MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

The-Ultimate-Guide-to-Success-in-Managed-IT-Services


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

Important Tips for Improving Password Security

Posted by Lily Teplow on November 8, 2018

Password-Security-Tips

Sometimes it is the simplest or most obvious things that can be easily overlooked or taken for granted in life. The IT space is no different and many of the most basic elements, like password management, can oftentimes be overlooked. While it’s not the sexiest of topics, passwords are something we use every day and should be at the forefront of any security plan.

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Machine Learning: Game-Changing Innovation or Hype?

Posted by George Anderson on October 23, 2018

Machine Learning: Game-Changing Innovation or Hype?

Legacy approaches to cyber security rely on threat signatures and blacklists for cross-referencing known threats. Shortening malware lifespans greatly reduced the efficacy of such approaches over time, though, and the advent of polymorphic malware has all but finished them off. In 2017, 93 percent of the malware Webroot encountered had never been seen before, making nearly all malware essentially invisible to static threat lists.

So is machine learning the answer to a shifting threat landscape, or are hopes that it’s the good guy’s best hope for staying ahead of hackers misplaced?

Read More

Topics: Cybersecurity and Threat Management, Information Security

4 Simple Steps for Better Online Security

Posted by Lily Teplow on October 2, 2018

4-Simple-Steps-for-Better-Online-Security

Did you know that October is National Cyber Security Awareness Month? As a collaborative effort between government and industry, National Cyber Security Awareness Month (NCSAM) was created fifteen years ago, and is now observed each year to ensure everyone has the resources they need to stay safer and more secure online.

As an MSP, online security is top-of-mind for you and your clients. Most places we go, there’s a network connection for us to link up to—a gateway into the World Wide Web, its endless information, and being able to connect with each other. But how can you protect your clients (and yourself) when browsing online?

Here are four tips you can share with your employees and clients to ensure better security while online.

Read More

Topics: Cybersecurity and Threat Management, Information Security

5 Security Threats to Your Business and How to Protect Your Assets and Customers

Posted by Ryan Gould on August 28, 2018

5 Security Threats to Your Business and How to Protect Your Assets and Customers

Criminals will always try to find ways to make money without having to do any of the work. This occurs offline as well as online, and B2B organizations are under constant threat of cyber attacks. Some of these threats come from sophisticated hackers intent on straight-up theft. Others are focused on a Purge-like effort to create mayhem, and then there are the threats like hacktivism and identity theft that can threaten the people within the organization as opposed to the company itself.

It’s said that 53 percent of companies are experiencing an increase in cyber-attacks and Gartner estimated that global spending on cybersecurity is predicted to reach $93 billion this year. To further highlight the seriousness of the issue, The World Economic Forum’s 2018 Global Risks Report pointed to cyber security as the third largest risk in terms of livelihood apart from extreme weather and natural disasters, and—after all—it’s people who make up B2B companies.

Cyber attackers are becoming more sophisticated with each passing year, and data breaches have cost organizations $50 billion in the last five years. That means that protecting your network, company, personnel, and assets should become a top priority if it’s not already.

Read More

Topics: Cybersecurity and Threat Management, Information Security, Security Awareness Training

5 Steps to Take After a Ransomware Infection

Posted by Hunter Smith on July 5, 2018

5 Steps to Take After a Ransomware Infection

As a managed IT services provider, it is vital that you do everything you can to prevent your clients’ machines from getting infected with any malicious software. Letting them know that they can take some simple precautions—like having adequate security software (antivirus and anti-malware) installed on their computer, applying OS security patches, not clicking on suspicious email links they don't recognize and not opening unexpected email attachments—can be game-changing for your role as their MSSP, security partner and advisor.

The five following tips will ensure you’re able to effectively communicate to your clients how to deal with ransomware and keep them as best protected as possible with your MSSP services.

Read More

Topics: Cybersecurity and Threat Management, Information Security

Webroot’s 2018 Cyber Security Threat Report: 5 Findings to Keep with You in the Year Ahead

Posted by George Anderson on June 21, 2018

Webroot’s 2018 Cyber Security Threat Report: 5 Findings to Keep with You in the Year Ahead

Each year, a team of Webroot analysts and threat researchers take a look back at some of the most salient cyber threat trends to emerge over the previous year. With more than 40 million licensed endpoints and a threat intelligence platform capable of integrating information from billions of URLs, domains, IP addresses, files, and mobile apps, Webroot has the capacity to dive deep into the real-world threat landscape.

Here are five clear trends we saw emerge over the course of 2017.

Read More

Topics: Cybersecurity and Threat Management, Information Security

The Worst Passwords You Could Possibly Use Are…

Posted by Lily Teplow on June 7, 2018

The Worst Passwords You Could Possibly Use Are

You tell your clients all the time about good password policies. You tell your friends and family. You may be able to rattle off in your sleep “unique, long strings of varied characters with multiple numbers, capitals, and special characters.” But just how many people are heeding the call for better security? Has the public started taking cyber security seriously?

Read More

Topics: Data Protection, Information Security

7 Vulnerabilities You Didn’t Know Existed in Your System Configuration

Posted by Lily Teplow on June 1, 2018

Today's businesses are hyper-focused on ensuring their IT environments are secure and protected from cyber threats. However, with all the attention being given to the front lines of defense, what happens if you leave the back door open to hackers and intruders?

Configuration errors, lack of IT controls, un-secure internal processes—these are all examples of vulnerabilities that could lead to security breach and major data loss. To decrease the chances of a successful breach, organizations can take simple countermeasures, such as working with an MSP to tighten IT security. But first, look out for these seven basic avenues that might be open to cyber criminals. 

Read More

Topics: Information Security, Cybersecurity and Threat Management

Watch Out for This Royal Wedding Scam

Posted by Lily Teplow on May 25, 2018

Watch Out for This Royal Wedding Scam

Ever since Prince Harry and Meghan Markle tied the knot last Saturday, my news feed has been flooded with Royal Wedding coverage, updates, opinion articles and quizzes. In fact, one of the quizzes I came across the other day was titled, “What’s Your Royal Guest Name?”

Seemingly innocent, this quiz provides you with “your new royal identity,” and has since swept the Internet. But, what makes this quiz so cleverly dangerous is that unbeknownst to those who are participating, their answers could help scammers get their hands on some sensitive data.

While it’s likely that you and your clients may not be taking quizzes like these (or maybe you are, I don’t judge), it’s yet another example of the power of social engineering and how easily people can be duped into divulging personal information. In this post, I’ll cover how this scam works and what you and your clients should look out for.

Read More

Topics: Information Security, Industry News

5 Tips for MSPs Selling Security Awareness Training

Posted by George Anderson on May 22, 2018

5 Tips for MSPs Selling Security Awareness Training

In the past year, global ransomware debilitated entire sectors of some countries’ economies. Equifax was breached, exposing more than 140 million records. Yahoo owned up to losing control of 3 million users’ data. So, it’s no surprise that the cost of cybercrime has steadily risen each year for the past two years, to an average cost of $11.7 million per business.

According to the research firm Gartner, untrained users click 90 percent of links within emails from addresses outside the enterprise, resulting in 10,000 malware infections. By their calculations, the infections led to an overall productivity loss of 15,000 hours per year, which, at a cost of 15,000 times $85 (average wage), equals $1,275,000 in losses.  Verizon's annual Data Breach Investigation Report backs up Gartner's findings, pinning 90 percent of successful network breaches on users taking the bait in phishing attacks. 

But cybercrime and its associated costs can be reduced when end users are trained to be their employers’ first line of defense. Security awareness training results in reduced risk, businesses that are better protected against breaches, and more profitable MSPs.

Read More

Topics: Cybersecurity and Threat Management, Information Security, Security Awareness Training

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus