With June wrapping up, we have a lot to look forward to in the coming summer months: weekends away at the beach, barbeque's that last all day and roasting marshmallows by a campfire. Even though there is a lot of fun to be had in the summer, there is still work to be done and lots of blog posts to be read. Check out some of these highlights from June, including why break-fix services are bad for your business, ways to stay secure online and the most common types of user error and how to prevent them.
Why Including any Break-Fix Services in Your Offering Is Bad for Business
Posted by Mary McCoy on June 1, 2015 at 6:00 AM ET
Whether you're a break-fix shop that's re-evaluating your business model and considering managed IT services or you're a new MSP that's afraid to turn away any business you can get, reactive IT support is not the answer. In the following blog post, I'll explain how
- the two approaches differ
- break-fix contracts exhaust resources, prevent predictable revenue streams and jeopardize relationships with managed services customers
- MSPs can scale and grow their businesses by exclusively offering managed services
5 Ways to Stay Secure Online
Posted by Matt Mainhart on June 8, 2015 at 6:00AM ET
Most places we go, there is a network connection for us to link up to. This is our gateway to any and all information, as well as each other. When we open an Internet browser, we tend to take for granted that we are secure in surfing the web.
At home, we protect our family and belongings with locks and deadbolts. These are a measure to keep the bad guys at bay. But how do we protect ourselves when browsing the World Wide Web? What are we doing to secure our information?
Below are 5 ways to keep your information safe.
How Well Do You Know the Decade's Biggest Data Breaches? [Quiz]
Posted by Mary McCoy on June 3, 2015 at 6:00 AM ET
It's been quite the 10 years for data breaches, hasn't it? Maybe you've been repressing those awful memories from cybercriminal attacks past. Then again, you might be able to recall the results of 2014's Target and 2008's Heartland data breaches, down to the last stolen record and compromised credential. I want to see how much you know about the decade's worst data security fails. Do you think you can hack it? Play to win in this quiz about data loss!
Then, share this post with your colleagues and on your own websites to show the world of managed IT services just how important data protection is for business longevity...oh and that you're really smart for getting all 10 questions correct, of course!
The Most Common Types of User Error and How to Prevent Them
Posted by Ben Barker on June 10, 2015 at 6:00 AM ET
Completely eliminating user error is impossible. No matter how hard we may try, it simply isn't feasible to expect to completely eliminate user mistakes from the scope of issues that affect managed IT services. So what is the next best thing? Well, it would seem like identifying the most common forms of user error and taking the best measures to prevent those issues is a good start.
With that in mind, we reached out to the people who know user error best, you! We asked you (via Reddit and Spiceworks) to tell us about specific cases of user error that you see the most and how/if you attempt to educate your clients in order to reduce or eliminate those mistakes.
How to Manage Workplace Interruptions & Build a Culture of Ruthless Productivity
Posted by Andrew Moon on June 2, 2015 at 12:00 PM ET
Being an entrepreneur can be a challenge to put it mildly. The odds of survival are stacked against us before we even start the day. Yet we press on undaunted. In most cases we wear many different hats throughout the course of a single day. The challenge is how to get it all done without losing our minds. The word productivity seems to be an oxymoron.
Stay tuned for continuous blog posts throughout the summer!
By Lily Teplow
By Lily Teplow
By Brian Downey