MSP Blog Logo

Cyber Security

Business Growth

Sales and Marketing

IT Services


Empowering Your MSP Business to Grow and Prosper—One Post at a Time


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

Play MSP Would You Rather - Cyber Security Edition!

Posted December 14, 2015by Mary McCoy

What lengths would you go to to protect client data from the most dastardly of cyber threats? In a previous edition of Would You Rather, we learned that 73% of respondents would prefer to get hit with a shovel than with CryptoLocker. Ouch! Would you endure physical pain to prevent your customers from becoming the latest victims of malware or phishing schemes? What would you do to avoid data loss or a data breach? Find out in this cyber security edition of MSP Would You Rather!


According to the Hill, in 2014, the FBI determined the ransomware had infected 234,000 computers and accumulated $27 million in payments. Since then, ransomware has only grown with variants such as CryptoWall, CryptoWall 2.0, CryptoWall 3.0 and the recent CryptoWall 4.0.

A recent Symantec report found that at least 317 million new malicious programs were generated last year, with around 1 million new malware threats released daily.

You can't completely forego patching when it helps protect you against viruses, threats, and any unwanted exposure of user or machine information, but is too much of a good thing a bad thing? Given the Patch Tuesday Outlook mess that occurred last week around the KB 3114409 update, blindly deploying patches is unwise.

DID YOU KNOW? According to IBM's "2014 Cyber Security Intelligence Index," 95% of all security incidents involve human error, with email phishing acting as the number one contributor.

Check out this list of IT certifications for your techs to pursue in 2016!

Proactively overseeing a firewall
means using management tools to monitor application, web content and user filtering. A good firewall solution will equip you with tools that allow you to continually see what's happening within a client's network.

OK, so this one's just more fun than anything. We all know hackers have termites in their smiles. 

Although service providers are not held responsible in the event of a credit card breach, you still need to prove to the necessary clients that your data management, security and retention standards are PCI compliant. Do you have their backs? Find out how to help your clients become and remain PCI compliant!

What does it take to actually manage a backup and disaster recovery (BDR) solution?
Check out our infographic!

The only way to recover files corrupted by CryptoWall 4.0 is by paying the ransom or restoring backed up data. You can't deliver data loss prevention without offering backup and disaster recovery (BDR) services.


So how'd you stack up against your peers? Did any results surprise you? Tell us all about it in the comments section below!


Image sources:

Meet Mary! Mary McCoy is a Senior Demand Generation Programs Manager at Continuum, where she's worked for over two years. Mary has consulted with hundreds of partners, lending website, blog and social media support. Before that, she graduated from the University of Virginia (Wahoowa!) with a BA in Economics and served as digital marketing intern for Citi Performing Arts Center (Citi Center), spearheading the nonprofit’s #GivingTuesday social media campaign. Like her school’s founder, Thomas Jefferson, Mary believes learning never ends. She considers herself a passionate, lifelong student of content creation and inbound marketing.

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus