MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Meaghan Moraes

Meaghan Moraes is a Content Marketing Manager at Continuum, focusing on inbound and content marketing efforts surrounding cybersecurity and threat management. With several years of agency and tech marketing experience, Meaghan specializes in driving leads and conversion with her strategic and creative digital marketing content. In her spare time, she enjoys writing poetry, playing the piano, boxing, and exploring Boston’s best restaurants.
Find me on:

Recent Posts

New Locky-Variant Ransomware: What MSPs and MSSPs Need to Know

Posted by Meaghan Moraes on August 17, 2017

New Locky-Variant Ransomware: What MSPs and MSSPs Need to Know

As an IT professional, you know how relentless ransomware attacks have become in today’s landscape. Recently, a variant of the notorious Locky ransomware has become part of a large-scale email-based campaign managing to slip past the defenses of some unsuspecting companies.

On August 9, the first campaign of a massive, worldwide ransomware attack was detected—and 62,000 phishing emails related to the attack have been identified as of last week. This new Locky-variant continues to unfold, powered from more than 11,625 distinct IP addresses in 133 different countries (the top five being Vietnam, India, Mexico, Turkey and Indonesia). As an MSP, here’s what you need to know about this new Locky-variant ransomware and how you can ensure you and your clients can remain protected against it.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

10 Cybersecurity Statistics Every MSP Should Memorize

Posted by Meaghan Moraes on August 2, 2017

10 Cybersecurity Statistics Every MSP Should Memorize

Today, business professionals that do not consider cybersecurity a top concern may be living under a rock—and in actuality, the modern threat landscape should make them want to hide under one.

Managed IT service providers are realizing the importance of offering their clients security services because of, well, the numbers. The following ten statistics illustrate current cybersecurity threats to businesses, holes that leave many organizations vulnerable to cyber attacks, and the repercussions of not having a robust security strategy in place in today’s tumultuous IT landscape. Consider leveraging these facts in your conversations with clients and prospects to strengthen the way you sell your services and security expertise!

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Why Phishing is the Go-To Method for Cyber Criminals

Posted by Meaghan Moraes on July 28, 2017

Why Phishing is the Go-To Method for Cyber Criminals

The term “phishing” has been circulating the business realm for quite some time—largely because of its popularity amongst cyber criminals. Phishing is a type of social engineering attack that tricks victims into giving away information to cyber criminals posed as a trusted source. It’s an easy and effective way for criminals to hack sensitive systems and information, and the dangerous aspect is that it can come in many forms—the main one being email. Today, phishers, on average, launch a new attack every 30 seconds—and phishing schemes are growing increasingly sophisticated as cyber attackers use new tools and tactics to create authentic-looking emails.

Low-cost phishing and ransomware tools are very easy to get a hold of, and the attacks are just as easy to execute. So, what makes phishing such a successful method of cyber attack, and what can organizations do to protect themselves? In this post, we’ll dive into why phishing is so prevalent and how companies can work to mitigate these attacks.

Read More

Topics: Information Security, Cybersecurity and Threat Management

Putting the S in MSSP: A Recap [SLIDESHARE]

Posted by Meaghan Moraes on July 12, 2017

Putting the S in MSSP: A Recap SlideShare

Today’s cyber threat landscape has caused a cloud of risk and uncertainty to loom over modern business. With the digital wave washing over organizations of all sizes, the potential of experiencing a cyber attack has expanded exponentially. IT security is now seen as a top priority, especially for small- and medium-sized businesses (SMBs) who are at high risk of completely shutting down if proper cyber defenses are not in place. As an MSP who serves these SMB clients, it’s up to you to step in and provide robust cybersecurity that can withstand the modern threat landscape and ensure businesses remain protected and set to scale.

Over the past six weeks, we’ve offered a step-by-step explanation of what it takes to evolve from MSP to managed security services provider (MSSP): the trusted, go-to security expert that offers the level of security that will effectively manage vulnerabilities and prevent clients from potential disasters. Now, let’s recap what steps you need to take to successfully bring an IT security offering to market.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 6: How Traditional IT Service Providers Can Embrace Cybersecurity Services in 2017

Posted by Meaghan Moraes on July 5, 2017

Putting the S in MSSP Part 6: How Traditional IT Service Providers Can Embrace Cybersecurity Services in 2017

Throughout the Putting the S in MSSP series, we’ve shared the building blocks for becoming a comprehensive managed IT services provider capable of keeping clients effectively protected from cyber threats. In part five, we discussed how to offer security-as-a-service in a way that enables both you and your clients to scale. To wrap up this cybersecurity series, we will ensure you understand how to properly define what robust cybersecurity looks like in 2017 so you can include security as part of your offering and prevent your clients’ businesses from becoming obsolete.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 5: Scaling Your Business with Security-as-a-Service

Posted by Meaghan Moraes on June 29, 2017

Putting the S in MSSP Part 5: Scaling Your Business with Security-as-a-Service

If you’ve been following our “Putting the S in MSSP” blog series, you’re well on your way to becoming a comprehensive MSSP who can secure and protect your SMB clients. However, when building and establishing this new line of business, how can you ensure that your security offering is built to scale?

In part four, we discussed top tactics for effectively speaking to SMBs about cybersecurity. In this post, we’ll focus on how to offer security-as-a-service in a way that enables both you and your clients to scale.  


Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Posted by Meaghan Moraes on June 21, 2017

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure SMBs with the tools needed to tread the modern threat landscape without fear.


In part three
, we examined the lifecycle of a cyber attack and walked through how to devise a solid remediation plan and manage vulnerabilities. In this post, we’ll take that knowledge a step further and offer key tips on how MSPs should be framing the topic of cybersecurity to their clients.

Read More

Topics: Sales and Marketing, Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Posted by Meaghan Moraes on June 14, 2017

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure small- and medium-sized businesses (SMBs) with the tools needed to tread the modern threat landscape without fear.

In the first part of this series, we offered tips on how to begin defining and deploying the three pillars of cybersecurity. In part two, we went on to talk about the three major pitfalls of managing multiple security vendors. In this post, we will examine the lifecycle of a cyber attack, providing insight on how to devise a solid remediation plan and manage vulnerabilities.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 2: 3 Pitfalls of Managing Multiple Security Vendors

Posted by Meaghan Moraes on June 7, 2017

MSSP: 3 Pitfalls of Managing Multiple Security Vendors

As a managed IT services provider, you’ve served as the tech backbone of your clients for years, in a variety of ways. From RMM to BDR to security, your offerings provide small- and medium-sized businesses (SMBs) with the level of support, cost-efficiency and scalability they need to survive in the modern business world. Or so you hope.

"Putting the S in MSSP" is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. In part one of this series, we offered tips on how to properly define and deploy the three pillars of cybersecurity so you’re setting a solid foundation for your security services. In this post, we’ll highlight three major downsides to offering your clients security via a number of different vendors, and discuss best practices for implementing truly robust cybersecurity.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 1: Defining and Deploying the 3 Pillars of Cybersecurity

Posted by Meaghan Moraes on May 31, 2017

Putting the S in MSSP Part 1: Defining and Deploying the 3 Pillars of Cybersecurity

With increasingly complex threats flooding the modern IT landscape, small- and medium-sized businesses (SMBs) are struggling to keep their heads above water. We’ve all seen the stats, right? Malicious attacks are on the rise, and your SMB clients are increasingly (and successfully) becoming the targets. Unfortunately, this means that your IT services of yore simply aren’t enough to keep up with the ever-present, ever-evolving cyber threats that plague modern business. As an MSP, what is there left for you to do? The answer might be to adopt a managed security services provider (MSSP) model and integrate security services into your portfolio.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus