MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Phishing Scams: What You Need to Know to Avoid Them

Posted by Hunter Smith on April 11, 2018

Phishing-Scams-and-How-to-Avoid-Them

As a managed IT services provider (MSP), there are a myriad of security threats that you and your clients face today. One threat that constantly comes up is phishing scams. These scams can be fairly simple, yet very effective at duping the user and capturing their private information. Even the slightest clue to a username and/or password can give hackers all they need to break into private systems and steal information from companies and individuals—and for this reason, it’s crucial to be aware of phishing schemes, tactics and best practices for avoidance.

Read More

Topics: Tech Quick Tips, Data Protection, Information Security, Cybersecurity and Threat Management

Educating Prospects on IT Security: To Instill Fear or Not?

Posted by Chris Johnson on March 20, 2018

Educating Prospects on IT Security: To Instill Fear or Not?

In the cyber world, businesses are constantly being hammered with fear, uncertainty, and doubt (FUD)—with the hope that someone will come along and reassure them that it’ll all be OK. When selling security services, however, MSPs typically play on this FUD factor. We take advantage of the opportunity to “scare” prospects into buying IT security, yet in many cases, this approach may backfire.

The reason why I think this backfires boils down to one thing: the human condition. When we are threatened and backed into a corner, we tend to fight. And, when it comes to cyber security, our prospective clients are often so far backed into the corner that they begin to fight the wrong fight. To prevent this from happening, there are five key areas you need to focus on.

Read More

Topics: Sales and Marketing, Cybersecurity and Threat Management, Managed Security Services

6 Things You Should Never Leave On Your Desk at the Office: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on March 19, 2018

Six Things You Should Never Leave On Your Desk at the Office

There’s no denying the importance of having the right security software and tools in place to protect your customers—but what about physical workplace security? In this episode of The Weekly Byte, we outline six things you should never leave out on your desk at the office!

Read More

Topics: The Weekly Byte, Cybersecurity and Threat Management

How Dwell Time Can Impact Profitability [CHART]

Posted by Lily Teplow on March 16, 2018

How Dwell Time Can Impact Profitability

Did you know that the faster a cyber attack can be identified and contained, the lower the costs and damage? Dwell time, or the number of days a threat remains undetected within a given environment, can have significant impact on a company’s profitability. The more dwell time, the higher the rate of success for a cyber attack and the higher the costs associated with that attack. 

This is especially concerning for small- to medium-sized businesses (SMBs) who don’t have the proper cyber defenses in place to identify or contain today’s persistent threats—but partnering with an MSP or MSSP like you may be the answer. According to a study by Ponemon Institute, there’s a notable relationship between how quickly an organization can identify and contain a cyber threat, and the financial consequences. So, to help you sell clients and prospects on the value of IT security, we pulled compelling data from this study that you can use in your own sales presentations. See the chart below:

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services, MSP Sales Chart

8 Reasons Why Healthcare Providers Need Your MSP Expertise

Posted by Britany DiCicco on March 6, 2018

8 Reasons Why Healthcare Providers Need Your MSP Expertise

Through the eyes of a cyber criminal, a medical practice or a hospital is a gold mine with an abundance of patient information stored insecurely—just waiting to be hacked, confiscated, and either sold on the black market or held for ransom. Either way, cyber criminals can make a fortune from successfully hacking a healthcare organization—and because they are all too aware of this, the healthcare industry has become their primary target. 

A recent State of Privacy and Security Awareness Report surveyed over 1,000 medical professionals to better understand the cyber security awareness of healthcare sector employees. The key findings show just how poorly prepared the healthcare industry is to protect themselves against cyber criminals, and how much they could benefit from your MSP services.

Read More

Topics: Healthcare IT, Cybersecurity and Threat Management

The Best of MSP Blog Content: February 2018

Posted by Lily Teplow on March 1, 2018

Monthly-Blog-Roundup-Feb-18

Is it just me, or did February pass by in the blink of an eye? As we (quickly) approach the end of Q1, let’s take a look back at this past month’s top content that has helped our readers grow and scale their MSP business.

In this roundup, there’s a clear emphasis on cyber security—from testing your knowledge, to effectively selling it to customers and prospects. Also featured are helpful sales tips and confessions from a former technician. Keep reading to check out all five blog posts our readers couldn’t get enough of this February!

Read More

Topics: Sales and Marketing, Cybersecurity and Threat Management

Can You Spot the 6 Security Flaws in This Photo?

Posted by Lily Teplow on February 23, 2018

Can You Spot the 6 Security Flaws in This Photo?

As the cyber threat landscape continues to evolve, so too does the sophistication of cyber attacks. We’re all aware of the ongoing work that needs to be done to keep sensitive information safe from hackers and stay ahead of the threat landscape, but there’s another side to the coin, and that’s physical security.

Many offices don't enforce best practices for physical information security, and frankly may just not be aware of them. As their MSP, your job is to educate them on these best practices, both from a technology standpoint and from a physical standpoint.

So, it’s time to put your knowledge to the test. Can you find the six security flaws in this picture?

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Cyber Security Myth: More Alerts Does NOT Mean More Security

Posted by Chris Johnson on February 16, 2018

Cyber Security Myth: More Alerts Does NOT Mean More Security

I recently had the unfortunate opportunity to deal with a piece of ransomware that has only been in circulation in its current form for a few weeks. It took less than an hour from the time it dropped its payload to the time it was caught, yet it still managed to tear through pretty much all the servers.

So you might be asking yourself, “why is Chris telling us all about this ransomware and the successful attack?” The reason is that no amount of blinking lights would have prevented this attack from happening. Could we have reduced the likelihood? Maybe. Could we have prevented it altogether? No. And the reason, at the end of the day, is because of people.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

The Financial Consequence of a Cyber Attack is Worsening [CHART]

Posted by Lily Teplow on February 9, 2018

The Financial Consequence of a Cyber Attack is Worsening [CHART]

Virtually every business today fears falling victim to cyber attack. This (rational) fear stems from not only the loss of productivity or sensitive information, but also for the financial burden it puts on the business—even well after the attack has been carried out. According to a study by Ponemon Institute and Accenture, the average annual number of security breaches increased almost 30 percent in 2017. But what financial consequences could these cyber security incidents have for your clients and prospects?

A better understanding of the cost of cyber crime could help SMB business owners bridge the gap between the escalating number threat actors and the investments they should make to secure their business. If you’re looking to effectively start the security conversation with prospective clients, here are some compelling statistics that speak to the immediate need for managed security services.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services, MSP Sales Chart

The Distinction Between MSP and MSSP [PODCAST]

Posted by Nate Teplow on February 7, 2018

The Distinction Between MSP and MSSP Podcast

A few years ago, we saw the industry make a significant transition from break/fix to what are now managed service providers (MSPs). Why? Because there was a need in the market for better, more robust IT services. Today, we’re seeing a similar trend—this time with cyber security.

The need for MSPs to bring security into their portfolios is very clear—and it’s a very significant shift. To talk more about how today’s market is converging toward security, we invited Joe Panettieri, Executive VP and Content Czar of ChannelE2E, on the latest episode of MSP Radio. Keep reading for Joe’s major takeaways on what defines an MSSP and how you can effectively bring new security services to market.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus