoin to unlock files," what else do you need to know? What malicious trends are on the rise and how do they impact the way you position your data security services to prospects and clients? We've scoured the Web (well, not the Dark Web) to deliver the latest cybersecurity and ransomware findings!

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management, Data Loss

Badlock/Bad Luck - What MSPs Can Do Before April 12th Patches

Posted by Mary McCoy on April 6, 2016

April 12th. Memorize that date like it's your mother's birthday. April 12th. 

In case you haven't heard, a security vulnerability called Badlock was recently discovered in Windows and Samba. While the nature of the bug has not yet been revealed, patches along with details of the flaw will be released next week, on April 12th. Ever since news of the vulnerability broke in March, hackers have been salivating at the mouth, ready to pounce. Indeed, some may have already discovered the bug. Since attackers will be eagerly awaiting the disclosure, once patches are released next week, Windows and Samba users must immediately patch their systems to prevent exploitation. This should serve as a warning to all MSPs to act now, and get your house in order. 

Read More

Topics: Industry News, Data Protection, Information Security

Is Windows 10 already Hiding on your Clients' Computers?

Posted by Joseph Tavano on March 3, 2016

Imagine for a moment that you went to a build-your-own-burrito place for lunch. You build a killer, delicious burrito. You’re not afraid to pay for what you want, and even spring for a few pricier items to be included. Lunch is going to be delicious. Then, the burrito-maker asks you if you’d like to upgrade your burrito with a brand-new flavor sauce you’ve never tasted. Because you have little to no info or desire for this new special sauce, you decline the upgrade.

Read More

Topics: Industry News, Information Security, IT Community

VIDEO: Wireless Devices Put Users at Risk: IT Rewind Episode 67

Posted by Ben Barker on February 26, 2016

Wireless mice and keyboards could allow attackers to take over user devices. Meanwhile, lawmakers are pushing for the creation of an encryption commission. To hear more, just click play!

Read More

Topics: Industry News

Summer Trends and Stats Every MSP Should Know

Posted by Lily Teplow on July 8, 2015

Summer is the most popular season for new trends to catch on. This season has most people saying “out with the old, and in with the new!” Even in the business world, it’s essential to stay up to date on current trends in order to keep your business in style. This is especially important to those working in the technology industry, where everything is constantly changing and upgrading.

There’s nothing more important than staying “in-the-know” this season, which is why the next item on our MSP Summer BuckIT List is to familiarize yourself with the industry you’re working in! Here are some key trends and statistics every MSP should know to help you prepare for the fast-changing future. Keep reading to see what’s in this summer, and what's going out of style.

 

Read More

Topics: Industry News, SMB Trends

The Top 5 MSP Blog Posts of June 2015

Posted by Alicia Lazzaro on July 1, 2015

With June wrapping up, we have a lot to look forward to in the coming summer months: weekends away at the beach, barbeque's that last all day and roasting marshmallows by a campfire. Even though there is a lot of fun to be had in the summer, there is still work to be done and lots of blog posts to be read. Check out some of these highlights from June, including why break-fix services are bad for your business, ways to stay secure online and the most common types of user error and how to prevent them.

Read More

Topics: Cybersecurity and Threat Management, Data Loss, Workforce Optimization and Employee Retention

What Your SMB Clients Look for in their MSP [Infographic]

Posted by Mary McCoy on March 27, 2015

Only 17% of SMBs say they're where they want to be with technology. How are you addressing the other 83% with IT support needs? First, you have to better understand those needs to see if your MSP business is the right fit. 

Taken from responses from 500 executives with small to medium-sized businesses, CompTIA's recent Enabling SMBs with Technology study looks at how SMBs use technology, providing meaningful statistics MSPs can use to determine opportunities for their outsourced IT expertise. What are your prospective clients' technology insecurities and priorities? We've synthesized them into this shareable infographic. Enjoy!

Read More

Topics: Business Development and Growth, SMB Trends

The More SMBs Know: BDR Edition

Posted by Joseph Tavano on March 23, 2015

Managed IT service providers are experts in their field (and often in many others as well). Day in, day out, they are focused on a variety of services and issues that are commonplace in the channel: closing tickets, providing support, meeting client needs, and growing business, among many others.

However, time and time again, MSPs find that there is a significant disconnect between the services that MSPs provide and the IT issues SMB clients feel are critical to the success of their business. This can lead to a situation where MSPs are providing all the services requested by their client, but not all the services the client optimally needs. Specifically, many SMBs have gaping holes in their BDR and security strategies that they don’t know even exist.

Read More

Topics: Data Protection, Information Security, Backup and Disaster Recovery, SMB Trends

Load More
RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]