MSP Blog Logo

Cyber Security

Business Growth

Sales and Marketing

IT Services


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

The Top 5 MSP Blog Posts of August 2018

Posted August 31, 2018by Lily Teplow


What are the keys to selling security services? How do you sell IT services based on their value? How can you get the most out of a simple checklist? We answer these questions and more in our roundup of the MSPblog's most popular posts of August 2018.

See below for the top five blog articles our readers couldn’t get enough of this month.

5-Step Strategy for Selling Cybersecurity to SMBs


How do you successfully sell cybersecurity to small-to- medium sized businesses (SMBs)? First, try saying that five times fast! If you’re a managed IT services provider (MSP) looking to grow revenue through managed security, you’ve come to the right place.



Are You Selling Managed Services Based on the Value They Provide? Here's How to Know for Sure.


I've spent a lot of my time working closely with MSP business owners—strategizing on sales and marketing—over the course of my career. If there's one particular trap that I see people constantly fall into when it comes to selling managed services, that I believe is absolutely worth exploring, it's not selling on their value.



6 Things MSPs Should Know About Checklists


Getting things done is an essential part of being in business. But it’s not as easy as it sounds. Increased task complexity, combined with the need to delegate, creates situations where you have to trust others on your team to perform essential tasks.

At IT Glue, we’ve found that the best way to make sure that everything gets done, in the right order, is by using checklists. For those in the know, checklists are powerful tools. For those not in the know, they’re probably used mostly for grocery shopping. Let’s take a look at some things you might not know about the humble checklist.



PGA of America Servers Hacked as Part of Ransom Scheme


In an increasingly dangerous era of cybercrime, hackers have now found a new target: major golf tournaments. On August 8, news broke about the latest hacking attack against the Professional Golfers Association (PGA) servers, locking files and demanding ransom just days before the competition took place.

As an MSP, hacking and ransomware are not new concepts. However, news headlines typically only cover enterprise-level attacks, now including the PGA of America. So, how can you bring a major news story like this down to your SMB clients’ level?



How to Break Bad IT Security Habits


It seems like there’s always that one employee who’s not only careless when it comes to IT security, but also resistant to changing their habits—that inevitable hole in your systems that could easily crash your business. As an IT provider offering managed security, you have quite the undertaking to assume the responsibility of minimizing human error and strengthening your clients’ security posture. The question is, what does it take to break the bad security habits that have been embedded in countless SMBs?

The cadence of “good” security hygiene is daily. With a checklist of daily security guidelines that includes continuous cyber security education and threat monitoring, your clients will be in the best shape possible for dodging cyber attacks. Here are three key areas to hone in on.



I hope you've enjoyed this month's roundup of our top posts on the MSPblog. Be sure to subscribe to our award-winning blog to receive these insightful tips and more throughout the rest of the year!


Handpicked for you:
Download Explaining Cyber Security eBook

Lily is passionate about storytelling, marketing, and helping businesses solve their biggest challenges. In her role as Public Relations and Media Specialist at Continuum, she is responsible for enhancing the company’s voice and presence through online and offline channels. With a background in communications and content creation, Lily is a seasoned and established writer in the IT industry. In her spare time, Lily enjoys traveling the world and cheering on her favorite Boston sports teams.

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus