MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Introducing: A Quick Guide to Marketing and Selling Cybersecurity

Posted by Lily Teplow on November 15, 2017

Quick-Guide-to-Marketing-and-Selling-Cybersecurity.png

The need to enhance cybersecurity is a given today for both Managed Service Providers (MSPs) and their clients. The constant news headlines containing “ransomware,” “cybercrime,” “data breach” or the like has made security top of mind for businesses of all sizes—prompting MSPs to start thinking more seriously about their cybersecurity services and how to best offer them to clients.

There is a huge opportunity for MSPs to pave the path to their clients’ success, but it all starts with cybersecurity sales. However, selling your managed security services isn’t always easy. Your focus and priority is on keeping your clients protected, yet this makes it difficult to find the time to create your own marketing campaigns. But, imagine if you could become a cybersecurity sales expert without doing all the heavy lifting…

Read More

Topics: Sales and Marketing, Cybersecurity and Threat Management, Managed Security Services

3 Milestones Every MSP Should Hit When Launching a Security Line of Business

Posted by Chris Johnson on November 14, 2017

3 Milestones Every MSP Should Hit When Launching a Security Line of Business

In previous articles, I have talked about the differences between MSP and MSSP and how important it is to practice what you preach as you look to differentiate yourself in the cybersecurity space. As we quickly approach the end of the year, I’d like to provide you all with a tried-and-true strategy for successfully launching your cybersecurity offering as a new line of business in 2018 and beyond.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

The Top 10 Ransomware Attacks of 2017

Posted by Lily Teplow on November 10, 2017

The Top 10 Ransomware Attacks of 2017

Dominating the threat landscape this year, ransomware has become an issue that all modern businesses need to worry about. While ransomware isn’t a new phenomenon, over the years it has grown from a mild annoyance to a shocking financial burden for many individuals and businesses today. Variants such as NotPetya, WannaCry, and Locky are among those that wreaked havoc for businesses worldwide this year—rising to become some of the most damaging ransomware attacks in history.

Recently, the Webroot threat research team released their list of the Top 10 Nastiest Ransomware Profiles, which highlights the most destructive ransomware of 2017. The list illustrates the reality of how cybercriminals will continue to develop new infections and capitalize on reliable, successful attack methods. Keep reading to discover the top ransomware attacks of this past year, what you might need to look out for in 2018, and how you can keep yourself and your clients protected from the threat of ransomware.

Read More

Topics: Information Security, Cybersecurity and Threat Management

How to Become an Expert on HIPAA Compliance

Posted by Britany DiCicco on November 2, 2017

How to Become an Expert on HIPAA Compliance

All the sensitive data that’s created and stored today—especially within the healthcare industry—has caused an increased demand for special attention, meaning that it’s more important than ever for managed service providers (MSPs) to fully understand HIPAA compliance. Not only does this mean knowing what it is, but what you need to do to be HIPAA compliant and what the consequences entail if you try to serve clients in the healthcare field without being compliant.

As mentioned in my previous blog, privately owned medical practices are becoming a principal target of cyber-attacks; therefore, the medical industry needs to be well prepared to prevent such threats from penetrating their network. As doctors are not usually security experts, they rely heavily on their MSPs to make sure they have the proper tools in place to maintain HIPAA compliance and protect them from cybercrime. Here are some key strategies that will help you become an expert on HIPAA compliance and uphold your promises to healthcare clients.

Read More

Topics: HIPAA, Healthcare IT, Cybersecurity and Threat Management

The Evolution of Antivirus: Part Two

Posted by Meaghan Moraes on November 1, 2017

The-Evolution-of-Antivirus--Part-Two.png

As the conversation around cybersecurity shifts in tone, managed service providers (MSPs) are starting to rework the delivery of their services in tandem with the changing market. So, what do these shifts entail exactly? In The Evolution of Antivirus: Part One, we looked at what has been traditionally referred to as “antivirus,”  and how it can (and should) be thought of as complete endpoint protection—because security is no longer a general means of “protection.” Today, it should be seen as a multi-layered approach to securing specific client vulnerabilities and ensuring all endpoints are fully damage controlled.

In the second part of this series, we’ll focus on the strategic ways MSPs can adapt to this demonstrative need to effectively manage all endpoints—through the right security strategy and expertise—and set their business up to scale. Cyber threats will continue to change business as we know it, so here are some key ways to keep the cards in your favor.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

3 Steps to Delivering Profitable Security Services

Posted by Brian Downey on October 31, 2017

3-Steps-to-Delivering-Profitable-Security-Services.png

With the constant influx of threats and attacks, today’s cyber landscape may seem daunting—even downright scary—to most businesses. However, this evolving landscape presents a big opportunity for IT service providers looking to offer reliable cybersecurity services to clients. So, how can you ensure that these services will be profitable in years to come?

Clients are now looking to you to provide a comprehensive security environment, detect potential threats, and remediate said threats before they are able to do damage. In a recent webinar, I walked through the specific steps IT providers should take to deliver profitable security services. As a recap, I’d like to outline the three key takeaways so you can understand what it takes to properly deliver security services to your clients.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

IT Trick or Treat: Top 5 Scariest Cyber Threats of 2017

Posted by Lily Teplow on October 27, 2017

IT Trick or Treat: Top 5 Scariest Cyber Threats of 2017

We are living in a world where cybercrime is the greatest threat to every business. Today’s news headlines are littered with the latest data breach or attack, and these will only proliferate as the years go on. What’s more, attackers are even broadening their approach to cyberattacks in order to strengthen their potential impact, causing cybercrime damages to cost the world $6 trillion annually by 2021.

A new bar has been set for cybersecurity teams across all industries to defend their assets in the coming year. This is especially important for IT service providers, whose clients are trusting them to keep their IT systems and environments protected from harm. But in order to prepare for the future, sometimes you need to analyze and learn from the past. So, let’s take a look back on the top cyber threats the industry has had to face in 2017.

Read More

Topics: Mobile Device Management and IT Mobility, Cybersecurity and Threat Management, Managed Security Services, Internet of Things

The Evolution of Antivirus: Part One

Posted by Meaghan Moraes on October 25, 2017

The Evolution of Antivirus: Part One

In the past couple of years alone, the threat landscape has changed drastically. Viruses, Trojans, malware and similar programs are now a reality for modern businesses. Consequently, the need to vigilantly protect your clients’ endpoints from these threats is critical—and sometimes downright scary. With Halloween right around the corner, the conversation on where and how cyber attackers are haunting your clients’ systems is more timely than ever.

For many IT service providers, the shift in the threat landscape has led to a similar shift in how you define cybersecurity solutions. “Antivirus,” for instance, has become an outdated term. Antivirus is most commonly thought of as “a product that stops bad programs from infecting your device.” However, calling this “antivirus” is similar to calling every carbonated beverage “Coke.”

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

The Game Plan for Handling Your Clients’ Security, Coach CISO: Chapter 3 [VIDEO]

Posted by Meaghan Moraes on October 20, 2017

CoachCisoVideo3GIF-3.gif

In the game of bringing an effective managed security solution to market, IT service providers are beginning to rethink their plan. While robust cybersecurity services are largely powered by technology, end users need more to remain truly protected.

Are you leveraging the power of people to enhance your security offering? If you haven’t yet considered what this entails, the following points will help you devise a reliable game plan for fighting cybercrime and arm your clients with a comprehensive security solution.

Read More

Topics: Video, Cybersecurity and Threat Management, Managed Security Services

“KRACK” Attack: 3 Major Takeaways for IT Service Providers

Posted by Lily Teplow on October 18, 2017

“KRACK” Attack: 3 Major Takeaways for IT Service Providers

On Monday, a serious weakness was discovered in WPA2, a protocol that secures all modern protected Wi-Fi networks. The flaw allows potential attackers to leverage this vulnerability to break into the WPA2 security model and steal data flowing between wireless devices and the targeted Wi-Fi network. What’s so concerning about this particular attack—dubbed “KRACK,” which is short for key reinstallation attack—is that it works against all modern protected Wi-Fi networks, allowing attackers to not only read and steal information transmitted across Wi-Fi, but also potentially manipulate the data or insert malware.

So, what exactly is this KRACK attack and why is it so threatening? Considering that it is National Cyber Security Awareness Month, it’s even more critical that IT service providers understand what’s at stake given this newfound vulnerability. Here’s everything you need to know about the recent KRACK attack news, who’s most at-risk from this vulnerability, and the steps providers can take to mitigate these risks.

Read More

Topics: Industry News, Cybersecurity and Threat Management

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus