MSP Blog Logo


Business Growth


Help Desk



Sales & Marketing


Empowering Your MSP Business to Grow and Prosper—One Post at a Time


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

PCI DSS Back to Basics: Quick Tools and Tips for MSPs

Posted by Mark Cline on January 8, 2019


When it comes to the PCI DSS compliance discussion with your clients, things can get confusing fast. Merchants have many voices telling them various bits of information about their compliance—the bank, the payment processor, the POS solution provider, the POS integrator and so on. Most of the time, the information provided is out of context, incomplete or flat-out incorrect. As their IT service provider, you can play a central role in cutting through the confusion and providing a clear path to compliance.

Oftentimes, the best way to optimize your client relationships is getting back to basics. The following PCI DSS reminders and suggestions will help you effectively step in as the technology advisor and resource your customers will rely on to clarify the complexities of the IT channel. 

Read More

Topics: Information Security, Data Protection, PCI Compliance

Important Tips for Improving Password Security

Posted by Lily Teplow on November 8, 2018


Sometimes it is the simplest or most obvious things that can be easily overlooked or taken for granted in life. The IT space is no different and many of the most basic elements, like password management, can oftentimes be overlooked. While it’s not the sexiest of topics, passwords are something we use every day and should be at the forefront of any security plan.

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Understanding the Essential Eight: Application Whitelisting and User Application Hardening

Posted by Elliot Seeto on September 12, 2018

Understanding the Essential Eight: Application Whitelisting and User Application Hardening

If you’ve been keeping up with our Understanding the Essential Eight series, over the past two weeks we’ve covered what the Essential Eight is and how you can get started with patching best practices. This week, we’ll take you through application whitelisting and user application hardening—two important areas that are often overlooked.


Read More

Topics: Australia, Cybersecurity and Threat Management, Data Protection

A Quick Guide to Incident Response Planning

Posted by Lily Teplow on August 1, 2018

A Quick Guide to Incident Response Planning

Given today’s security landscape, it’s more important than ever that businesses have a plan in place to respond to major cyber threats. These threats are becoming more and more sophisticated, leaving businesses less and less equipped to handle them. To even stand a chance against a security incident, your clients need an incident response plan—and it’s your job as an MSP to help them solidify this plan.


Read More

Topics: Incident Response, Data Protection, Cybersecurity and Threat Management

The Worst Passwords You Could Possibly Use Are…

Posted by Lily Teplow on June 7, 2018

The Worst Passwords You Could Possibly Use Are

You tell your clients all the time about good password policies. You tell your friends and family. You may be able to rattle off in your sleep “unique, long strings of varied characters with multiple numbers, capitals, and special characters.” But just how many people are heeding the call for better security? Has the public started taking cyber security seriously?

Read More

Topics: Data Protection, Information Security

The Basics of Cyber Security Training for End-Users

Posted by Lily Teplow on May 10, 2018

The Basics of Cyber Security Training for End-Users

What’s the biggest risk to an organization’s information security? Hint: it has little to do with the technology. Rather, it is the action—or inaction—of their employees.

Human error has become a major weak point today; one that is easily exploited by cyber criminals. In fact, almost 90 percent of cyber attacks are caused by human error or behavior. Therefore, it’s vital that businesses have some form of cyber security training in place to educate employees on the importance of protecting sensitive information and what malicious threats to look out for.

As an IT services provider committed to protecting your clients and their business, the task of security education and training falls into your hands. Keep reading to discover which essential elements you should cover when providing security awareness training.

Read More

Topics: Cybersecurity and Threat Management, Information Security, Data Protection

5 Core Components to a Cyber Security Offering

Posted by Chris Johnson on May 1, 2018

5 Core Components to a Cyber Security Offering

My career path has shifted in recent months, from running my own managed services company to jumping into the security space as a managed security services provider (MSSP). During this time, I’ve come to learn which tools are needed for the job and how to best utilize them to define a cyber security offering. 

The tools and resources an IT security provider leverages should be tied to both securing your business and protecting your clients, which means selecting the right ones is extremely important. For any foundational security offering, I’ve found that the following five tools and components are most essential to thriving, and surviving, in this market.

Read More

Topics: Cybersecurity and Threat Management, Data Protection

The Top 5 MSP Blog Posts of April 2018

Posted by Lily Teplow on April 27, 2018


The month of April brought us many things: the start of baseball season, the oncoming of warmer weather (for most of us), and yet another 30 days filled with valuable, business-driving content on the blog! MSP sales and marketing seems to be the theme of this month’s roundup. Our most popular posts cover topics such as the keys to success in managed IT services, how to generate more leads, how to better prepare for sales conversations, and much more.

Read on to discover the top five blog articles our readers couldn’t get enough of this month, with special bonus content at the end of this post!

Read More

Topics: Business Development and Growth, Sales and Marketing, Blogging, Data Protection

Explaining the Cloud to End Users: 4 Things to Cover

Posted by Joseph Tavano on April 24, 2018

Explaining the Cloud to End Users: 4 Things to Remember

While cloud integration is virtually ubiquitous in modern computing, it is often misunderstood or misinterpreted outside of the IT industry. Outside of the sphere of tech insiders, where acronyms, jargon and abstract product names are commonplace, the idea of “The Cloud” can be shrouded in mystery from years of pop-culture confusion and misuse in fiction.

Read More

Topics: Cloud Computing, Data Protection

Phishing Scams: What You Need to Know to Avoid Them

Posted by Hunter Smith on April 11, 2018


As a managed IT services provider (MSP), there are a myriad of security threats that you and your clients face today. One threat that constantly comes up is phishing scams. These scams can be fairly simple, yet very effective at duping the user and capturing their private information. Even the slightest clue to a username and/or password can give hackers all they need to break into private systems and steal information from companies and individuals—and for this reason, it’s crucial to be aware of phishing schemes, tactics and best practices for avoidance.

Read More

Topics: Tech Quick Tips, Data Protection, Information Security, Cybersecurity and Threat Management

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus