MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Cybersecurity and Threat Management

6 Important OS Hardening Steps to Protect Your Clients

Featured Post

6 Important OS Hardening Steps to Protect Your Clients

In order to provide clients with peace of mind, safeguard their sensitive information and differentiate your security services from the competition, here are six ways to harden customers' operating systems.

Read Now

New Locky-Variant Ransomware: What MSPs and MSSPs Need to Know

Posted by Meaghan Moraes on August 17, 2017

New Locky-Variant Ransomware: What MSPs and MSSPs Need to Know

As an IT professional, you know how relentless ransomware attacks have become in today’s landscape. Recently, a variant of the notorious Locky ransomware has become part of a large-scale email-based campaign managing to slip past the defenses of some unsuspecting companies.

On August 9, the first campaign of a massive, worldwide ransomware attack was detected—and 62,000 phishing emails related to the attack have been identified as of last week. This new Locky-variant continues to unfold, powered from more than 11,625 distinct IP addresses in 133 different countries (the top five being Vietnam, India, Mexico, Turkey and Indonesia). As an MSP, here’s what you need to know about this new Locky-variant ransomware and how you can ensure you and your clients can remain protected against it.

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

10 Security Questions That Will Help Prospects Realize Their Need for Your Services

Posted by Lily Teplow on August 17, 2017

10 Security Questions That Will Help Prospects Realize Their Need for Your Services

One of the biggest challenges for managed services providers (MSPs) looking to add new clients is that prospects don't always realize their need for managed IT services. A business that may be a prime candidate for your services may be operating under the mindset of, "I've come this far without your help, why should I pay for it now?" The tough part is getting these prospects to answer that question for themselves.

So, how do you go about getting your prospects to that "aha!" moment? You need them to truly understand the risks that are facing them. Once they do, there is a very good chance that they will realize that they can't afford to risk data loss, data breach or the downtime that many of these vulnerabilities present. Instead of preaching to your prospects for hours on end, try challenging them to answer a set of security questions for you to make them realize just how ill-prepared they may be.

Read More

Topics: Data Protection, Backup and Disaster Recovery, Cybersecurity and Threat Management

What Should MSPs Know About the HIPAA Security Rule?

Posted by Britany DiCicco on August 15, 2017

What Should MSPs Know About the HIPAA Security Rule?

Today, managed services providers (MSPs) who service clients in the healthcare industry have to worry about compliance—it’s simply part of the job. These MSPs offer their services to small- and medium-sized medical practices who rely on them to keep their security architecture safe and compliant with HIPAA (Health Insurance Portability and Accountability Act). Bearing the burden of this responsibility means that MSPs must have encyclopedic knowledge about HIPAA, and also have the proper security tools in place to meet the stringent requirements that are associated with HIPAA compliance.

As the healthcare industry continues to move away from paper processes and adopt new technologies, they are becoming increasingly prone to cyber attacks. It’s now more important than ever for MSPs to fully understand the HIPAA Security Rule and enable the medical practices they serve to remain compliant.

Read More

Topics: Information Security, HIPAA, Healthcare IT

10 Cybersecurity Statistics Every MSP Should Memorize

Posted by Meaghan Moraes on August 2, 2017

10 Cybersecurity Statistics Every MSP Should Memorize

Today, business professionals that do not consider cybersecurity a top concern may be living under a rock—and in actuality, the modern threat landscape should make them want to hide under one.

Managed IT service providers are realizing the importance of offering their clients security services because of, well, the numbers. The following ten statistics illustrate current cybersecurity threats to businesses, holes that leave many organizations vulnerable to cyber attacks, and the repercussions of not having a robust security strategy in place in today’s tumultuous IT landscape. Consider leveraging these facts in your conversations with clients and prospects to strengthen the way you sell your services and security expertise!

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

The Top 5 MSP Blog Posts of July 2017

Posted by Lily Teplow on August 1, 2017

The Top 5 MSP Blog Posts of July 2017

Is it just me, or is this summer flying by way too fast? I always long for those longer, lazier summer days, but as a managed services provider (MSP), you know that your line of business never gets the day off. So, to make the most of your summer and help you set up your MSP business for long-term success, we’ve gathered our most helpful and valuable blog posts from July.

This past month was full of tips and best practices to help you grow your MSP business, including how to make impactful relationships with clients, what every MSP should include in their LinkedIn profile, which cybersecurity threats you need to look out for and much more. Let’s take a look at what the month of July had to offer on the MSP blog!

Read More

Topics: Business Development and Growth, Cybersecurity and Threat Management, Client Acquisition and Management

Why Phishing is the Go-To Method for Cyber Criminals

Posted by Meaghan Moraes on July 28, 2017

Why Phishing is the Go-To Method for Cyber Criminals

The term “phishing” has been circulating the business realm for quite some time—largely because of its popularity amongst cyber criminals. Phishing is a type of social engineering attack that tricks victims into giving away information to cyber criminals posed as a trusted source. It’s an easy and effective way for criminals to hack sensitive systems and information, and the dangerous aspect is that it can come in many forms—the main one being email. Today, phishers, on average, launch a new attack every 30 seconds—and phishing schemes are growing increasingly sophisticated as cyber attackers use new tools and tactics to create authentic-looking emails.

Low-cost phishing and ransomware tools are very easy to get a hold of, and the attacks are just as easy to execute. So, what makes phishing such a successful method of cyber attack, and what can organizations do to protect themselves? In this post, we’ll dive into why phishing is so prevalent and how companies can work to mitigate these attacks.

Read More

Topics: Information Security, Cybersecurity and Threat Management

3 Cybersecurity Threats MSPs Need to Monitor and Manage in 2017

Posted by Lily Teplow on July 14, 2017

3 Cybersecurity  Threats MSPs Need to Monitor and Manage in 2017

In the growing and evolving cyber threat landscape, how can managed services providers (MSPs) ensure that they’re delivering on their promise to secure and protect their clients at all times? Let’s face it, managing and monitoring cyber threats is not an easy task. MSPs are now under immense pressure to be the IT security superhero for their clients, but if you haven’t yet established a security offering, it may stunt your MSP growth.

Luckily, there are tools out there that can help you uphold your commitment to security, even amongst the major threats that are merged with business today. Let’s take a look at the three most crucial cyber threats MSPs need to be aware of in 2017 and how you can keep your clients protected from them.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services, Internet of Things

Putting the S in MSSP: A Recap [SLIDESHARE]

Posted by Meaghan Moraes on July 12, 2017

Putting the S in MSSP: A Recap SlideShare

Today’s cyber threat landscape has caused a cloud of risk and uncertainty to loom over modern business. With the digital wave washing over organizations of all sizes, the potential of experiencing a cyber attack has expanded exponentially. IT security is now seen as a top priority, especially for small- and medium-sized businesses (SMBs) who are at high risk of completely shutting down if proper cyber defenses are not in place. As an MSP who serves these SMB clients, it’s up to you to step in and provide robust cybersecurity that can withstand the modern threat landscape and ensure businesses remain protected and set to scale.

Over the past six weeks, we’ve offered a step-by-step explanation of what it takes to evolve from MSP to managed security services provider (MSSP): the trusted, go-to security expert that offers the level of security that will effectively manage vulnerabilities and prevent clients from potential disasters. Now, let’s recap what steps you need to take to successfully bring an IT security offering to market.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 6: How Traditional IT Service Providers Can Embrace Cybersecurity Services in 2017

Posted by Meaghan Moraes on July 5, 2017

Putting the S in MSSP Part 6: How Traditional IT Service Providers Can Embrace Cybersecurity Services in 2017

Throughout the Putting the S in MSSP series, we’ve shared the building blocks for becoming a comprehensive managed IT services provider capable of keeping clients effectively protected from cyber threats. In part five, we discussed how to offer security-as-a-service in a way that enables both you and your clients to scale. To wrap up this cybersecurity series, we will ensure you understand how to properly define what robust cybersecurity looks like in 2017 so you can include security as part of your offering and prevent your clients’ businesses from becoming obsolete.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

The Top 5 MSP Blog Posts of June 2017

Posted by Lily Teplow on July 4, 2017

The Top 5 MSP Blog Posts of June 2017

Happy 4th of July from all of us here at Continuum! Are you planning on heading to the beach or your local barbeque for America’s most patriotic holiday? As you search for those star-spangled pair of flip-flops or pack up your cooler, why not bring along June’s most popular MSP blog posts for some light reading?

This month, we’re sharing tips on how to demonstrate your MSP value to new clients, which IT certifications you should equip your techs with, the MSP’s guide to Petya ransomware and much more. Let’s dive right in!

Read More

Topics: Business Development and Growth, Cybersecurity and Threat Management

Putting the S in MSSP Part 5: Scaling Your Business with Security-as-a-Service

Posted by Meaghan Moraes on June 29, 2017

Putting the S in MSSP Part 5: Scaling Your Business with Security-as-a-Service

If you’ve been following our “Putting the S in MSSP” blog series, you’re well on your way to becoming a comprehensive MSSP who can secure and protect your SMB clients. However, when building and establishing this new line of business, how can you ensure that your security offering is built to scale?

In part four, we discussed top tactics for effectively speaking to SMBs about cybersecurity. In this post, we’ll focus on how to offer security-as-a-service in a way that enables both you and your clients to scale.  


Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

An MSP’s Guide to the Petya Ransomware Outbreak

Posted by Brian Downey on June 28, 2017

An MSP’s Guide to the Petya Ransomware Outbreak

The headline-grabbing nature of WannaCry put just about every IT and security team in reaction mode. Just one month after the WannaCry outbreak, we find ourselves reverting to reaction mode as the next batch of ransomware spreads across the globe—this time from the Petya family variant.

In a matter of hours, the new Petya ransomware spread its way across 65 countries. While WannaCry and Petya aren’t the first versions of ransomware, they are a new breed of ransomware, ones that use powerful exploits to enable rapid propagation within and to new organizations. As a managed services provider (MSP), it’s imperative that you understand this ransomware outbreak and how it can affect you or your clients’ businesses. Don’t know what Petya is or how you can stay protected? Here is your guide.

Read More

Topics: Industry News, Cybersecurity and Threat Management

The Next Big Thing for Continuity247®? Introducing Archive.

Posted by Joseph Tavano on June 28, 2017

The Next Big Thing for Continuity247® Introducing Archive

As you already know, there is no one-size-fits-all solution for the backup needs of small- and medium-sized businesses (SMBs). Even the name of the SMB category itself is representative of this scenario. With an array of company sizes in various industries, the backup requirements will differ for numerous reasons.

To meet that demand, Continuity247 is expanding to offer even more options for backup with its latest add-on, Archive. With Archive, MSPs using Continuity247 are now able to offer a long-term backup and restore option for less time-critical data, all at a low cost. And, because it can be added to any Continuity247 package (Local, Solo, Complete, or Flex), it can augment new or existing Continuity247 end user packages in a variety of ways.

Read More

Topics: Data Protection, Backup and Disaster Recovery, Continuity247

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Posted by Meaghan Moraes on June 21, 2017

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure SMBs with the tools needed to tread the modern threat landscape without fear.


In part three
, we examined the lifecycle of a cyber attack and walked through how to devise a solid remediation plan and manage vulnerabilities. In this post, we’ll take that knowledge a step further and offer key tips on how MSPs should be framing the topic of cybersecurity to their clients.

Read More

Topics: Sales and Marketing, Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Posted by Meaghan Moraes on June 14, 2017

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure small- and medium-sized businesses (SMBs) with the tools needed to tread the modern threat landscape without fear.

In the first part of this series, we offered tips on how to begin defining and deploying the three pillars of cybersecurity. In part two, we went on to talk about the three major pitfalls of managing multiple security vendors. In this post, we will examine the lifecycle of a cyber attack, providing insight on how to devise a solid remediation plan and manage vulnerabilities.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 2: 3 Pitfalls of Managing Multiple Security Vendors

Posted by Meaghan Moraes on June 7, 2017

MSSP: 3 Pitfalls of Managing Multiple Security Vendors

As a managed IT services provider, you’ve served as the tech backbone of your clients for years, in a variety of ways. From RMM to BDR to security, your offerings provide small- and medium-sized businesses (SMBs) with the level of support, cost-efficiency and scalability they need to survive in the modern business world. Or so you hope.

"Putting the S in MSSP" is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. In part one of this series, we offered tips on how to properly define and deploy the three pillars of cybersecurity so you’re setting a solid foundation for your security services. In this post, we’ll highlight three major downsides to offering your clients security via a number of different vendors, and discuss best practices for implementing truly robust cybersecurity.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

The Top 5 MSP Blog Posts of May 2017

Posted by Lily Teplow on June 6, 2017

The Top 5 MSP Blog Posts of May 2017

Can you believe that the end of the quarter is right around the corner? As we commemorate May and look towards hitting our June goals, let’s revisit the best content provided on the MSP Blog this past month! 

It’s no surprise that IT security continues to be top-of-mind for most managed services providers (MSPs). Also included in this month's roundup, discover how you can leverage visual statistics to boost your sales and marketing efforts, how to build a team of top IT talent, and how you can optimize your client onboarding experience for long-term success. Check out all of this and more in our most popular posts below!

Read More

Topics: Business Development and Growth, Sales and Marketing, Cybersecurity and Threat Management

Putting the S in MSSP Part 1: Defining and Deploying the 3 Pillars of Cybersecurity

Posted by Meaghan Moraes on May 31, 2017

Putting the S in MSSP Part 1: Defining and Deploying the 3 Pillars of Cybersecurity

With increasingly complex threats flooding the modern IT landscape, small- and medium-sized businesses (SMBs) are struggling to keep their heads above water. We’ve all seen the stats, right? Malicious attacks are on the rise, and your SMB clients are increasingly (and successfully) becoming the targets. Unfortunately, this means that your IT services of yore simply aren’t enough to keep up with the ever-present, ever-evolving cyber threats that plague modern business. As an MSP, what is there left for you to do? The answer might be to adopt a managed security services provider (MSSP) model and integrate security services into your portfolio.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

What is a Managed Security Services Provider (MSSP)?

Posted by Meaghan Moraes on May 24, 2017

What is a Managed Security Services Provider (MSSP)

It’s no secret that business as we know it is wrought with cyber threats: the news headlines and stacks of stats speak volumes. Today, security services are becoming a must-have, causing organizations of all sizes to increasingly seek out and lean on trusted security partners to manage vulnerabilities. What’s more, this new shift is opening a huge opportunity for managed IT service providers (MSPs).

At this point, many MSPs are throwing around the term “MSSP,” squeezing an extra “S” into their title to represent their clients’ elevated need for security services. The big issue at hand, however, is that this role is sometimes misunderstood. 

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

How to Explain WannaCry to Your End Users

Posted by Meaghan Moraes on May 16, 2017

How to Explain WannaCry to Your End Users

Despite the term “cyber attack” now being virtually synonymous with “modern business,” the world has never seen anything like WannaCry before. This new strain of ransomware, also known as WanaCrypt0r and WCry, recently hit computers in 99 countries, spurring 75,000 cases of the ransomware around the world. It was a big one—the big one.

Read More

Topics: Industry News, Information Security, Cybersecurity and Threat Management

The Top 5 IT Security Skills SMBs Need in 2017 [CHART]

Posted by Lily Teplow on May 5, 2017

The Top 5 IT Security Skills SMBs Need in 2017 - CHART

Cybersecurity is not a new concept, but it is taking on new importance this year. Today’s digital organizations are driven by new technology and dependent on orderly data, and everyday life seems to be increasingly happening on top of connected infrastructures. The risks posed by cybersecurity attacks are monumental, but to mitigate those risks, new skills are needed.

However, modern businesses, specifically small- and medium-sized businesses (SMBs) are struggling to keep up with the cybersecurity skills required to secure IT infrastructures, respond to incoming threats and ensure proper operations. According to CompTIA’s recent report, The Evolution of Security Skills, between 18 and 32 percent of companies say that they need significant improvement to existing security expertise across various topics. So, with the apparent need for improved security skills, how can you present your managed IT services to prospective clients as a solution for bridging this widening security skills gap?

Read More

Topics: Sales and Marketing, Cybersecurity and Threat Management, MSP Sales Chart

Backup to the Future Part VII: How BDR Fits into the Emerging Security Spectrum

Posted by Joseph Tavano on May 3, 2017

Backup to the Future Part VII: How BDR Fits into the Emerging Security SpectrumWith more and more horrifying stories of massive security breaches, insidious ransomware attacks and devious phishing schemes being reported every day, 2017 may be remembered as the year security became the most trending topic in the IT channel. Cybercrime has changed in recent years, becoming easier to execute and easier to profit from than ever. And while large organizations must remain ever-vigilant against attacks, SMBs—once considered relatively “safe” from the effects of cybercrime (too small to draw attention, etc.)—must now protect themselves just as diligently, or risk losing everything.

Read More

Topics: Backup and Disaster Recovery, Continuity247, Cybersecurity and Threat Management

Orange Is the New Hack: 3 Cybersecurity Lessons for MSPs

Posted by Meaghan Moraes on May 2, 2017

Orange Is the New Hack: 3 Cybersecurity Lessons for MSPs

Hype surrounding the Netflix original series, Orange Is the New Black, got several shades darker this past weekend when a hacker literally stole the show. The hacker, who goes by “thedarkoverlord,” obtained and shared the first ten episodes of the coming season of Orange Is the New Black on Saturday after Netflix failed to meet their ransom requests.

The hack occurred at the postproduction company Larson Studios, a popular digital-mixing service in Los Angeles for television networks and movie studios. Thedarkoverlord also claimed to have stolen unreleased content from ABC, Fox, National Geographic and IFC, and threatened ransomware attacks on these networks, as well. The theft is merely the latest in a long line of ransomware attacks by cybercriminals over the past year. Specifically, this new development provides a perfect opportunity for managed IT services providers (MSPs) to ensure that clients are adopting a multi-layered approach to IT security.

Read More

Topics: Industry News, Information Security, Cybersecurity and Threat Management

7 Red Flags MSPs Should Identify to Reduce Cyber Attacks

Posted by Chris Thompson on April 27, 2017

7 Red Flags MSPs Should Identify to Reduce Cyber Attacks

Email hacking is one of the most common forms of cyber attacks today. It takes place every day and throughout the world. You may be familiar with the email attack that occurred in 2016 during the Presidential Election. John Podesta fell for a phishing attack, which led to the release of a decade’s worth of emails. The hacker posed as Google and alerted Podesta to change his password because of suspicious activity on his account. By clicking on the link within the email, hackers were granted full access to his inbox.

Situations like this happen to businesses of all sizes, and the rate of these cyber attacks is only increasing. As an MSP, your goal is to protect businesses against these attacks, which can be difficult if the employees are not properly trained to identify potential threats. People are tricked into giving hackers information because they are not aware of the warning signs to look out for. However, here is a list of seven red flags to look out for and include in your security training for your clients.

Read More

Topics: Information Security, Cybersecurity and Threat Management

Simplifying 3 Trends That Are Changing the IT Landscape

Posted by Meaghan Moraes on April 21, 2017

Simplifying 3 Trends That Are Changing the IT Landscape

Let’s face it, modern IT is complicated. With new components being continuously added to the mix, managing and securing the IT landscape requires new tools fit for the challenge. However, the last thing managed services providers (MSPs) need is yet another disparate management tool that adds more complexity to their services. Without cohesive IT and service level management, there will be serious disconnects—from servers and networks, to storage and end points. 

Amidst the changing tides of technology, MSPs can help their clients ensure IT service and business success with an integrated approach. The following are three growing trends that MSPs should understand how to embrace and capitalize on in order to achieve sustainable profitability and business growth.

Read More

Topics: Cloud Computing, SMB Trends, Mobile Device Management and IT Mobility

An MSP’s Guide to Combatting SMB Cybersecurity Challenges

Posted by Meaghan Moraes on April 7, 2017

An MSP’s Guide to Combatting SMB Cybersecurity Challenges

Ever since the internet became an indispensable tool in the business world, security risks have continued to grow more profound. Today, malware—specifically ransomware—is the biggest money-maker for cybercriminals in history. These types of attacks are real threats that no business can afford to ignore, especially small- and medium-sized businesses (SMBs).

Due to limited budget, bandwidth and resources, SMBs combat IT issues differently than large enterprises. Cybersecurity is a top concern for SMBs in particular, as this group is faced with the following challenges:

Read More

Topics: SMB Trends, Cybersecurity and Threat Management, Managed Security Services

3 Browser Extensions for Safe and Secure Browsing

Posted by Matt Mainhart on April 6, 2017

3 Browser Extensions for Safe and Secure Browsing.png

With the invention of the internet, almost everything is now one simple click away. Unfortunately, this luxury comes with certain consequences, such as companies being able track your every move as you browse. You might not know it, but the websites you and your clients visit are using one or more “trackers” to follow your browsing habits around the web and learn more about you. These internet shenanigans can come in many forms, like advertisement popups, unauthorized information gathering – you name it.

So, how are you protecting yourselves, or better yet, your clients? Check out these three browser extensions they can install to browse the internet (somewhat) shenanigan free. Share them with your clients in your next newsletter send to help make their browsing experience more secure!

Read More

Topics: Information Security, Client Quick Tips

The Best of BDR for World Backup Day

Posted by Lily Teplow on March 31, 2017

World Backup Day Best of BDR

What would you do if you lost everything? This is exactly the question that World Backup Day prompts you to consider when you land on the awareness website. Data is such a business driver today, but one small accident or failure could cause productivity and profit to come to a complete halt. For MSPs, an essential first step in building a successful business continuity plan for your clients is helping them recognize the need for backup and disaster recovery (BDR) – and what better day to start than World Backup Day?

Read More

Topics: Industry News, Data Protection, Backup and Disaster Recovery

4 Reasons Cybercriminals Have an Edge and How MSPs Can Shift the Dynamic

Posted by Scott Spiro on March 30, 2017

4 Reasons Cybercriminals Have an Edge and How MSPs Can Shift the Dynamic

Did you know that six years ago, cybersecurity didn’t even rank in the top ten risks prioritized by company boards? Today, we live in a world where cybercriminals seem to have the advantage as they continually find new ways to steal sensitive information. Despite organizations across the globe spending more than ever to manage cyber risk, attackers continue to get through.

So, what has caused cybercriminals to now have the upper hand? This is exactly the question that is answered in a recent report by Intel Security and McAfee. These new findings tell us that it could come down to misaligned incentives between the attacker and the defenders. For MSPs, this presents new opportunities to restructure services and internal processes to incentivize innovation and improve security services.

Read More

Topics: Industry News, Cybersecurity and Threat Management, Managed Security Services

Breaking Down the Dangers of Social Engineering

Posted by Lily Teplow on March 24, 2017

Breaking Down the Dangers of Social-Engineering

By now, we’re all familiar with the type of hacker who uses their technical skills to infiltrate computer systems and compromise sensitive data. It’s seen in news headlines across the globe today. However, there’s now another type of hacker who uses special tactics to exploit the one weakness that every organization has: human psychology.

This is more commonly known as social engineering, which is the art of manipulating people so they give up confidential information. Not only are social engineering attacks becoming more common against small- and medium-sized businesses (SMBs), they’re also becoming more sophisticated. This makes things very tough for the MSPs that aim to serve and protect those SMB clients. So, in order to stay a few steps ahead of cybercriminals, here’s what you should know about social engineering attacks and how MSPs can help prevent clients from falling victim to them.

Read More

Topics: Industry News, Cybersecurity and Threat Management

Overcoming Cybersecurity Challenges with Managed IT Services

Posted by Lily Teplow on March 16, 2017

Overcoming Cybersecurity Challenges with Managed IT Services.png

If there is one thing we can be certain about when it comes to cybersecurity, it’s that the landscape will remain dynamic and turbulent over the coming years. Today, news headlines are dominated by cyberattacks and breaches that span across all industries – causing security to be top of mind for almost all businesses. However, these headlines don’t seem to be slowing down, which means that businesses are still struggling to keep up with the rapidly evolving threat landscape.

So, what are the biggest obstacles businesses face in achieving a stronger cybersecurity posture, and how are MSPs best-suited to help clients and prospects overcome these obstacles?

Read More

Topics: Business Development and Growth, Cybersecurity and Threat Management, Managed Security Services

A Look at Today’s Changing Managed IT Services Landscape

Posted by Brandon Garcin on March 15, 2017

A Look at Today’s Changing Managed IT Services Landscape.png

The managed IT services market today is experiencing significant change. Businesses across all industries are becoming increasingly dependent on technology, and the skills gap in this industry continues to widen. What’s more, we’re beginning to see the potential for new legislation or policy that may impact how IT outsourcing services are delivered and consumed.

As these trends converge, MSPs must take a tactical approach to ensure that they’re aligning the right internal and external resources, putting the right processes in place and placing themselves on a path toward long-term success and stability.

Read More

Topics: Business Development and Growth, Industry News

20 Statistics to Help MSPs Sell Managed IT Services in 2017

Posted by Lily Teplow on March 10, 2017

20 Statistics to Help MSPs Sell Managed IT Services in 2017.png

Why exactly should businesses leverage your managed IT services this year? When you’re making your sales pitch to clients and prospects, this is the question you need to answer to differentiate yourself from your competition. Sure, you have your value prop down and you’ve memorized your talking points to a tee, but what else can you use to convince them?

They say that numbers speak louder than words, so here are a few numbers that we think speak volumes. It’s clear that the need for managed IT services isn’t going anywhere, but to help make your case here are 20 statistics you can use to prove why businesses should partner with you.

Read More

Topics: Sales and Marketing, Backup and Disaster Recovery, SMB Trends, Cybersecurity and Threat Management

3 Ways to Increase Laptop Security On-The-Go

Posted by Matt Mainhart on March 9, 2017

3 Ways to Increase Laptop Security On-the-Go.png

Allow me to paint a scary picture for you. You’re on the road for work and answering some emails from a client at the airport. Then you get thirsty, but you see that there’s an overpriced drink stand just a few steps away and you make the sacrifice of spending $4.00 on a bottle of water. As you break out your wallet and pay up, you turn around to see that your laptop is gone! You only stepped away for about 60 seconds and were just a few steps away. However, a thief saw this as a window of opportunity, and took it.

Now you and your boss are freaking out about confidential company information potentially getting into the wrong hands. As the world starts to spin, you find yourself asking “how could this happen?”

Now, we can snap back to reality. In order to prevent this unruly situation from happening to you, check out the three quick tips below for increased laptop security while you’re on-the-go.

Read More

Topics: Information Security, White-Label Resources, Client Quick Tips, Cybersecurity and Threat Management

How MSPs Can Create a Profitable Cybersecurity-as-a-Service Offering

Posted by Nate Teplow on March 8, 2017

How MSPs Can Create a Profitable Cybersecurity-as-a-Service Offering.png

Cybersecurity has been a concern for businesses ever since they started building digital assets. It’s no new topic in the IT industry, either. Due to an increased reliance on technology and a heightened awareness around breaches, cybersecurity has now become a top priority. It's clear that the demand for cybersecurity services is growing rapidly, but many MSPs still find it difficult to establish an effective and profitable service offering. So, what exactly can MSPs do to get from needing a cybersecurity offering to actually having one?

Read More

Topics: Cybersecurity and Threat Management, Podcast, Managed Security Services

Amazon S3 Outage: Three Takeaways for MSPs Following This Week’s Downtime Event

Posted by Brandon Garcin on March 2, 2017

Amazon S3 Outage-Three Takeaways for MSPs Following This Week’s Downtime Event.pngEarlier this week, Amazon Web Services’ S3 system suffered an outage for about four hours—leaving many websites and web-based services either partially or entirely inaccessible. S3, a cloud storage system (S3 stands for Simple Storage Service), experienced what Amazon referred to as “high error rates” that reportedly impacted websites like Slack, Trello, Imgur and many others. 

While these large-scale downtime events don’t happen too often—before this week the most recent sizable S3 outage was in 2015—they do present an opportunity for managed service providers (MSPs) to ensure they’ve got the right systems and processes in place to properly support their clients and minimize end user impact. Here are three reminders MSPs can take from this week’s outage:

Read More

Topics: Industry News, Backup and Disaster Recovery

2017 Cybersecurity Trends and How MSPs Can Capitalize

Posted by Scott Spiro on March 1, 2017

2017 Cybersecurity Trends and How MSPs Can Capitalize.pngOver the last several years, cybersecurity has become one of the most vexing problems for companies of all sizes. Today, business owners know hackers are out to steal information from their networks and endpoints, but few have IT experts with the right experience to fight off cybercriminals. However, this situation creates a ripe opportunity for your MSP.

Before you can meet the needs of existing and potential clients, though, you'll need to understand the emerging cybersecurity trends and how to capitalize on them.

Read More

Topics: Business Development and Growth, Cybersecurity and Threat Management, Managed Security Services

What Is the Financial Impact of a Ransomware Attack? [CHART]

Posted by Lily Teplow on February 24, 2017

What Is the Financial Impact of a Ransomware Attack.png

Imagine for a moment that you receive a phone call from a client to hear that hundreds of their computers have been infected with ransomware, knocking critical systems offline and putting their organization’s entire operations at risk. What a nightmare, right? Unfortunately, this has been a reality for many unprepared small- and medium-sized businesses (SMBs) as we’ve seen ransomware reach new levels of maturity over the past couple of years.

Ransomware attacks can have a major impact on business continuity, productivity, reputation and much more, and dealing with one is not only time-consuming; it can be extremely costly. SMBs need to be fully aware of the threat posed by ransomware and make strengthening their IT defenses a top priority this year. However, if they’re hesitant or don’t yet have the proper defenses in place, how can you convince them to turn to an MSP like you for help? What other financial impacts could ransomware have on their business and why should they leverage your managed IT services to prevent a business-crippling attack?

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services, MSP Sales Chart

5 Simple Tips for Preventing Ransomware

Posted by Ben Barker on February 23, 2017

5 Easy Tips for Preventing Ransomware.jpg

Over the past year, we’ve seen ransomware grow and evolve at a rate we’ve never seen before. In fact, the FBI reported ransomware to be a $1 billion-dollar source of income for cyber criminals in 2016—and this year it’s showing no signs of slowing down. Any company or organization that depends on daily access to critical data—and can’t afford to lose access to it—should be most worried about ransomware. This includes the clients you serve and aim to protect. As an MSP, what exactly should you know about the threat of ransomware, where it’s headed and what steps can be taken to keep your clients protected?

Read More

Topics: Information Security, Webinar Highlights, Cybersecurity and Threat Management, Managed Security Services

Scalability, Cybersecurity & Cloud Services: Three eBooks to Support MSP Growth in 2017

Posted by Brandon Garcin on February 21, 2017

Three-eBooks-to-Support-MSP-Growth-in-2017.pngThe managed IT services industry is constantly changing, and it can be difficult to stay up-to-date on the latest changes, trends and best practices. Today, things like cloud computing, an increasingly-complex cybersecurity landscape and other pressures are forcing MSPs to rethink their approach to service delivery, sales and marketing, and other key aspects of the business.

To help you stay ahead of the curve and set yourself up for success in 2017, we’ve compiled three of our most popular eBooks. Check them out below!

Read More

Topics: Business Development and Growth, Cloud Computing, Cybersecurity and Threat Management

A Look Back at 2016: The Year of Ransomware

Posted by Ben Barker on February 16, 2017

A Look Back at 2016-The Year of Ransomware.png

2016 had a lot of notable headlines. Whether it was the UK voting to Brexit, the popularity of "Pokémon GO," or the summer Olympics in Brazil, last year left no shortage of water cooler material. However, what isn't often talked about is the impact that cybercrime had on the world in 2016. As far as the tech space is concerned, last year was like nothing we have ever seen before. So, while the aforementioned headlines may have dominated the mainstream news cycles, 2016 was, by all measures, the year of ransomware.

Read More

Topics: Information Security, Webinar Highlights, Cybersecurity and Threat Management

How to Align Your Managed Services with SMB Business Priorities [CHART]

Posted by Lily Teplow on February 10, 2017

How to Align Your Managed Services with SMB Business Priorities.png

The small- and medium-sized business (SMB) clients you serve today are placing a high priority on technology. Actually, two-thirds of SMBs indicate technology is a primary factor in pursuing their business objectives for the year ahead. They’re looking to move beyond simply managing and maintaining their infrastructure to utilizing technology to solve their business’ top problems. Many SMBs are wanting to increase their investment in technology and IT expertise, but some barriers still exist.

As your prospects try to find the right service provider, they’re carefully thinking about how they can focus on core business objectives without worrying about their IT needs. But did they know that in outsourcing to an MSP like you, they can experience more growth with your proactive, predictable and preventative IT services?

Read More

Topics: Sales and Marketing, SMB Trends, MSP Sales Chart

GitLab Data Deletion Incident Demonstrates Need for True Business Continuity

Posted by Lily Teplow on February 2, 2017

GitLab Data Deletion Incident Calls for True Business Continuity.png

Have you ever experienced a major un-oh moment? You know, when something goes completely awry and your mind starts to race, palms start to sweat and the classic Homer Simpson “d’oh” echoes in your head. Well, that’s what I imagine recently happened to one of the system administrators at GitLab, a web service for hosting and syncing source code. News broke on Tuesday that GitLab had suffered a major backup restoration failure following an incident of accidental data deletion. According to the tech news site The Register, the incident was caused by an admin who was working late and might have accidentally deleted the wrong folder in a planned maintenance operation.

Whoops! It’s a textbook case of human error that can happen to any business – no matter how technically advanced or experienced. Nevertheless, this unfortunate incident highlights the incredible need to provide true backup and disaster recovery (BDR) to your clients so they don’t become the next headline.

Read More

Topics: Industry News, Backup and Disaster Recovery, Data Loss

The 4 Basics of Email Security

Posted by Joseph Tavano on February 1, 2017

The Basics of Email Security.png

By its very nature, email is one of the more vulnerable areas of any network infrastructure. The fact that it leaves one network and enters another makes it one of the most obvious vectors for threats and malicious activity. Every day, email is used to transmit viruses, malware, and phishing schemes, thus making email security a priority for all businesses. For MSPs, email security is a vital component to any client security offering and one of the pillars of a secure network.

However, no matter how advanced the technology that is implemented, proper email security can be boiled down to a few basics that every user should know and understand. As an MSP, you can easily prove your value as a trusted advisor and further promote yourself as a vCIO by providing thorough email security training to your clients. The following are just a few security measures that can be used.

Read More

Topics: Information Security, Cybersecurity and Threat Management

The Top 5 MSP Blog Posts of January 2017

Posted by Lily Teplow on January 31, 2017

The Top 5 MSP Blog Posts of January 2017.png

Can you believe that we're already a whole month into 2017? Hopefully you haven't been too busy braving the cold or shoveling out snow to read up on the latest MSP insights! We covered a lot on the blog this past month, but the hottest topics thus far seem to be IT marketing and cybersecurity. In this month's roundup, we'll cover key strategies for your 2017 marketing plan, how to sell cybersecurity-as-a-service, what top IT challenges SMBs are facing this year and much more. So, without further ado, here are the five posts you found most valuable on the blog this January.  

Read More

Topics: Sales and Marketing, Information Security, Cybersecurity and Threat Management

What Are the Top 5 IT Challenges for SMBs in 2017?

Posted by Lily Teplow on January 27, 2017

What Are the Top 5 IT Challenges for SMBs in 2017.png

For most small- and medium- sized businesses (SMBs), IT is not their core function, but it’s necessary in making their business run. Most of these businesses want IT to work for them, but fear it will become a costly time suck that can take away from their primary business objectives. As today’s technology levels the playing field for SMBs, they’re now making the connection between strong IT investment and improved business performance.

However, the IT landscape continues to quickly change and shift – causing new challenges to emerge that forward-thinking SMBs need to consider as they grow their business. So, what exactly are these challenges and how can SMBs address them by investing in your managed IT services?

Read More

Topics: Sales and Marketing, SMB Trends

The Ultimate Cybersecurity-As-A-Service Blueprint

Posted by Ben Barker on January 24, 2017

The Ultimate Cybersecurity-As-A-Service Blueprint.jpg

As you probably already know, there is a high need for security in the SMB market. The statistics leave little room to argue this statement. 60% of attacks target small to medium-sized companies and the average cost of attack in 2014 was $20,752, with that number being even higher today. Still, the most alarming statistics is that 60% of SMBs fail within six months of being hacked. So, for your clients, security is literally a matter of life or death for their businesses.

Read More

Topics: Information Security, Webinar Highlights, Cybersecurity and Threat Management

Information Security: SMBs Need It, MSPs Can Provide It [CHART]

Posted by Lily Teplow on January 20, 2017

Information Security: SMBs Need It, MSPs Can Provide It.pngThe statistics we see today regarding information security are alarming, sometimes even numbing. Year after year, cyberattacks continue to escalate in frequency, severity and impact – causing businesses of all sizes to now require services that harmonize security and IT solutions. As an MSP, how can you provide stability to businesses who need to strengthen their IT security posture?

Cybercrime is a field that moves so quickly, many struggle to keep up with it. Small- and medium-sized businesses are no exception – over half of SMBs have suffered a cyberattack in the past year. If your clients haven’t yet been targeted, they’re probably worried about it. Which means you as their managed service provider should also be concerned. However, when SMBs outsource their information security needs to an MSP, it can redefine how they operate their cybersecurity and privacy programs and help them become better prepared for the growing amount of threats.

Read More

Topics: Sales and Marketing, Information Security, MSP Sales Chart

How Often Should You Test Your Disaster Recovery Plan? [CHART]

Posted by Lily Teplow on January 13, 2017

How Often Should You Test Your Disaster Recovery Plan chart.png

Are your clients willing to test their luck this Friday the 13th? As a savvy MSP, you know that having an effective backup and disaster recovery (BDR) solution and disaster recovery (DR) plan is a necessity in today’s business landscape – just in case your client opens an umbrella indoors and their whole IT network crashes. However, having these reliable solutions in place is of no value if the processes aren’t regularly tested. So, the question is this: what does your clients’ DR plan look like and when was the last time they had a DR drill test performed?

Read More

Topics: Data Protection, Backup and Disaster Recovery, MSP Sales Chart

How to Begin Bringing a Managed Security Services Solution to Market

Posted by Joseph Tavano on January 12, 2017

How to Begin Bringing a Managed Security Services Solution to Market.pngThis year, more and more MSPs will be starting to adopt security services into their portfolio. However, it can be especially daunting to understand where to break into the offering. On a recent episode of MSP Radio, Craig Sharp, MD at Abussi, a UK-based MSP, discusses how to approach security with new and existing customers, what to expect when offering these services and how MSPs are primed to take advantage of this new area of SaaS-based solutions. When considering adding security services to an MSP’s portfolio, here’s what Craig has to say:

Read More

Topics: Cybersecurity and Threat Management, Managed Security Services

Introducing: A Quick Guide to Marketing and Selling Cybersecurity

Posted by Lily Teplow on January 6, 2017

Quick-Guide-to-Marketing-and-Selling-Cybersecurity.png

Have you checked today’s IT headlines yet? I’d bet you couldn’t get past page one without coming across the words ransomware, cybercrime, data breach or the like. As an MSP, you’re constantly tapped into the goings-on in the industry, but can you say the same about your clients? With cyber threats growing more sophisticated year after year, now’s the perfect time to convince business owners that they need to seriously consider their cybersecurity needs.

However, selling your managed security services isn’t always an easy task. Your focus and priority is on keeping your clients protected, which makes it difficult to find the time to create your own marketing campaigns. But imagine if you could become a cybersecurity sales expert without doing all the heavy lifting...

Read More

Topics: Sales and Marketing, Cybersecurity and Threat Management, Managed Security Services

Who Do You Need on Your Incident Response Team?

Posted by Joseph Tavano on January 5, 2017

Who-Do-You-Need-on-Your-Incident-Response-team.png

As the calendar switches over to the New Year, many business owners are taking account of their processes and preparing for success in the coming year. But how many are preparing to get hacked in 2017? Security experts are predicting that data breaches will continue to increase in frequency in the coming year, so the answer is: not enough.

Unfortunately, this means that the odds of your clients suffering a data breach are higher than ever. The days of SMBs assuming “it could never happen to me” have passed, and it’s time to have a plan in place to handle a nightmare situation like a data breach. One of the first components of that plan is to build an Incident Response Team.

Read More

Topics: Data Protection, Information Security, Data Loss

An MSP's Introduction to Unified Threat Management

Posted by Lily Teplow on January 5, 2017

An-MSPs-Guide-to-Unified-Threat-Management.png

Today’s threat landscape and networking environment are in constant evolution – causing new devices, applications and threats to appear almost daily. Organizations are struggling to face new cyber threats and keep up with the changing landscape. Unfortunately, the stand-alone security technologies they sought for support have become incapable of keeping them completely protected. Your clients now require a multi-layered defense strategy that integrates various technologies into one IT security solution. Until a few years ago, that type of solution didn’t exist.

Very few security technologies leap out of nowhere to occupy a major portion of the market within a few years, yet unified threat management (UTM) is one of those few. As an MSP, what exactly should you know about UTM, what does it protect against and what are its benefits?

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

IT Security On-the-Go: Your Travel ITinerary

Posted by Mary McCoy on December 29, 2016

IT-Security-Travel.png

Suitcase: check. Phone charger: check. Boarding pass: check. When traveling, do you make a mental list of everything you need to remember to bring? With any business trip, there's a fair amount of planning involved, whether it's memorizing a conference schedule or booking lodging accommodations. Often, though, travelers forget about IT security, neglecting to properly prepare their devices for departure. 

According to the Kensington IT Security Survey Report, 25 percent of company employees reported IT theft in cars and transportation and more than 15 percent reported devices were stolen from their hotel or at the airport. Are you or your clients practicing unsafe IT habits on-the-go?

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Should You Beware of Ransomware? [CHART]

Posted by Lily Teplow on December 9, 2016

should-you-beware-of-ransomware-chart.png

In today’s clickable culture, anyone with an email address, an inbox, or a social media account is a target for cybercrime. Most organizations or individuals aren’t even aware of the bull’s-eye on their back for hackers, cyber thieves and extortionists until it’s already too late to respond or recover. But why is it that small- and medium-sized businesses (SMBs) seem to be the primary targets of these attacks, specifically when it comes to ransomware? The answer is simple; it’s because they typically lack sophisticated computer defenses, thus making them very vulnerable. If this represents most of your clients, you know all too well how being a victim of ransomware could mean the end of the road for their business, and it’s your goal to protect them.

Today, ransomware is reaching a new level of maturity and is showing no signs of slowing down. So how has the threat of ransomware evolved throughout the years, where is it heading in 2017 and why should SMBs beware?

Read More

Topics: Information Security, Cybersecurity and Threat Management, MSP Sales Chart

Is the IT Security Gap a Threat to SMBs? [CHART]

Posted by Lily Teplow on December 2, 2016

IT-Security-Gap-threat-to-smbs.png

Now that it’s officially December, it’s time to sit down and really think about what 2017 will bring. Over the past year we’ve seen higher adoption of virtualization, web applications and Bring Your Own Device (BYOD) environments. As these and similar trends develop, security threats are likely to continue to emerge with unprecedented speed and complexity, putting businesses of all sizes at risk.

Those most impacted, however, are the small- and medium-sized businesses (SMBs) that often lack the resources and expertise to protect themselves against internal and external threats. Due to these rising threats, SMBs are required to shift their security strategy and priorities. But for most, the level of protection doesn’t always match the perceived threat. So how can you protect clients against this gap in IT security?

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services, MSP Sales Chart

Are Your Clients Falling for These IT Security Myths? [CHART]

Posted by Lily Teplow on November 18, 2016

IT-security-myths.png

Security is top-of-mind for everyone because it's quickly becoming one of the hardest variables to control for as user error becomes more prevalent across businesses. Where does this human vulnerability stem from? Unfortunately, too many businesses are assuming they're safe and aren't taking proper precaution. As an IT professional, you’re familiar with the threat landscape and you understand the risks, but how can the SMBs you serve distinguish fact from fiction?

Read More

Topics: Information Security, Cybersecurity and Threat Management, MSP Sales Chart

Is Hard Drive Failure a Reality for SMBs? [CHART]

Posted by Lily Teplow on November 11, 2016

Is-Hard-Drive-Failure-a-Reality-for-SMBs-Chart.png

As an MSP, you understand how crucial business continuity and disaster recovery are for modern businesses. You’ve seen the downtime stats and you’ve dealt with disasters, but what does this look like from your clients’ point of view? Selling backup and disaster recovery (BDR) is a challenge for many MSPs, but it might be because small- and medium-sized businesses (SMBs) don’t fully understand the need for continuous uptime. If your prospective clients don’t have a business continuity plan in place or take for granted their ability to access data 24x7x365, ask them, “could your businesses survive a disaster?”

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, Data Loss, MSP Sales Chart

6 Important OS Hardening Steps to Protect Your Clients

Posted by Hunter Smith on November 9, 2016

6 Important OS Hardening Steps to Protect Your Clients.jpg

According to the 2016 Duo Trusted Access Report, fifty-three percent of Mac OS users are running either the fully patched, latest version of OS X, or the previous version, compared to thirty-five percent of Windows users on Windows 10 and 8.1. That means the majority of these operating systems are outdated.

As you know, proper patch management is critical to protecting client data and uptime, but it's just one of many security considerations. With Ransomware-as-a-Service and Angler, Bedep and Neutrino exploit kit adoption on the rise, MSPs must strengthen client defenses against outside attack. When attempting to compromise a device or network, malicious actors look for any way in. Unbeknownst to many small- and medium-sized businesses, operating system vulnerabilities provide easy access. In order to provide clients with peace of mind, safeguard their sensitive information and differentiate your security services from the competition, here are six ways to harden customers' operating systems: 

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Are Outdated Browsers Leaving Businesses Vulnerable? [CHART]

Posted by Lily Teplow on November 4, 2016

Are-Outdated-Browsers-Leaving-Businesses-Vulnerable.png

Users must regularly maintain, patch and update software, applications, plug-ins and more, but just how many businesses are overlooking this important security concern? In our latest chart, we reveal the percentage of users running outdated browsers. As you know, cybercriminals continually look for vulnerabilities to exploit in frequently used programs. Proper patch management, however, helps prevent devices from becoming compromised. So how do you have this conversation with potential clients, and which questions should you expect to answer?

Read More

Topics: Information Security, Patching, MSP Sales Chart

There’s Something Phishy Going on This Election Season [CHART]

Posted by Lily Teplow on October 28, 2016

There’s Something Phishy Going on This Election Season Chart.pngWith roughly one more week to go before Election Day, the buzz around the presidential race is quickly reaching its peak. By now, we’re all probably sick of the election-related emails, phone calls, TV ads and so on. But with all this noise, many businesses don’t realize that hackers and scammers are exploiting the situation to steal their sensitive information. As an MSP, how can you protect your clients from falling victim to phishing scams all year round?

Read More

Topics: Sales and Marketing, Information Security, Cybersecurity and Threat Management, MSP Sales Chart

4 Essentials MSPs Forget When Disaster Recovery Testing

Posted by Mary McCoy on October 26, 2016

4 Essentials MSPs Forget When Disaster Recovery Testing.jpg

By now, most MSPs recognize that offering backup is table stakes. Your clients can receive this service from any number of your competitors. In order to stand out and increase monthly recurring revenue (MRR), focus on the disaster recovery (DR) aspect of backup and disaster recovery (BDR). Offer your clients DR testing!

To fully capitalize on the advantages of DR testing, keep the following four best practices in mind when adding this service to your IT portfolio. 

Read More

Topics: Data Protection, Information Security, Backup and Disaster Recovery

Cybersecurity Simplified: 2 Questions SMBs Must Ask Themselves

Posted by Scott Spiro on October 25, 2016

Cybersecurity Simplified- 2 Questions SMBs Must Ask Themselves.jpg

Named National Cyber Security Awareness Month by the Department of Homeland Security, October is a time for the whole nation to become more aware of information security. And while companies should work to increase both internal and external resilience all year long, MSPs are advised to use this period to revisit the cybersecurity conversation with clients.

Where to begin? As you know, cybersecurity encompasses everything from proper password management to encrypted data backups. Rather than overwhelm prospects and clients by detailing all of this, however, start out simple. Frame cybersecurity as a way of providing medical services for client data. Just like in medicine, there are only two classes of service: prevention and treatment. Companies must spend time and effort to either prevent criminals from accessing data or maintain operations in the event of an attack or data breach. 

