MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Protect Yourself and Clients from Malware

Posted by Hunter Smith on November 30, 2017

"Attention! We've detected malicious activity on your computer. Download antivirus now."

Spyware, Keyloggers, Scareware (described in example above), Ransomware and more. It seems like malware, or malicious software, lurks around every corner of the Internet, be it in a threatening email attachment or false online advertisement. There are now newer, subtler ways for your clients to have their personal data stolen, and few will be able to detect the warning signs of the various types of malware attacks before the damage is done and the data is lost. It is time to teach yourself and your clients how to prevent malware from causing unnecessary problems on your computers and servers.

Read More

Topics: Data Protection, Backup and Disaster Recovery, Mobile Device Management and IT Mobility, Cybersecurity and Threat Management

IT Trick or Treat: Top 5 Scariest Cyber Threats of 2017

Posted by Lily Teplow on October 27, 2017

IT Trick or Treat: Top 5 Scariest Cyber Threats of 2017

We are living in a world where cybercrime is the greatest threat to every business. Today’s news headlines are littered with the latest data breach or attack, and these will only proliferate as the years go on. What’s more, attackers are even broadening their approach to cyberattacks in order to strengthen their potential impact, causing cybercrime damages to cost the world $6 trillion annually by 2021.

A new bar has been set for cybersecurity teams across all industries to defend their assets in the coming year. This is especially important for IT service providers, whose clients are trusting them to keep their IT systems and environments protected from harm. But in order to prepare for the future, sometimes you need to analyze and learn from the past. So, let’s take a look back on the top cyber threats the industry has had to face in 2017.

Read More

Topics: Mobile Device Management and IT Mobility, Cybersecurity and Threat Management, Managed Security Services, Internet of Things

The Future of Cybersecurity Is Intelligent, Integrated and in the Cloud

Posted by Dawn Farrell on September 29, 2017

The Future of Cybersecurity Is Intelligent, Integrated and in the Cloud

There’s no arguing that technology is increasingly evolving and shifting. In recent years, we’ve seen this as a shift towards the cloud, providing many advantages and offering an agility never seen before in computing. As a natural progression, it makes sense that security solutions are being offered from the cloud, in the ‘as a service’ format. Experts predict this will grow at five times the rate of traditional software delivery.

Cloud-based technologies have the upper hand in the fight against malicious attacks and software vulnerabilities. The remarkable speed in reaction, along with the abilities to analyze vast amounts of data, are compelling benefits. There is also a welcome factor of convenience. Service providers can deliver a truly scalable solution to clients, enabling business expansion and an increase in revenue streams. Let’s take a deeper look into the future of cybersecurity and how service providers can capitalize.

Read More

Topics: Cloud Computing, Mobile Device Management and IT Mobility, Cybersecurity and Threat Management

Simplifying 3 Trends That Are Changing the IT Landscape

Posted by Meaghan Moraes on April 21, 2017

Simplifying 3 Trends That Are Changing the IT Landscape

Let’s face it, modern IT is complicated. With new components being continuously added to the mix, managing and securing the IT landscape requires new tools fit for the challenge. However, the last thing managed services providers (MSPs) need is yet another disparate management tool that adds more complexity to their services. Without cohesive IT and service level management, there will be serious disconnects—from servers and networks, to storage and end points. 

Amidst the changing tides of technology, MSPs can help their clients ensure IT service and business success with an integrated approach. The following are three growing trends that MSPs should understand how to embrace and capitalize on in order to achieve sustainable profitability and business growth.

Read More

Topics: Cloud Computing, SMB Trends, Mobile Device Management and IT Mobility

How MDM Can Fend off Threats to Endpoint Security [CHART]

Posted by Lily Teplow on September 16, 2016

Mobility is a necessary part of the modern workplace. Mobile devices improve business efficiency and productivity, but they also have the ability to expose and compromise company data. If your client’s endpoints aren’t being protected by a solution like Mobile Device Management (MDM), vulnerabilities have a higher likelihood of being successfully exploited. To determine if clients and prospects are ready to invest in your MDM solution, ask them this: are you fully protected against today’s endpoint security threats?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Mobile Device Management and IT Mobility, MSP Sales Chart

Mobile Security Framework: The Mobile Device Management Foundation

Posted by Rob Patey on September 8, 2016

Here’s a riddle: How does a mobile strategy turn from a gleaming skyscraper touching new heights of business productivity into a towering inferno? The answer: a poor mobile security foundation.


As the average mobile device gets more minuscule in the form of wearables and whatever technology comes next, many organizations need to go back to the basics of mobile security. That is one of the lessons Tyler Shields of Forrester Research recently shared in a mobile security video series.

Read More

Topics: Mobile Device Management and IT Mobility, Navigate 2016

Are Your Employees Risking Sensitive Company Data? [CHART]

Posted by Lily Teplow on July 22, 2016

In today’s job landscape, the ability to access work files and email on-the-go has become part of everyday operations. Smartphones and tablets continue to flood the workplace, and your clients’ employees are storing a lot of important data on them. So how can they ensure that the corporate data being accessed through these mobile devices stays secure?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Mobile Device Management and IT Mobility, MSP Sales Chart

A Bad Case of Stagefright: Vulnerability Resurfaces in Apple Devices

Posted by Joseph Tavano on July 21, 2016

Imagine this scenario:

You woke early from a great night of sleep, well rested. The sun is shining outside. It’s Saturday, and you have no plans whatsoever, for the first time in a long time. The day is yours to make it whatever adventure you choose it to be. The world isn’t perfect, but right now life is good.

You take your phone off the charger, and notice tat you have no messages. Odd! You typically have a few, if only from social media. Further investigation reveals your contact list is gone. Emails, texts, messages, and photos too. Apps, data—everything has been wiped from your phone! While you were sleeping, the attacker gained access to all of your sensitive data through your phone, locked you out of your email and banking accounts, and gained access to your business’ secure network. And to make matters worse, you don’t know how it happened.

Read More

Topics: Industry News, Information Security, Mobile Device Management and IT Mobility

Pokémon GO and What It Means for MSPs

Posted by Lily Teplow on July 19, 2016

Over the past two weeks, cartoon creatures have officially taken over our world. If you haven’t seen them, it’s because they’re only visible when playing the new game, “Pokémon GO”. This free smartphone game fuses virtual technology with the physical world, causing it to quickly become a cultural phenomenon and the biggest mobile game in U.S. history.

However, Pokémon GO’s rapid rise in popularity has also raised some major security concerns. While millions of users wander the world searching for Squirtles and Pikachus, they may not be aware of what they’re giving up in return for playing the game.

Read More

Topics: Industry News, Information Security, Mobile Device Management and IT Mobility, Cybersecurity and Threat Management

5 Tips to Beef Up Your Email Security

Posted by Joseph Tavano on March 25, 2016

You’ve implemented the strongest firewalls. Your passwords are 100 character strings that must contain Capitals, lowercases, and special characters in non-repeating patterns. You skipped over two-factor and went straight to five-factor authentication. Everything is retina scanned. Your encryption is encrypted.

And one email from a prince needing money wired to his account brought the whole thing crashing down.

Read More

Topics: Data Protection, Information Security, Mobile Device Management and IT Mobility

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus