MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Understanding HIPAA and Healthcare IT: Part 1

Posted by Britany DiCicco on September 15, 2017

Understanding HIPAA and Healthcare IT: Part 1

Before the beginning of 2017, Experian predicted that the healthcare sector would be the most targeted sector for cyber criminals to exploit. In May of this year, that prediction came to life when the malware known as WannaCry caused 37 of the health trusts in the UK’s National Health Service to shut down, eventually spreading across 150 countries. Unfortunately, this is just one of many cyber attacks that healthcare organizations have recently faced. Today, these organizations are seeking aid with HIPAA compliance and increased security, causing them to look to managed services providers (MSPs) for help.

Read More

Topics: Information Security, HIPAA, Healthcare IT

What Should MSPs Know About the HIPAA Security Rule?

Posted by Britany DiCicco on August 15, 2017

What Should MSPs Know About the HIPAA Security Rule?

Today, managed services providers (MSPs) who service clients in the healthcare industry have to worry about compliance—it’s simply part of the job. These MSPs offer their services to small- and medium-sized medical practices who rely on them to keep their security architecture safe and compliant with HIPAA (Health Insurance Portability and Accountability Act). Bearing the burden of this responsibility means that MSPs must have encyclopedic knowledge about HIPAA, and also have the proper security tools in place to meet the stringent requirements that are associated with HIPAA compliance.

As the healthcare industry continues to move away from paper processes and adopt new technologies, they are becoming increasingly prone to cyber attacks. It’s now more important than ever for MSPs to fully understand the HIPAA Security Rule and enable the medical practices they serve to remain compliant.

Read More

Topics: Information Security, HIPAA, Healthcare IT

10 Cybersecurity Statistics Every MSP Should Memorize

Posted by Meaghan Moraes on August 2, 2017

10 Cybersecurity Statistics Every MSP Should Memorize

Today, business professionals that do not consider cybersecurity a top concern may be living under a rock—and in actuality, the modern threat landscape should make them want to hide under one.

Managed IT service providers are realizing the importance of offering their clients security services because of, well, the numbers. The following ten statistics illustrate current cybersecurity threats to businesses, holes that leave many organizations vulnerable to cyber attacks, and the repercussions of not having a robust security strategy in place in today’s tumultuous IT landscape. Consider leveraging these facts in your conversations with clients and prospects to strengthen the way you sell your services and security expertise!

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Why Phishing is the Go-To Method for Cyber Criminals

Posted by Meaghan Moraes on July 28, 2017

Why Phishing is the Go-To Method for Cyber Criminals

The term “phishing” has been circulating the business realm for quite some time—largely because of its popularity amongst cyber criminals. Phishing is a type of social engineering attack that tricks victims into giving away information to cyber criminals posed as a trusted source. It’s an easy and effective way for criminals to hack sensitive systems and information, and the dangerous aspect is that it can come in many forms—the main one being email. Today, phishers, on average, launch a new attack every 30 seconds—and phishing schemes are growing increasingly sophisticated as cyber attackers use new tools and tactics to create authentic-looking emails.

Low-cost phishing and ransomware tools are very easy to get a hold of, and the attacks are just as easy to execute. So, what makes phishing such a successful method of cyber attack, and what can organizations do to protect themselves? In this post, we’ll dive into why phishing is so prevalent and how companies can work to mitigate these attacks.

Read More

Topics: Information Security, Cybersecurity and Threat Management

3 Cybersecurity Threats MSPs Need to Monitor and Manage in 2017

Posted by Lily Teplow on July 14, 2017

3 Cybersecurity  Threats MSPs Need to Monitor and Manage in 2017

In the growing and evolving cyber threat landscape, how can managed services providers (MSPs) ensure that they’re delivering on their promise to secure and protect their clients at all times? Let’s face it, managing and monitoring cyber threats is not an easy task. MSPs are now under immense pressure to be the IT security superhero for their clients, but if you haven’t yet established a security offering, it may stunt your MSP growth.

Luckily, there are tools out there that can help you uphold your commitment to security, even amongst the major threats that are merged with business today. Let’s take a look at the three most crucial cyber threats MSPs need to be aware of in 2017 and how you can keep your clients protected from them.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services, Internet of Things

Putting the S in MSSP: A Recap [SLIDESHARE]

Posted by Meaghan Moraes on July 12, 2017

Putting the S in MSSP: A Recap SlideShare

Today’s cyber threat landscape has caused a cloud of risk and uncertainty to loom over modern business. With the digital wave washing over organizations of all sizes, the potential of experiencing a cyber attack has expanded exponentially. IT security is now seen as a top priority, especially for small- and medium-sized businesses (SMBs) who are at high risk of completely shutting down if proper cyber defenses are not in place. As an MSP who serves these SMB clients, it’s up to you to step in and provide robust cybersecurity that can withstand the modern threat landscape and ensure businesses remain protected and set to scale.

Over the past six weeks, we’ve offered a step-by-step explanation of what it takes to evolve from MSP to managed security services provider (MSSP): the trusted, go-to security expert that offers the level of security that will effectively manage vulnerabilities and prevent clients from potential disasters. Now, let’s recap what steps you need to take to successfully bring an IT security offering to market.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 6: How Traditional IT Service Providers Can Embrace Cybersecurity Services in 2017

Posted by Meaghan Moraes on July 5, 2017

Putting the S in MSSP Part 6: How Traditional IT Service Providers Can Embrace Cybersecurity Services in 2017

Throughout the Putting the S in MSSP series, we’ve shared the building blocks for becoming a comprehensive managed IT services provider capable of keeping clients effectively protected from cyber threats. In part five, we discussed how to offer security-as-a-service in a way that enables both you and your clients to scale. To wrap up this cybersecurity series, we will ensure you understand how to properly define what robust cybersecurity looks like in 2017 so you can include security as part of your offering and prevent your clients’ businesses from becoming obsolete.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 5: Scaling Your Business with Security-as-a-Service

Posted by Meaghan Moraes on June 29, 2017

Putting the S in MSSP Part 5: Scaling Your Business with Security-as-a-Service

If you’ve been following our “Putting the S in MSSP” blog series, you’re well on your way to becoming a comprehensive MSSP who can secure and protect your SMB clients. However, when building and establishing this new line of business, how can you ensure that your security offering is built to scale?

In part four, we discussed top tactics for effectively speaking to SMBs about cybersecurity. In this post, we’ll focus on how to offer security-as-a-service in a way that enables both you and your clients to scale.  


Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Posted by Meaghan Moraes on June 21, 2017

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure SMBs with the tools needed to tread the modern threat landscape without fear.


In part three
, we examined the lifecycle of a cyber attack and walked through how to devise a solid remediation plan and manage vulnerabilities. In this post, we’ll take that knowledge a step further and offer key tips on how MSPs should be framing the topic of cybersecurity to their clients.

Read More

Topics: Sales and Marketing, Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Posted by Meaghan Moraes on June 14, 2017

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure small- and medium-sized businesses (SMBs) with the tools needed to tread the modern threat landscape without fear.

In the first part of this series, we offered tips on how to begin defining and deploying the three pillars of cybersecurity. In part two, we went on to talk about the three major pitfalls of managing multiple security vendors. In this post, we will examine the lifecycle of a cyber attack, providing insight on how to devise a solid remediation plan and manage vulnerabilities.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus