MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

The-Ultimate-Guide-to-Success-in-Managed-IT-Services


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

Introducing Continuum’s Global Cyber Security Roadshow

Posted by Lily Teplow on October 18, 2018

Introducing Continuum’s Global Cyber Security Roadshow

Dealing with today’s threat landscape can put a burden on most IT and security service providers. There are serious, complex issues you need to solve for your SMB clients—including phishing, brute-force attacks, the dark web, and much more. Without the proper knowledge, technology, and enablement materials, the promise of building an enduring security line of business could be shattered. 

To provide MSP with everything they need to emerge as cyber security leaders, Continuum is introducing its Global Cyber Security Roadshow! Keep reading to discover what you’ll learn, where we’re heading and why you’ll want to be there.

Read More

Topics: Cybersecurity and Threat Management, Events

6 Things You Should Never Leave On Your Desk at the Office: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on October 15, 2018

Six Things You Should Never Leave On Your Desk at the Office

There’s no denying the importance of having the right security software and tools in place to protect your customers—but what about physical workplace security? In honor of National Cyber Security Awareness Month, this Weekly Byte episode gives you six things you should never leave out on your desk at the office!

Read More

Topics: The Weekly Byte, Cybersecurity and Threat Management

Making Money with Layered Security: Challenges and Opportunities in a Shifting Threat Landscape

Posted by George Anderson on October 9, 2018

Making Money with Layered Security: Challenges and Opportunities in a Shifting Threat Landscape

A shifting cyber threat landscape is putting increased pressure on MSPs entrusted with security services. In addition to protecting clients from an ever-diversifying range of threats, it’s often falling on MSPs to explain to their customers why simple endpoint security solutions alone are no longer a sufficient cyber security stack.

User error is quickly turning into one of the most promising avenues of attack for cybercriminals, something no endpoint solution can remedy. Additionally, attacks based on outbound web traffic—preventable at the network-level and often enabled by irresponsible browsing habits—continue to endanger businesses, especially at the network level. 

Rather than viewing these shifting circumstances as a net negative, MSP owners should recognize that the increased need for effective security offers real opportunities in terms of their offerings. Layering the cyber security protection MSPs provide their clients is the way to efficient protection and increased profitability. It simply makes sense that, as threats diversify, MSPs should expect greater compensation by offering greater protection.

Read More

Topics: Cybersecurity and Threat Management, Security Awareness Training

Explaining "Phishing" to Your Clients [VIDEO]

Posted by Meaghan Moraes on October 8, 2018

Explaining Phishing to Your Clients

It’s National Cyber Security Awareness Month, and this week’s theme is all about security knowledge and education. Security education is key to keeping businesses and employees safe from cyber threats. In honor of this, our next video in our Explaining IT to Your Clients series will help you approach conversations with clients around one of the most pervasive threats facing their business: phishing. Tune in now to learn how to explain phishing to your clients and help keep them protected.

Read More

Topics: Cybersecurity and Threat Management, Video, Explaining IT Series

Breaking News: Advanced Persistent Threat Activity Exploiting MSPs

Posted by Brian Downey on October 4, 2018

Breaking News: Advanced Persistent Threat Activity Exploiting MSPs

On Wednesday, October 3, the U.S. Department of Homeland Security (DHS) issued a warning to managed services providers (MSPs) and cloud services providers (CSPs) that hackers are exploiting MSP and CSP systems to reach end-client networks.

This alert from the DHS confirms that small businesses, and their managed service providers, are the new attack vector for cybercriminals, and the risks are severe. In this post, we’ll explain the threat MSPs and their clients are facing, and provide our advice to help mitigate these threats.

Read More

Topics: Industry News, Cybersecurity and Threat Management

4 Simple Steps for Better Online Security

Posted by Lily Teplow on October 2, 2018

4-Simple-Steps-for-Better-Online-Security

Did you know that October is National Cyber Security Awareness Month? As a collaborative effort between government and industry, National Cyber Security Awareness Month (NCSAM) was created fifteen years ago, and is now observed each year to ensure everyone has the resources they need to stay safer and more secure online.

As an MSP, online security is top-of-mind for you and your clients. Most places we go, there’s a network connection for us to link up to—a gateway into the World Wide Web, its endless information, and being able to connect with each other. But how can you protect your clients (and yourself) when browsing online?

Here are four tips you can share with your employees and clients to ensure better security while online.

Read More

Topics: Cybersecurity and Threat Management, Information Security

Live from Navigate 2018: Day 3 Coverage

Posted by Lily Teplow on September 28, 2018

Live from Navigate 2018: Day 3 Coverage

Greetings again from day three of our Navigate 2018 conference, focused on empowering our MSP partners with the tools and insights they need to define their path for success in the IT space.

Day two was jam packed with an insightful CEO roundtable, a presentation of Continuum’s product roadmap, celebrity keynote Barbara Corcoran, and much more. To briefly recap all that we covered in the past three days and the fun that we’ve had along the way, take a look at our video below:

Read More

Topics: Navigate 2018, Cybersecurity and Threat Management

5 Things Everyone Gets Wrong About Anti-Virus

Posted by Migo Kedem on September 18, 2018

5 Things Everyone Gets Wrong About Anti-Virus

It shouldn't be news to anyone that cyber threats are on the rise. As advanced hacking techniques continue to proliferate in the wild, the requirement to have an effective security solution has never been more pressing.

With the market awash with vendors making bold claims, and news stories making even bolder headlines, it can be hard to separate the fact from the fiction. If you're new to offering endpoint security, here are five basic things you need to know to ensure that you get right about the options available.

Read More

Topics: Navigate 2018, Cybersecurity and Threat Management

Understanding the Essential Eight: Application Whitelisting and User Application Hardening

Posted by Elliot Seeto on September 12, 2018

Understanding the Essential Eight: Application Whitelisting and User Application Hardening

If you’ve been keeping up with our Understanding the Essential Eight series, over the past two weeks we’ve covered what the Essential Eight is and how you can get started with patching best practices. This week, we’ll take you through application whitelisting and user application hardening—two important areas that are often overlooked.

 

Read More

Topics: Australia, Cybersecurity and Threat Management, Data Protection

What Is Cryptomining and How to Protect Against It

Posted by Casey Ulaky on September 11, 2018

What Is Cryptomining and How to Protect Against It

Regardless of your background or industry, it’s likely that you’ve heard of Bitcoin and other virtual currencies over the past several years. We’ve all seen the news lately—cryptocurrency mining attacks are on the rise. To better protect against these threats, let’s first take a step back and define some of the terms you may come across.

Read More

Topics: Cybersecurity and Threat Management, Navigate 2018

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus