MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

The Top 5 MSP Blog Posts of August 2018

Posted August 31, 2018by Lily Teplow

August-18-Blog-Roundup

What are the keys to selling security services? How do you sell IT services based on their value? How can you get the most out of a simple checklist? We answer these questions and more in our roundup of the MSPblog's most popular posts of August 2018.

See below for the top five blog articles our readers couldn’t get enough of this month.

5-Step Strategy for Selling Cybersecurity to SMBs

5-Step-Strategy-for-Selling-Cybersecurity-to-SMBs

How do you successfully sell cybersecurity to small-to- medium sized businesses (SMBs)? First, try saying that five times fast! If you’re a managed IT services provider (MSP) looking to grow revenue through managed security, you’ve come to the right place.

Read More » 

 

Are You Selling Managed Services Based on the Value They Provide? Here's How to Know for Sure.

Are-You-Selling-Managed-Services-Based-on-the-Value-They-Provide-

I've spent a lot of my time working closely with MSP business owners—strategizing on sales and marketing—over the course of my career. If there's one particular trap that I see people constantly fall into when it comes to selling managed services, that I believe is absolutely worth exploring, it's not selling on their value.

Read More » 

 

6 Things MSPs Should Know About Checklists

IT-Glue_6-Things-MSPs-Should-Know-About-Checklists

Getting things done is an essential part of being in business. But it’s not as easy as it sounds. Increased task complexity, combined with the need to delegate, creates situations where you have to trust others on your team to perform essential tasks.

At IT Glue, we’ve found that the best way to make sure that everything gets done, in the right order, is by using checklists. For those in the know, checklists are powerful tools. For those not in the know, they’re probably used mostly for grocery shopping. Let’s take a look at some things you might not know about the humble checklist.

Read More » 

 

PGA of America Servers Hacked as Part of Ransom Scheme

PGA-of-America-Servers-Hacked-as-Part-of-Ransom-Scheme

In an increasingly dangerous era of cybercrime, hackers have now found a new target: major golf tournaments. On August 8, news broke about the latest hacking attack against the Professional Golfers Association (PGA) servers, locking files and demanding ransom just days before the competition took place.

As an MSP, hacking and ransomware are not new concepts. However, news headlines typically only cover enterprise-level attacks, now including the PGA of America. So, how can you bring a major news story like this down to your SMB clients’ level?

Read More » 

 

How to Break Bad IT Security Habits

How-to-Break-Bad-IT-Security-Habits

It seems like there’s always that one employee who’s not only careless when it comes to IT security, but also resistant to changing their habits—that inevitable hole in your systems that could easily crash your business. As an IT provider offering managed security, you have quite the undertaking to assume the responsibility of minimizing human error and strengthening your clients’ security posture. The question is, what does it take to break the bad security habits that have been embedded in countless SMBs?

The cadence of “good” security hygiene is daily. With a checklist of daily security guidelines that includes continuous cyber security education and threat monitoring, your clients will be in the best shape possible for dodging cyber attacks. Here are three key areas to hone in on.

Read More » 

 

I hope you've enjoyed this month's roundup of our top posts on the MSPblog. Be sure to subscribe to our award-winning blog to receive these insightful tips and more throughout the rest of the year!

 

Handpicked for you:
Download Explaining Cyber Security eBook

Lily is a Content Marketing Manager at Continuum and is passionate about helping businesses solve their biggest challenges. She is responsible for managing Continuum’s MSPblog and writing on a variety of topics, from sales and marketing to cybersecurity, helping establish authority in the MSP market. Lily is also a seasoned content creator and has supported Continuum’s PR and media efforts. In her spare time, Lily enjoys singing, traveling the world, and cheering on her favorite Boston sports teams!

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus