MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

The-Ultimate-Guide-to-Success-in-Managed-IT-Services


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

The Top 5 MSP Blog Posts of November 2018

Posted by Lily Teplow on November 29, 2018

November-Blog-Roundup

What are the keys to an MSP marketing plan for 2019? How can you explain the cloud to your clients? What tools are needed to build a cyber security offering? We answer these questions and more in our monthly roundup of the MSPblog's most popular posts.

See below for the top five blog articles our readers couldn’t get enough of this November.

Read More

Topics: Sales and Marketing, Cybersecurity and Threat Management, Client Acquisition and Management

13 Essentials for Building a Cyber Security Offering

Posted by Joseph Tavano on November 20, 2018

13 Essentials for Building a Cyber Security OfferingIn the modern world of advanced cyber security, you’ll need a lot more than consumer-grade antivirus and firewall applications to get the job done. Your clients have entrusted you with the logistics surrounding the safety and security of their IT environment, and to that end, you’ll need to arm yourself with the right stack of software and services to best protect them.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

Important Tips for Improving Password Security

Posted by Lily Teplow on November 8, 2018

Password-Security-Tips

Sometimes it is the simplest or most obvious things that can be easily overlooked or taken for granted in life. The IT space is no different and many of the most basic elements, like password management, can oftentimes be overlooked. While it’s not the sexiest of topics, passwords are something we use every day and should be at the forefront of any security plan.

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Where Does the Managed Services Market Stand Today?

Posted by Joseph Tavano on November 6, 2018

Where-Does-the-Managed-Services-Market-Stand-Today-

In the last quarter of 2018, it should come as a surprise to no one that the managed services market is changing, and the catalyst for that change is cyber security. This year, market dynamics and emerging trends came to a head to cause meaningful disruption in the managed services in the industry. So, where does the managed services market stand today? To understand that, it’s important to see how we got here.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

Understanding the Essential Eight: Multi-Factor Authentication and Daily Backups

Posted by Elliot Seeto on November 1, 2018

Understanding the Essential Eight: Multi-Factor Authentication and Daily Backups

As we near the end of our series on understanding the Essential Eight, we’re leaving the easiest strategies for last—but they’re no less important in the grand scheme of security best practices. In this post, we’ll cover how to limit access to sensitive information with multi-factor authentication, as well as how to ensure easy recoverability with daily data backups.

Read More

Topics: Cybersecurity and Threat Management, Australia

The Top 5 MSP Blog Posts of October 2018: Halloween Edition

Posted by Lily Teplow on October 31, 2018

October-Blog-Roundup-Halloween

Happy Halloween! It’s time to break out the cobwebs and the candy, because another month of managed IT services blog posts is on the books. To get you in the Halloween spirit, we’ve rounded up our spookiest, our scariest, and our most frightening blog posts of the past month.

See below for the top five blog articles our readers couldn’t get enough of.

Read More

Topics: Cybersecurity and Threat Management

Understanding the Essential Eight: Configuring Microsoft Office Macro Settings and Restricting Administrative Privileges

Posted by Elliot Seeto on October 25, 2018

Understanding the Essential Eight: Configuring Microsoft Office Macro Settings and Restricting Administrative Privileges

In our previous post about understanding the Essential Eight, we covered best practices on application whitelisting and user application hardening. In case you missed it, you can read it here.

This week, we want to take you through why you should consider configuring Microsoft Office macro settings and restrict administrative privileges to prevent malware delivery and limit the extent of security incidents.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

How Do Businesses Stand a Chance Against Today’s Cyber Security Landscape?

Posted by Lily Teplow on October 24, 2018

How Do Businesses Stand a Chance Against Today’s Cyber Security Landscape?

Ah security. We constantly hear and talk about it, yet it continues to be the piece of the puzzle that so many companies struggle with. It’s such a major issue, in fact, that the entire month of October has been named National Cyber Security Awareness Month—and this week, we’re focusing on the importance of securing critical infrastructure from cyber threats. However, many businesses fail to do so without the help of an MSP.

There’s a clear need for more advanced cyber security in the SMB market—a topic that was covered on a recent episode of MSP Radio. Hosts Brandon and Joe were joined by Al Silva, CEO of Murphy, McKay & Associates, where he shared his perspective on why today’s businesses need better security and how you as an MSP can approach those conversations. Keep reading for the highlights of this episode.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

Machine Learning: Game-Changing Innovation or Hype?

Posted by George Anderson on October 23, 2018

Machine Learning: Game-Changing Innovation or Hype?

Legacy approaches to cyber security rely on threat signatures and blacklists for cross-referencing known threats. Shortening malware lifespans greatly reduced the efficacy of such approaches over time, though, and the advent of polymorphic malware has all but finished them off. In 2017, 93 percent of the malware Webroot encountered had never been seen before, making nearly all malware essentially invisible to static threat lists.

So is machine learning the answer to a shifting threat landscape, or are hopes that it’s the good guy’s best hope for staying ahead of hackers misplaced?

Read More

Topics: Cybersecurity and Threat Management, Information Security

Introducing Continuum’s Global Cyber Security Roadshow

Posted by Lily Teplow on October 18, 2018

Introducing Continuum’s Global Cyber Security Roadshow

Dealing with today’s threat landscape can put a burden on most IT and security service providers. There are serious, complex issues you need to solve for your SMB clients—including phishing, brute-force attacks, the dark web, and much more. Without the proper knowledge, technology, and enablement materials, the promise of building an enduring security line of business could be shattered. 

To provide MSP with everything they need to emerge as cyber security leaders, Continuum is introducing its Global Cyber Security Roadshow! Keep reading to discover what you’ll learn, where we’re heading and why you’ll want to be there.

Read More

Topics: Cybersecurity and Threat Management, Events

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus