MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Phishing Scams: What You Need to Know to Avoid Them

Posted by Hunter Smith on April 11, 2018

Phishing-Scams-and-How-to-Avoid-Them

As a managed IT services provider (MSP), there are a myriad of security threats that you and your clients face today. One threat that constantly comes up is phishing scams. These scams can be fairly simple, yet very effective at duping the user and capturing their private information. Even the slightest clue to a username and/or password can give hackers all they need to break into private systems and steal information from companies and individuals—and for this reason, it’s crucial to be aware of phishing schemes, tactics and best practices for avoidance.

Read More

Topics: Tech Quick Tips, Data Protection, Information Security, Cybersecurity and Threat Management

Can You Spot the 6 Security Flaws in This Photo?

Posted by Lily Teplow on February 23, 2018

Can You Spot the 6 Security Flaws in This Photo?

As the cyber threat landscape continues to evolve, so too does the sophistication of cyber attacks. We’re all aware of the ongoing work that needs to be done to keep sensitive information safe from hackers and stay ahead of the threat landscape, but there’s another side to the coin, and that’s physical security.

Many offices don't enforce best practices for physical information security, and frankly may just not be aware of them. As their MSP, your job is to educate them on these best practices, both from a technology standpoint and from a physical standpoint.

So, it’s time to put your knowledge to the test. Can you find the six security flaws in this picture?

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Five Keys to Successful MSP Security Services: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on February 19, 2018

Five Keys to Successful MSP Security Services

There’s no denying that security services are more complex and nuanced than many other managed IT services—and in order to be successful as a security provider, there are a number of important factors and elements you’ll need to consider. In this episode of The Weekly Byte, we outline five of these and explain how you can drive success with each—tune in now to learn more!

Read More

Topics: Sales and Marketing, Information Security, The Weekly Byte, Managed Security Services

Four Questions to Ask Prospects During Your Security Pitch: The Weekly Byte [VIDEO]

Posted by Brandon Garcin on February 12, 2018

Four Questions to Ask Prospects During Your Security Pitch

Selling security can be tricky, especially during initial conversations where your prospects may not fully understand the importance of protecting their IT infrastructure. Fortunately, the right discovery questions can help you drive the conversation forward and uncover the right pain points to address via your service offerings. In this episode of The Weekly Byte, we outline four important questions to ask every prospect when selling security. Tune in now to learn more!

Read More

Topics: Sales and Marketing, Information Security, The Weekly Byte, Managed Security Services

5 Critical Cybersecurity Training Courses and Certifications

Posted by Meaghan Moraes on January 31, 2018

5-Critical-Cybersecurity-Training-Courses-and-Certifications.png

As an MSP, MSSP or IT service provider, you’re likely committed to effectively assessing vulnerabilities, securing networks and endpoints, and mitigating cybersecurity incidents in 2018. Of course, you know that the first line of defense against cyber threats in business is the employee, so ensuring that everyone in an organization is properly trained on security best practices is the vital first step. In fact, increased investment in employee training can reduce the risk of a cyber attack up to 70 percent, according to Wombat Security Technologies and the Aberdeen Group.

Both MSPs and their clients should be well versed in the latest cybersecurity developments and requirements—that’s why we’ve outlined five critical cybersecurity training courses and certifications built to ensure businesses are up-to-speed on security knowledge! Here are some key areas to consider.  

Read More

Topics: Information Security, Cybersecurity and Threat Management

Federal Health Officials: Lenient Security Practices to Blame for Quickening Pace of HIPAA Violations

Posted by Britany DiCicco on December 22, 2017

Federal Health Officials: Lenient Security Practices to Blame for Quickening Pace of HIPAA Violations

When a patient visits their local medical practice or community hospital, they are entrusting the organization with their most sensitive information—such as medical data, health insurance IDs and social security numbers. The medical practice that is left with this information has a team of doctors who promised to “first do no harm,” meaning that his or her first consideration is the patients’ well-being—which includes protecting their privacy. However, without the proper security tools in place, they are putting their patients at great risk for becoming victim to cybercrime and exposing their personal information.

Let’s take a closer look at why medical practices have become the primary target of cyber criminals and how it has called for a recent harshening in HIPAA regulations.

Read More

Topics: Information Security, HIPAA, Healthcare IT

10 Reasons Why Small Medical Practices and Community Hospitals Are the Principal Target of Cyber-Attacks

Posted by Britany DiCicco on December 1, 2017

10 Reasons Why Small Medical Practices and Community Hospitals Are the Principal Target of Cyber-Attacks

Cybercriminals are constantly searching for their next big exploitation opportunity, and medical practices are usually the target. In recent years alone, we’ve seen an avalanche of awful breach news that shook many medical organizations. But why are medical records such a popular target for cybercriminals, and what can be done about it?

If you’re a managed service provider (MSP) servicing the healthcare industry, your clients need to know exactly why they are a prime target for cybercriminals and how you can help bolster their defenses. If you’re looking to break into the healthcare vertical, the following ten reasons serve as your perfect argument to persuade medical practices to invest in your services.

Read More

Topics: Information Security, Healthcare IT, Cybersecurity and Threat Management

The Top 10 Ransomware Attacks of 2017

Posted by Lily Teplow on November 10, 2017

The Top 10 Ransomware Attacks of 2017

Dominating the threat landscape this year, ransomware has become an issue that all modern businesses need to worry about. While ransomware isn’t a new phenomenon, over the years it has grown from a mild annoyance to a shocking financial burden for many individuals and businesses today. Variants such as NotPetya, WannaCry, and Locky are among those that wreaked havoc for businesses worldwide this year—rising to become some of the most damaging ransomware attacks in history.

Recently, the Webroot threat research team released their list of the Top 10 Nastiest Ransomware Profiles, which highlights the most destructive ransomware of 2017. The list illustrates the reality of how cybercriminals will continue to develop new infections and capitalize on reliable, successful attack methods. Keep reading to discover the top ransomware attacks of this past year, what you might need to look out for in 2018, and how you can keep yourself and your clients protected from the threat of ransomware.

Read More

Topics: Information Security, Cybersecurity and Threat Management

Understanding HIPAA and Healthcare IT: Part 1

Posted by Britany DiCicco on September 15, 2017

Understanding HIPAA and Healthcare IT: Part 1

Before the beginning of 2017, Experian predicted that the healthcare sector would be the most targeted sector for cyber criminals to exploit. In May of this year, that prediction came to life when the malware known as WannaCry caused 37 of the health trusts in the UK’s National Health Service to shut down, eventually spreading across 150 countries. Unfortunately, this is just one of many cyber attacks that healthcare organizations have recently faced. Today, these organizations are seeking aid with HIPAA compliance and increased security, causing them to look to managed services providers (MSPs) for help.

Read More

Topics: Information Security, HIPAA, Healthcare IT

What Should MSPs Know About the HIPAA Security Rule?

Posted by Britany DiCicco on August 15, 2017

What Should MSPs Know About the HIPAA Security Rule?

Today, managed services providers (MSPs) who service clients in the healthcare industry have to worry about compliance—it’s simply part of the job. These MSPs offer their services to small- and medium-sized medical practices who rely on them to keep their security architecture safe and compliant with HIPAA (Health Insurance Portability and Accountability Act). Bearing the burden of this responsibility means that MSPs must have encyclopedic knowledge about HIPAA, and also have the proper security tools in place to meet the stringent requirements that are associated with HIPAA compliance.

As the healthcare industry continues to move away from paper processes and adopt new technologies, they are becoming increasingly prone to cyber attacks. It’s now more important than ever for MSPs to fully understand the HIPAA Security Rule and enable the medical practices they serve to remain compliant.

Read More

Topics: Information Security, HIPAA, Healthcare IT

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus