MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

The-Ultimate-Guide-to-Success-in-Managed-IT-Services


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

Understanding the Essential Eight: The Key to Multi-Layered Security

Posted by Elliot Seeto on December 6, 2018

Understanding-the-Essential-Eight--The-Key-to-Multi-Layered-Security

As we come to the close of our Understanding the Essential Eight series, I hope you’ve had the chance to digest all of our discussions and can utilise these tips when speaking with clients around the importance of proper security practices. Remember, it is not just us as an industry providing these recommendations, governments are too.

While these basic strategies can be used to raise awareness in sales conversations, as well as through ongoing training and support, I’d like to take this opportunity to wrap a nice bow on the series and discuss the key to establishing a multi-layered security strategy.

Read More

Topics: Cybersecurity and Threat Management, Australia, Continuum Security

Breaking Alert Issued Against SamSam Ransomware

Posted by Lily Teplow on December 4, 2018

Breaking-Alert-Issued-Against-SamSam-Ransomware

On Monday, December 3, the FBI and Department of Homeland Security (DHS) issued an alert for SamSam ransomware—also known as MSIL/SAMAS.A—after identifying certain cyber threat actors using the ransomware to target industries in the United States and worldwide.

In this post, we cover the breaking news and what MSPs should take note of, how the SamSam ransomware works, and what you can do to protect against it.

Read More

Topics: Industry News, Cybersecurity and Threat Management

A 5-Step Guide to Going to Market with Your Security Solution

Posted by Joseph Tavano on December 4, 2018

A 5-Step Guide to Going to Market with Your Security Solution

Most MSPs who have some experience in the channel understand what it takes to start offering new products to their clients; whether it is a new service, an add-on or additional form of IT support, the rollout can differ greatly. However, when it comes to offering an advanced security solution, there is little comparison—it is an entire category of products and services that are being introduced.

In order to successfully go to market in the cyber security space, MSPs need to solidify a plan well in advance of their solution’s public availability.

Read More

Topics: Managed Security Services, Cybersecurity and Threat Management, Sales and Marketing

The Top 5 MSP Blog Posts of November 2018

Posted by Lily Teplow on November 29, 2018

November-Blog-Roundup

What are the keys to an MSP marketing plan for 2019? How can you explain the cloud to your clients? What tools are needed to build a cyber security offering? We answer these questions and more in our monthly roundup of the MSPblog's most popular posts.

See below for the top five blog articles our readers couldn’t get enough of this November.

Read More

Topics: Sales and Marketing, Cybersecurity and Threat Management, Client Acquisition and Management

13 Essentials for Building a Cyber Security Offering

Posted by Joseph Tavano on November 20, 2018

13 Essentials for Building a Cyber Security OfferingIn the modern world of advanced cyber security, you’ll need a lot more than consumer-grade antivirus and firewall applications to get the job done. Your clients have entrusted you with the logistics surrounding the safety and security of their IT environment, and to that end, you’ll need to arm yourself with the right stack of software and services to best protect them.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

Important Tips for Improving Password Security

Posted by Lily Teplow on November 8, 2018

Password-Security-Tips

Sometimes it is the simplest or most obvious things that can be easily overlooked or taken for granted in life. The IT space is no different and many of the most basic elements, like password management, can oftentimes be overlooked. While it’s not the sexiest of topics, passwords are something we use every day and should be at the forefront of any security plan.

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Where Does the Managed Services Market Stand Today?

Posted by Joseph Tavano on November 6, 2018

Where-Does-the-Managed-Services-Market-Stand-Today-

In the last quarter of 2018, it should come as a surprise to no one that the managed services market is changing, and the catalyst for that change is cyber security. This year, market dynamics and emerging trends came to a head to cause meaningful disruption in the managed services in the industry. So, where does the managed services market stand today? To understand that, it’s important to see how we got here.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

Understanding the Essential Eight: Multi-Factor Authentication and Daily Backups

Posted by Elliot Seeto on November 1, 2018

Understanding the Essential Eight: Multi-Factor Authentication and Daily Backups

As we near the end of our series on understanding the Essential Eight, we’re leaving the easiest strategies for last—but they’re no less important in the grand scheme of security best practices. In this post, we’ll cover how to limit access to sensitive information with multi-factor authentication, as well as how to ensure easy recoverability with daily data backups.

Read More

Topics: Cybersecurity and Threat Management, Australia

The Top 5 MSP Blog Posts of October 2018: Halloween Edition

Posted by Lily Teplow on October 31, 2018

October-Blog-Roundup-Halloween

Happy Halloween! It’s time to break out the cobwebs and the candy, because another month of managed IT services blog posts is on the books. To get you in the Halloween spirit, we’ve rounded up our spookiest, our scariest, and our most frightening blog posts of the past month.

See below for the top five blog articles our readers couldn’t get enough of.

Read More

Topics: Cybersecurity and Threat Management

Understanding the Essential Eight: Configuring Microsoft Office Macro Settings and Restricting Administrative Privileges

Posted by Elliot Seeto on October 25, 2018

Understanding the Essential Eight: Configuring Microsoft Office Macro Settings and Restricting Administrative Privileges

In our previous post about understanding the Essential Eight, we covered best practices on application whitelisting and user application hardening. In case you missed it, you can read it here.

This week, we want to take you through why you should consider configuring Microsoft Office macro settings and restrict administrative privileges to prevent malware delivery and limit the extent of security incidents.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus