MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

The-Ultimate-Guide-to-Success-in-Managed-IT-Services


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

5 Steps to Take After a Ransomware Infection

Posted by Hunter Smith on July 5, 2018

5 Steps to Take After a Ransomware Infection

As a managed IT services provider, it is vital that you do everything you can to prevent your clients’ machines from getting infected with any malicious software. Letting them know that they can take some simple precautions—like having adequate security software (antivirus and anti-malware) installed on their computer, applying OS security patches, not clicking on suspicious email links they don't recognize and not opening unexpected email attachments—can be game-changing for your role as their MSSP, security partner and advisor.

The five following tips will ensure you’re able to effectively communicate to your clients how to deal with ransomware and keep them as best protected as possible with your MSSP services.

Read More

Topics: Information Security, Cybersecurity and Threat Management

Webroot’s 2018 Cyber Security Threat Report: 5 Findings to Keep with You in the Year Ahead

Posted by George Anderson on June 21, 2018

Webroot’s 2018 Cyber Security Threat Report: 5 Findings to Keep with You in the Year Ahead

Each year, a team of Webroot analysts and threat researchers take a look back at some of the most salient cyber threat trends to emerge over the previous year. With more than 40 million licensed endpoints and a threat intelligence platform capable of integrating information from billions of URLs, domains, IP addresses, files, and mobile apps, Webroot has the capacity to dive deep into the real-world threat landscape.

Here are five clear trends we saw emerge over the course of 2017.

Read More

Topics: Information Security, Cybersecurity and Threat Management

The Worst Passwords You Could Possibly Use Are…

Posted by Lily Teplow on June 7, 2018

The Worst Passwords You Could Possibly Use Are

You tell your clients all the time about good password policies. You tell your friends and family. You may be able to rattle off in your sleep “unique, long strings of varied characters with multiple numbers, capitals, and special characters.” But just how many people are heeding the call for better security? Has the public started taking cyber security seriously?

Read More

Topics: Data Protection, Information Security

7 Vulnerabilities You Didn’t Know Existed in Your System Configuration

Posted by Lily Teplow on June 1, 2018

Today's businesses are hyper-focused on ensuring their IT environments are secure and protected from cyber threats. However, with all the attention being given to the front lines of defense, what happens if you leave the back door open to hackers and intruders?

Configuration errors, lack of IT controls, un-secure internal processes—these are all examples of vulnerabilities that could lead to security breach and major data loss. To decrease the chances of a successful breach, organizations can take simple countermeasures, such as working with an MSP to tighten IT security. But first, look out for these seven basic avenues that might be open to cyber criminals. 

Read More

Topics: Information Security, Cybersecurity and Threat Management

Watch Out for This Royal Wedding Scam

Posted by Lily Teplow on May 25, 2018

Watch Out for This Royal Wedding Scam

Ever since Prince Harry and Meghan Markle tied the knot last Saturday, my news feed has been flooded with Royal Wedding coverage, updates, opinion articles and quizzes. In fact, one of the quizzes I came across the other day was titled, “What’s Your Royal Guest Name?”

Seemingly innocent, this quiz provides you with “your new royal identity,” and has since swept the Internet. But, what makes this quiz so cleverly dangerous is that unbeknownst to those who are participating, their answers could help scammers get their hands on some sensitive data.

While it’s likely that you and your clients may not be taking quizzes like these (or maybe you are, I don’t judge), it’s yet another example of the power of social engineering and how easily people can be duped into divulging personal information. In this post, I’ll cover how this scam works and what you and your clients should look out for.

Read More

Topics: Industry News, Information Security

5 Tips for MSPs Selling Security Awareness Training

Posted by George Anderson on May 22, 2018

5 Tips for MSPs Selling Security Awareness Training

In the past year, global ransomware debilitated entire sectors of some countries’ economies. Equifax was breached, exposing more than 140 million records. Yahoo owned up to losing control of 3 million users’ data. So, it’s no surprise that the cost of cybercrime has steadily risen each year for the past two years, to an average cost of $11.7 million per business.

According to the research firm Gartner, untrained users click 90 percent of links within emails from addresses outside the enterprise, resulting in 10,000 malware infections. By their calculations, the infections led to an overall productivity loss of 15,000 hours per year, which, at a cost of 15,000 times $85 (average wage), equals $1,275,000 in losses.  Verizon's annual Data Breach Investigation Report backs up Gartner's findings, pinning 90 percent of successful network breaches on users taking the bait in phishing attacks. 

But cybercrime and its associated costs can be reduced when end users are trained to be their employers’ first line of defense. Security awareness training results in reduced risk, businesses that are better protected against breaches, and more profitable MSPs.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Security Awareness Training

The Basics of Cyber Security Training for End-Users

Posted by Lily Teplow on May 10, 2018

The Basics of Cyber Security Training for End-Users

What’s the biggest risk to an organization’s information security? Hint: it has little to do with the technology. Rather, it is the action—or inaction—of their employees.

Human error has become a major weak point today; one that is easily exploited by cyber criminals. In fact, almost 90 percent of cyber attacks are caused by human error or behavior. Therefore, it’s vital that businesses have some form of cyber security training in place to educate employees on the importance of protecting sensitive information and what malicious threats to look out for.

As an IT services provider committed to protecting your clients and their business, the task of security education and training falls into your hands. Keep reading to discover which essential elements you should cover when providing security awareness training.

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Phishing Scams: What You Need to Know to Avoid Them

Posted by Hunter Smith on April 11, 2018

Phishing-Scams-and-How-to-Avoid-Them

As a managed IT services provider (MSP), there are a myriad of security threats that you and your clients face today. One threat that constantly comes up is phishing scams. These scams can be fairly simple, yet very effective at duping the user and capturing their private information. Even the slightest clue to a username and/or password can give hackers all they need to break into private systems and steal information from companies and individuals—and for this reason, it’s crucial to be aware of phishing schemes, tactics and best practices for avoidance.

Read More

Topics: Tech Quick Tips, Data Protection, Information Security, Cybersecurity and Threat Management

Can You Spot the 6 Security Flaws in This Photo?

Posted by Lily Teplow on February 23, 2018

Can You Spot the 6 Security Flaws in This Photo?

As the cyber threat landscape continues to evolve, so too does the sophistication of cyber attacks. We’re all aware of the ongoing work that needs to be done to keep sensitive information safe from hackers and stay ahead of the threat landscape, but there’s another side to the coin, and that’s physical security.

Many offices don't enforce best practices for physical information security, and frankly may just not be aware of them. As their MSP, your job is to educate them on these best practices, both from a technology standpoint and from a physical standpoint.

So, it’s time to put your knowledge to the test. Can you find the six security flaws in this picture?

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Five Keys to Successful MSP Security Services: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on February 19, 2018

Five Keys to Successful MSP Security Services

There’s no denying that security services are more complex and nuanced than many other managed IT services—and in order to be successful as a security provider, there are a number of important factors and elements you’ll need to consider. In this episode of The Weekly Byte, we outline five of these and explain how you can drive success with each—tune in now to learn more!

Read More

Topics: Sales and Marketing, Information Security, The Weekly Byte, Managed Security Services

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus