MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

The Top 5 MSP Blog Posts of October

Posted November 2, 2015by Mary McCoy

Another month of managed IT services blog posts on the books! I trust that you all had fun Halloweekends. Perhaps you even rocked one of these classic tech costumes. As we head into a new month, it's time to brush off the cobwebs and throw out those rotting pumpkins. Have you been too complacent with your backup policies, failing to address how secure and effective they really are? Are you struggling to connect with prospects and clients because you don't know how to pitch your services in a language they can understand? 

Enjoy reading October's top five managed IT services blog posts over a plastic cauldron of Halloween candy! Just don't touch the candy corn...that stuff is gross.

Outatime: The Tech of Back to the Future Part II

Posted by: Joseph Tavano
Oct 21, 2015 at 6:00am ET

Where we’re going, we don’t need roads.

Twenty-six years ago, I was shown a vision of the future, and it was amazing. At the tender age of 9, I looked at a world that was all neon and new and instantly found it wild, alien and exciting, and yet at the same time approachable, familiar and livable.

Of course, I’m talking about the seminal film Back to the Future Part II, the second film in an epic trilogy that spans 130 years and multiple generations of the McFly family, the fictional city of Hill Valley, California, and chronicles the adventures of one Doctor Emmet Brown. If you haven’t seen it, you probably should. Stop here, go watch it, and come back.

Read More »

 

5 Things from the 90s Tech World No One Misses

Posted by: Joseph Tavano
Oct 6, 2015 at 6:00am ET

Ah, the 90s—that glorious decade that started with the premiere of The Simpsons and ended with apocalyptic fears due to a system clock error. It was the decade in which we saw the promises of technology begin to change the world. Personal computers and mobile phones proliferated, music got industrial, and the Internet was born. It was an exciting time when everything seemed possible…no, that’s not quite right: everything seemed eventual.

We dreamed of the days of portable handheld devices where everything was connected and all the world’s information was at our fingertips. We also dreamed of hoverboards. These things happened, and it’s spectacular! But while there was so much to marvel at, there were plenty of things we were all happy to leave behind as time marched on. Let’s look at a few.

Read More »


6 Clues That You Might Be a Jargonaut

Posted by: Jeanne Hopkins Oct 19, 2015 at 6:00am ET

You’re an IT professional. Can you define “hard-copy multitask window array”?

According to Edward Tenner, “HMWA is a sedentary-mode ergonomic workstation for interruptible sequential bio-optical scanning, psycho-motor-actuated text generation and arithmetic operations, featuring visually discriminable nonvolatile off-line storage with prehensile data retrieval, and operator-resident processing protocols for alphanumeric/graphic inputs and outputs.”

Of course you don’t talk like that. Or do you? What if you’re a jargonaut* and don’t even know it?

Read More »


8 Vulnerabilities You Didn’t Know Existed in Your System Configuration

Posted by: Yves DorleansOct 13, 2015 at 12:00pm ET

Unsophisticated intruders using simple tools often are successful in breaching organization’s networks due to configuration errors, lack of IT controls and secure internal processes. During my blog series, we will cover simple countermeasures, safeguards that are easy to implement, that should significantly decrease the chance and occurrence of hacks and data loss. First, let us go through the 8 basic avenues that are available to cybercriminals:

Read More »


Breaking Down Public and Private Clouds

Posted by: Ben BarkerOct 20, 2015 at 6:00am ET

Public or private? That is the question. When talking about cloud backup, you need to fully understand the differences between public and private clouds and which makes the most sense for your business. As is the case with many business decisions, there are pros and cons for both options. However, the private cloud is starting to look like an outdated, expensive alternative to the public cloud.

Let's find out why.

Read More »

 

 

I hope you've enjoyed these hit posts from October. Have you subscribed to our MSPblog? Get instant updates as we bring you more great posts throughout the rest of November and the end of the year!

Are you looking to grow AND scale your business?

The Definitive Guide to Managed IT Services [eBook]

Meet Mary! Mary McCoy is a Senior Demand Generation Programs Manager at Continuum, where she's worked for over two years. Mary has consulted with hundreds of partners, lending website, blog and social media support. Before that, she graduated from the University of Virginia (Wahoowa!) with a BA in Economics and served as digital marketing intern for Citi Performing Arts Center (Citi Center), spearheading the nonprofit’s #GivingTuesday social media campaign. Like her school’s founder, Thomas Jefferson, Mary believes learning never ends. She considers herself a passionate, lifelong student of content creation and inbound marketing.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus