MSP Blog Logo


Business Growth


Help Desk



Sales & Marketing


Empowering Your MSP Business to Grow and Prosper—One Post at a Time


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

5 Easy Ways to Improve Your Client’s Website Security

Posted by Larry Monuteaux on February 6, 2019


You just finished ramping up a new client. Everyone is logging on using complex passwords, the workstations and servers are on a regular patching schedule, the servers are getting backed up, the Wi-Fi is configured, and the printer is shared. The whole environment is running like a well-oiled machine—you’ve thought of everything! Or have you?

Well, if your client has a website (and who doesn’t, these days?), then they are probably going to ask you about that too. As their MSP, you are handling all of their computing needs, right? If you think that doesn’t involve making sure their website is secure, think again.

Read More

Topics: Information Security, Website Security

PCI DSS Back to Basics: Quick Tools and Tips for MSPs

Posted by Mark Cline on January 8, 2019


When it comes to the PCI DSS compliance discussion with your clients, things can get confusing fast. Merchants have many voices telling them various bits of information about their compliance—the bank, the payment processor, the POS solution provider, the POS integrator and so on. Most of the time, the information provided is out of context, incomplete or flat-out incorrect. As their IT service provider, you can play a central role in cutting through the confusion and providing a clear path to compliance.

Oftentimes, the best way to optimize your client relationships is getting back to basics. The following PCI DSS reminders and suggestions will help you effectively step in as the technology advisor and resource your customers will rely on to clarify the complexities of the IT channel. 

Read More

Topics: Information Security, Data Protection, PCI Compliance

5 Cyber Security Realities that Didn’t Exist 5 Years Ago

Posted by Meaghan Moraes on January 3, 2019

5 Cyber Security Realities

A lot can change in five years. Think of where we are today—now flash back five years to 2014. What was happening? The Winter Olympics in Sochi, the Ice Bucket Challenge, and we were only on iPhone 6. The world looked a bit differently then, and business concerns and priorities were different too—especially for small-to-medium-sized businesses (SMBs).

In 2014, customer acquisition and retention and business growth were top goals for SMBs, top IT priorities were social media and mobility solutions, and within the top five challenges for SMBs was data protection, recovery and business continuity. It’s interesting to compare these areas to SMB budgeting priorities for 2019.

Read More

Topics: Cybersecurity and Threat Management, Cyber Security, Information Security, Managed Security Services

3 Mobile Security Quick Tips to Share with Clients

Posted by Matt Mainhart on December 26, 2018


We live a mobile lifestyle. Our mobile devices keep us connected, and we can do anything from our mobile devices - from anywhere in the world. Online banking, hotel reservations, email – all can be accessed with a tap of the finger.

If you forget your phone at a restaurant, at work, or at the pub – how confident are you that nobody else can access your information?

While browsing the Internet, how confident are you that your information is only being viewed by you?

Follow these steps for a confidence boost in your mobile security:

Read More

Topics: Information Security, Client Quick Tips, Mobile Device Management and IT Mobility

Important Tips for Improving Password Security

Posted by Lily Teplow on November 8, 2018


Sometimes it is the simplest or most obvious things that can be easily overlooked or taken for granted in life. The IT space is no different and many of the most basic elements, like password management, can oftentimes be overlooked. While it’s not the sexiest of topics, passwords are something we use every day and should be at the forefront of any security plan.

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Machine Learning: Game-Changing Innovation or Hype?

Posted by George Anderson on October 23, 2018

Machine Learning: Game-Changing Innovation or Hype?

Legacy approaches to cyber security rely on threat signatures and blacklists for cross-referencing known threats. Shortening malware lifespans greatly reduced the efficacy of such approaches over time, though, and the advent of polymorphic malware has all but finished them off. In 2017, 93 percent of the malware Webroot encountered had never been seen before, making nearly all malware essentially invisible to static threat lists.

So is machine learning the answer to a shifting threat landscape, or are hopes that it’s the good guy’s best hope for staying ahead of hackers misplaced?

Read More

Topics: Cybersecurity and Threat Management, Information Security

4 Simple Steps for Better Online Security

Posted by Lily Teplow on October 2, 2018


Did you know that October is National Cyber Security Awareness Month? As a collaborative effort between government and industry, National Cyber Security Awareness Month (NCSAM) was created fifteen years ago, and is now observed each year to ensure everyone has the resources they need to stay safer and more secure online.

As an MSP, online security is top-of-mind for you and your clients. Most places we go, there’s a network connection for us to link up to—a gateway into the World Wide Web, its endless information, and being able to connect with each other. But how can you protect your clients (and yourself) when browsing online?

Here are four tips you can share with your employees and clients to ensure better security while online.

Read More

Topics: Cybersecurity and Threat Management, Information Security

5 Security Threats to Your Business and How to Protect Your Assets and Customers

Posted by Ryan Gould on August 28, 2018

5 Security Threats to Your Business and How to Protect Your Assets and Customers

Criminals will always try to find ways to make money without having to do any of the work. This occurs offline as well as online, and B2B organizations are under constant threat of cyber attacks. Some of these threats come from sophisticated hackers intent on straight-up theft. Others are focused on a Purge-like effort to create mayhem, and then there are the threats like hacktivism and identity theft that can threaten the people within the organization as opposed to the company itself.

It’s said that 53 percent of companies are experiencing an increase in cyber-attacks and Gartner estimated that global spending on cybersecurity is predicted to reach $93 billion this year. To further highlight the seriousness of the issue, The World Economic Forum’s 2018 Global Risks Report pointed to cyber security as the third largest risk in terms of livelihood apart from extreme weather and natural disasters, and—after all—it’s people who make up B2B companies.

Cyber attackers are becoming more sophisticated with each passing year, and data breaches have cost organizations $50 billion in the last five years. That means that protecting your network, company, personnel, and assets should become a top priority if it’s not already.

Read More

Topics: Cybersecurity and Threat Management, Information Security, Security Awareness Training

5 Steps to Take After a Ransomware Infection

Posted by Hunter Smith on July 5, 2018

5 Steps to Take After a Ransomware Infection

As a managed IT services provider, it is vital that you do everything you can to prevent your clients’ machines from getting infected with any malicious software. Letting them know that they can take some simple precautions—like having adequate security software (antivirus and anti-malware) installed on their computer, applying OS security patches, not clicking on suspicious email links they don't recognize and not opening unexpected email attachments—can be game-changing for your role as their MSSP, security partner and advisor.

The five following tips will ensure you’re able to effectively communicate to your clients how to deal with ransomware and keep them as best protected as possible with your MSSP services.

Read More

Topics: Cybersecurity and Threat Management, Information Security

Webroot’s 2018 Cyber Security Threat Report: 5 Findings to Keep with You in the Year Ahead

Posted by George Anderson on June 21, 2018

Webroot’s 2018 Cyber Security Threat Report: 5 Findings to Keep with You in the Year Ahead

Each year, a team of Webroot analysts and threat researchers take a look back at some of the most salient cyber threat trends to emerge over the previous year. With more than 40 million licensed endpoints and a threat intelligence platform capable of integrating information from billions of URLs, domains, IP addresses, files, and mobile apps, Webroot has the capacity to dive deep into the real-world threat landscape.

Here are five clear trends we saw emerge over the course of 2017.

Read More

Topics: Cybersecurity and Threat Management, Information Security

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus