MSP Blog Logo

Cyber Security

Business Growth

Sales and Marketing

IT Services


Empowering Your MSP Business to Grow and Prosper—One Post at a Time


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

Why Security Awareness Training is an MSP’s Secret Weapon

Posted by Paula Griffin on March 18, 2019


I used to think that cyber attacks were like riots. If they ever came my way, they'd arrive in the form of masked rebels who'd overtake my computer until it burst into flames!  

Even though cyber attacks may not be as vivid as I'd imagined, they can actually cause much worse damage than a computer exploding. They can cost your business time, money and even worse, your credibility. The reality is, hackers won't come loudly crashing through your windows, but will most likely be subtle enough that they'll walk right through your front door.

Read More

Topics: Cyber Security

Why Resiliency is the Future of BDR and Business Continuity

Posted by Dave LeClair on March 8, 2019


It is clear we live in an always-on world. Regardless of what vertical market a business serves, it is likely that customers expect 24x7x365 access to at least some, if not all, of its business services. Even for knowledge workers, ubiquitous broadband networking and mobile devices now let employees work anywhere and at any time. Downtime is simply not tolerated anymore. This need for constant data access and system uptime has caused a shift in how we think about data protection and business continuity over the years, particularly for SMBs.

Read More

Topics: BDR, Cyber Security

Why MSPs Should Advise Clients to Surpass the PCI DSS Baseline

Posted by Mark Cline on March 4, 2019


By now, most of us have heard the terms PCI compliance, PCI DSS, or Payment Card Industry Compliance Data Security Standards. If you need a refresher before we dive in, review some quick PCI DSS facts. These terms have been flying around for quite some time and merchants have been complying, or attempting to comply, for years. If merchants are complying it begs the question, why do we still see data breaches? The PCI standard was created to build a baseline of security functions to protect card holder data, and it does just that. The standard is a great baseline for a security posture, but in no means does it end with a PCI self-assessment questionnaire (SAQ).

With the development of new payment technologies like more advanced point-of-sale (POS) terminals, we see the overall scope of PCI compliance diminishing. Less credit card data in scope means less risk. However, this line of thinking is a bit misleading because it can give the merchant a false sense of security.

Read More

Topics: Cyber Security

Dominating New Verticals in 2019: 7 Tips to Keep AEC Clients Cyber Secure

Posted by Josh Weiss on March 1, 2019


Traditional architecture, engineering and environmental consulting (AEC) firms are in the middle of a makeover, with spreadsheets and calculators taking a backseat to big data, technology and software. With increasing speed, AEC firms are utilizing technology-driven capabilities to provide more service offerings and improve efficiency. This means they require proactive cybersecurity strategies to protect their business. The bottom line is: AEC firms are making strategic investments in cyber security.

Read More

Topics: Business Growth, IT Services, Cyber Security

Seize the Security Opportunity with Continuum’s Global Cyber Security Roadshow

Posted by Meaghan Moraes on February 22, 2019

Introducing Continuum’s Global Cyber Security Roadshow

Dealing with today’s threat landscape can put a burden on most IT and security service providers. There are serious, complex issues you need to solve for your SMB clients—including phishing, brute-force attacks, the dark web, and much more. Without the proper knowledge, technology, and enablement materials, the promise of building an enduring security line of business could be shattered. 

To provide MSPs with everything they need to emerge as cyber security leaders, Continuum is bringing its Global Cyber Security Roadshow to IT service providers around the globe! Keep reading to discover what you’ll learn, where we’re heading and why you’ll want to be there.

Read More

Topics: Cyber Security

Continuum Security Empower: How to Avoid Selling Security Like You’re Selling Tires

Posted by Brian Downey on February 20, 2019


Last year I decided to buy snow tires for my wife’s car. I suggested she call a shop and make an appointment, but instead, she came back to me with a menu of options—speed ratings, noise ratings, treadwear comparisons and a variety of prices. It was a lot to take in, and I quickly realized that what I thought would be a two-minute process might actually take longer to understand than I’d anticipated. It was only September, so I told her I’d take some time to mull it over before calling back. Then life happened: kids’ hockey games, work, projects around the house, and before I knew it, we were opening Christmas presents and I still hadn’t taken a look at these tires. So at that point, I decided I might as well wait until next year.

Read More

Topics: Cyber Security, Continuum Security

Why MSPs are Getting Serious About Dark Web Monitoring

Posted by Tim Weber on February 15, 2019


One of the most important aspects of my job is to determine not only what specific products we are going to recommend/sell to our client base, but also—at a prioritization level—what areas we (and our clients) should be focusing on. I think we can all agree that there is no shortage of solutions out there. Some are incredibly relevant and needed; others, not so much.

As an MSP, it's important to be able to recommend the right tools and capabilities that will help your clients propel their business forward—especially when it comes to cyber security. 

Read More

Topics: Cyber Security

5 Easy Ways to Improve Your Client’s Website Security

Posted by Larry Monuteaux on February 6, 2019


You just finished ramping up a new client. Everyone is logging on using complex passwords, the workstations and servers are on a regular patching schedule, the servers are getting backed up, the Wi-Fi is configured, and the printer is shared. The whole environment is running like a well-oiled machine—you’ve thought of everything! Or have you?

Well, if your client has a website (and who doesn’t, these days?), then they are probably going to ask you about that too. As their MSP, you are handling all of their computing needs, right? If you think that doesn’t involve making sure their website is secure, think again.

Read More

Topics: Cyber Security

The Top 5 MSP Blog Posts of January 2019

Posted by Meaghan Moraes on January 31, 2019


What are the keys to selling security services? Which tools should MSPs take advantage of? Where is the managed IT services market headed? We answer these questions and more in our roundup of the MSPblog's most popular posts of January 2019.

See below for the top five blog articles our readers couldn’t get enough of this month.

Read More

Topics: Sales and Marketing, Cyber Security

3 Winning Tactics to Approach Clients about Cyber Security

Posted by Derek Marin on January 24, 2019


It’s tempting to simply slap your company logo on templated pitch decks and hit the phones. But, we all know how this ends—the one-size-fits-all playbook is dated and ultimately ineffective. And besides, upgrading isn’t the same as selling to a prospect!

Clients expect their MSP's protection. In addition, the client's general perception of cyber security is influenced by their MSP. In this blog post, I'll offer some key tips on how to guide your clients to purchase more cyber security services, including understanding their personal views on security, how to perceive that they may be interested, and some simple email templates to arrange an upgrade meeting. 

Read More

Topics: Sales and Marketing, Cyber Security

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]