Read More

Topics: Information Security, Backup and Disaster Recovery, Cybersecurity and Threat Management

Why Small Medical Practices Struggle with HIPAA Compliance [CHART]

Posted by Lily Teplow on October 21, 2016

Why Small Medical Practices Struggle with HIPAA Compliance.jpgDo you serve clients in the healthcare industry? As their MSP, you’re well aware that these organizations have a responsibility to their customers and patients to maintain the security of their data – which means that they must be HIPAA (Health Insurance Portability and Accountability Act) compliant. HIPAA has completely changed the way electronic medical and health records are created, received, modified, transmitted or stored, yet many practices still struggle to become and remain HIPAA compliant. Not only do they face exorbitant fines for violating HIPAA law, healthcare companies also can’t afford to lose clients’ trust in their ability to safeguard patient information. So how can your managed IT services help them do just that?

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, Healthcare IT, MSP Sales Chart

12 Things to Consider When Performing a Security Assessment

Posted by Win Pham on October 20, 2016

12_Things_to_Consider_When_Performing_a_Security_Assessment.jpg

With recent big-name breaches from Yahoo, ADP, and the IRS in the news, security is a top concern for many business owners.

And with the advent of the cloud and evolution of the Internet of Things (IoT), hackers have evolved too. They’re finding increasingly clever ways to exploit technology designed to make doing business easier. 

Yet most businesses are using outdated security software and practices, and failing to refresh their cybersecurity solutions/practices to meet the increased risk. 

Read More

Topics: Information Security, Navigate 2016, Cybersecurity and Threat Management

Mirai: The IoT Botnet Malware Behind Recent DDoS Attacks

Posted by Tyler Moffitt on October 18, 2016

IoT_Botnet_Malware_22Mirai22.jpg

Recently, the source code for the Internet of Things (IoT) botnet malware, Mirai, was released on hack forums. This type of malware was used last month in an historic distributed-denial-of-service (DDoS) attack against KrebsOnSecurity, which was estimated to have sent 650 gigabits per second of traffic from unsecured routers, IP cameras, DVRs and more to shut down the domain. Thanks to DDoS prevention measures by engineers at Akamai, the company protecting Krebs, the attack was unsuccessful; however, they report that this attack was nearly double the size of the largest one they’d previously seen.

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

4 New Encrypting Ransomware Variants to Watch Out for

Posted by Courtney Margossian on October 13, 2016

4_New_Encrypting_Ransomware_Variants_to_Watch_Out_for.jpg

Each day, Webroot discovers 6,000 phishing sources, 80,000 new malware and potentially unwanted applications and 51,000 new mobile malware. 

Cyber threats are even more sophisticated than they were last year and as they continue to grow, the business is ever-changing. And I do mean business. With payouts in the thousands of dollars and fewer barriers to entry, cybercrime has become a lucrative opportunity for the masses. Dubbed Ransomware-as-a-Service, there are now portals where anyone can create a ransomware payload for free. No coding or scripting knowledge is required. Instead, you simply have to input your specifications for the amount to charge, ransom payment window, late fee and more. What's the catch? The portal creator gets a cut of the profit you make. Still, the payout is significant and as business ventures like this grow in popularity, ransomware will become increasingly common.

To help protect your clients against the latest attack tactics, Tyler Moffit, Senior Threat Analyst of Webroot recently joined us for the webinar, Crypto Ransomware - The Who, What, Why and How. There were many takeaways from the program, available for download below, including overviews of four new encrypting ransomware variants. 

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

How to Calculate the Cost of Downtime for Your Clients

Posted by Mary McCoy on October 11, 2016

How_to_Calculate_the_Cost_of_Downtime_for_Your_Clients.jpgHow can you help your clients truly understand how downtime hurts their business? For companies today, there is only one universal standard by which they will "get it." That standard is money. The impact on the top and/or bottom line is often the deciding factor in any business decision, including the decision to purchase your business continuity services. As your clients' trusted partner and managed IT services provider (MSP), you're responsible for minimizing service disruptions and unplanned downtime. In order to do this, you first have to help your clients understand exactly what a downtime event can cost their business.

Read More

Topics: Revenue Growth and Profitability, Data Protection, Backup and Disaster Recovery

How BDR Can Protect SMBs Against Unplanned Data Loss [CHART]

Posted by Lily Teplow on October 7, 2016

Do you struggle with selling your backup and disaster recovery (BDR) solution? If so, you’re not alone. Selling BDR to small- and medium-sized businesses (SMBs) is a major challenge for many MSPs, especially when you’re overwhelmed with common excuses like “backup isn’t that important,” or “data loss could never happen to me!” So how can you effectively combat these misconceptions and convince potential clients that they need your managed IT services?

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, MSP Sales Chart

Mr. Robot is Shining a Light on Cybersecurity

Posted by Joseph Tavano on October 6, 2016

robot_deb3g_mediagallery_impose.png

image: http://www.usanetwork.com/mrrobot/photos

The show creators are paying attention to the IT industry, so it might be time to pay attention to them.

One of the breakout cable TV show hits of 2015, Mr. Robot wrapped up its second season (don’t worry, no spoilers in this article), and has been gaining traction with viewers ever since the show premiered. The show centers on Elliot Alderson, a cybersecurity engineer by day and a hacker by night. The plot has tons of twists and turns, making it easy to binge watch over the course of a rainy weekend.

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

Will You Be Prepared When a Downtime Event Strikes? [CHART]

Posted by Lily Teplow on September 23, 2016

Did you know that 50% of small- and medium-sized businesses (SMBs) have no backup or disaster recovery plan in place? With all the risks that come with severe data loss and extended downtime, it’s surprising that these people aren’t doing more to safeguard their business. If you have clients or prospects that may be hesitant to invest in a backup and disaster recovery (BDR) solution, use this chart to help make the sale!

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, MSP Sales Chart

How MDM Can Fend off Threats to Endpoint Security [CHART]

Posted by Lily Teplow on September 16, 2016

Mobility is a necessary part of the modern workplace. Mobile devices improve business efficiency and productivity, but they also have the ability to expose and compromise company data. If your client’s endpoints aren’t being protected by a solution like Mobile Device Management (MDM), vulnerabilities have a higher likelihood of being successfully exploited. To determine if clients and prospects are ready to invest in your MDM solution, ask them this: are you fully protected against today’s endpoint security threats?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Mobile Device Management and IT Mobility, MSP Sales Chart

Addressing Data Security Threats from Shadow IT

Posted by Franklyn Peart on September 13, 2016

According to IDC, business file sync and share is one of, if not the most popular cloud service with small- and medium-sized businesses (SMBs). However, this solution often causes shadow IT–related problems and unsanctioned company data access, though it is viewed by businesses as a productivity enabler.

Read More

Topics: Data Protection, Information Security, Navigate 2016

How Managed Services Fulfills the IT Needs of SMBs [CHART]

Posted by Lily Teplow on September 9, 2016

One of the biggest challenges in selling managed IT services is that small- and medium-sized businesses (SMBs) may underestimate the need to invest in IT expertise. As a savvy MSP, you know that these businesses are continuing to grow more dependent on modern technologies and systems. So how can you convince them to protect their IT infrastructure with your managed services?

Read More

Topics: Business Development and Growth, Sales and Marketing, SMB Trends, MSP Sales Chart

Why SMBs Need to Disaster-Proof Their Business [CHART]

Posted by Lily Teplow on September 2, 2016

Are your clients’ businesses going to be able to operate normally after a disaster strikes? Catastrophes such as floods, employee error and hardware failure can wreak havoc on businesses of all sizes if their data isn’t secured properly – making the recovery process very demanding, time-consuming and expensive. This is especially true for small- and medium-sized businesses (SMBs) who haven’t taken preventative measures and preparations. Without a reliable backup solution or disaster recovery plan, how can your clients ensure that their data is protected from the elements?

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, MSP Sales Chart

Can Managed Services Bridge the IT Skills Gap for SMBs? [CHART]

Posted by Lily Teplow on August 26, 2016

Can-Managed-Services-Bridge-the-IT-Skills-Gap-for-SMBs.png 

The IT skills gap phenomenon isn’t a new concept, but it has become increasingly evident in the past several years. Most small- and medium-sized businesses (SMBs) have the same IT needs as larger organizations, but unfortunately lack the necessary internal bandwidth and resources. With new IT rules being written every day, complicated by the internet of Things (IoT) and an increasingly mobile workforce, IT professionals need to stay up-to-date and receive the latest certifications to cover their bases. As conditions continue to evolve, how can SMBs deal with the widening skills gap?

Read More

Topics: Sales and Marketing, SMB Trends, Client Acquisition and Management, MSP Sales Chart

Why SMBs Need Business Continuity & Data Management [CHART]

Posted by Lily Teplow on August 19, 2016

Have you and your clients grown numb to statistics showing the amount of digital data being generated in today’s IT landscape? The small-and medium-sized businesses (SMBs) you serve rely on 24x7x365 access to a myriad of data for day-to-day operations, customer understanding and essential business metrics. Due to the abundance of business-critical information, protecting and managing big data has become their top priority. However, many SMBs have not fully connected the dots between developing and implementing business continuity as a data preservation strategy and growing business profitability as a result.

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, MSP Sales Chart

Why BDR is the Answer to Costly Downtime [CHART]

Posted by Lily Teplow on August 5, 2016

Do your clients know what an hour of downtime could cost their organization? Outages can impact businesses of all shapes and sizes and however major or minor, ultimately lead to downtime – which can be quite costly and potentially destroy a business’ margins and reputation. Without a proper backup solution in place to safeguard their valuable data, businesses risk closing up shop when a disaster strikes.

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery, MSP Sales Chart

Why IT Security Is a Top Concern for SMBs [CHART]

Posted by Lily Teplow on July 29, 2016

Although security is one of the most talked about topics in the IT channel today, there’s a widespread lack of education and awareness in the workplace. Small and medium-sized businesses (SMBs) are welcoming more technology into their everyday environment, but the rapid development of this technology is also accompanied by changes in cybersecurity and Internet threats.

Read More

Topics: Sales and Marketing, Data Protection, Information Security, SMB Trends, MSP Sales Chart

Social Media Phishing (and How to Teach your Clients about it)

Posted by Joseph Tavano on July 27, 2016

It's not enough to set up security software. Your clients need your expertise, experience, and training to understand the full spectrum of security threats. Here are a few ways to get started.

Read More

Topics: Cybersecurity and Threat Management, Podcast, Managed Security Services

Are Your Employees Risking Sensitive Company Data? [CHART]

Posted by Lily Teplow on July 22, 2016

In today’s job landscape, the ability to access work files and email on-the-go has become part of everyday operations. Smartphones and tablets continue to flood the workplace, and your clients’ employees are storing a lot of important data on them. So how can they ensure that the corporate data being accessed through these mobile devices stays secure?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Mobile Device Management and IT Mobility, MSP Sales Chart

A Bad Case of Stagefright: Vulnerability Resurfaces in Apple Devices

Posted by Joseph Tavano on July 21, 2016

Imagine this scenario:

You woke early from a great night of sleep, well rested. The sun is shining outside. It’s Saturday, and you have no plans whatsoever, for the first time in a long time. The day is yours to make it whatever adventure you choose it to be. The world isn’t perfect, but right now life is good.

You take your phone off the charger, and notice tat you have no messages. Odd! You typically have a few, if only from social media. Further investigation reveals your contact list is gone. Emails, texts, messages, and photos too. Apps, data—everything has been wiped from your phone! While you were sleeping, the attacker gained access to all of your sensitive data through your phone, locked you out of your email and banking accounts, and gained access to your business’ secure network. And to make matters worse, you don’t know how it happened.

Read More

Topics: Industry News, Information Security, Mobile Device Management and IT Mobility

HIPAA 2016 - New Audits Under Way

Posted by Mary Crogan on July 21, 2016

According to HealthcareInfoSecurity.com, the Department of Health and Human Services Office of Civil Rights (OCR), which is responsible for HIPAA enforcement, has launched phase two of their HIPAA Audit Program in an effort to review the policies and procedures adopted by covered entities and their business associates.

If the OCR auditors come knocking, will you and/or your clients be ready?

Read More

Topics: Industry News, HIPAA, Healthcare IT

Pokémon GO and What It Means for MSPs

Posted by Lily Teplow on July 19, 2016

Over the past two weeks, cartoon creatures have officially taken over our world. If you haven’t seen them, it’s because they’re only visible when playing the new game, “Pokémon GO”. This free smartphone game fuses virtual technology with the physical world, causing it to quickly become a cultural phenomenon and the biggest mobile game in U.S. history.

However, Pokémon GO’s rapid rise in popularity has also raised some major security concerns. While millions of users wander the world searching for Squirtles and Pikachus, they may not be aware of what they’re giving up in return for playing the game.

Read More

Topics: Industry News, Information Security, Mobile Device Management and IT Mobility, Cybersecurity and Threat Management

Data Casualties in Healthcare Cyber Attacks [CHART]

Posted by Mary McCoy on July 15, 2016

Do you have any upcoming, in-person meetings with prospects in the healthcare vertical that you're hoping to close into clients? If so, you're probably working out your plan of attack. Distributing printed collateral is smart, but I recommend you also develop a formal, company-branded presentation that draws your audience in. In developing the content for your deck, keep it as customer-centric as possible. What's going to resonate with the audience you pitch to? What do they need to know in order to understand the value of your managed IT services?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Healthcare IT, MSP Sales Chart

HIPAA Business Associate Violation Results in $650K Fine

Posted by Mary McCoy on July 7, 2016

The HIPAA Security Rule is in full effect! The first Business Associate HIPAA penalty made news Tuesday, following a data breach incident two years prior. Who's atoning for this cardinal data sin? The Catholic Health Care Services (CHCS) of the Archdiocese of Philadelphia, a nonprofit organization now forced to pay a $650,000 fine. As a business associate legally obligated to adhere to federal regulation, CHCS is being held financially responsible for the breach of six nursing facilities, compromising 412 patients' Protected Health Information (PHI).

While many MSPs are compelled and encouraged to meet the demand for HIPAA compliance by serving the lucrative healthcare vertical, let this ruling serve as a wake-up call that there are costly consequences when MSPs themselves aren't compliant. What led to this unprecedented turn of events, and how can you prevent your MSP practice from suffering the same fate? Here's the Who, What, When, Where, Why and How, our data breach MSP debrief!

Read More

Topics: Industry News, Information Security, Backup and Disaster Recovery, Healthcare IT, Data Loss

Ransomware Meets Healthcare: How We Protect Patient Data

Posted by Jaq Baldwin on July 6, 2016

This month a hacker with the handle "Dark Overlord" has been making news after successfully stealing thousands of healthcare records and holding them for ransom. According to Boing Boing, Dark Overlord was able to acquire 48,000 records from a healthcare organization in Farmington, Missouri; hundreds of thousands from Atlanta, Georgia and the Central/Midwest US as well as nine million patient insurance details. As if that weren't enough, on Tuesday the notorious hacker also stole the information of 34,000 New York healthcare patients. And just what kind of payout is up for grabs for greedy ransomware authors looking to exploit healthcare institutions? Dark Overlord is demanding 750 Bitcoin (or $513,682.50)! So what does this mean for MSPs?

Read More

Topics: Data Protection, HIPAA, Healthcare IT, Continuity247

Human Error: The Biggest Risk to Client Data?

Posted by Lily Teplow on June 30, 2016

We all make mistakes. I mean, we’re only human after all. But did you know that according to CompTIA’s Trends in Information Security study, human error actually accounts for 52 percent of security and data breaches? Yikes, looks like being human can be a big cause for concern when it comes to any business’s data security.

Although human error is normal and inevitable in some cases, it can be more of a threat to businesses than most are aware of – including your clients! Backup and disaster recovery (BDR) plays an important role in ensuring that these mistakes don’t turn into serious problems. Read on to discover how you can inform your clients of these threats and protect them against potential data disasters.

Read More

Topics: Data Protection, Backup and Disaster Recovery, Cybersecurity and Threat Management, Data Loss

MSPs, There's a Better Way to Sell BDR!

Posted by Ron Vaughn on June 29, 2016

Backup and Disaster Recovery (BDR) is an important business practice that ensures business continuity. Backups are saved copies of data that can be restored in the event of it being tampered with, lost or damaged. Disaster recovery deals with recovering that data after a disaster, like a system failure, fire or power outage. BDR also has virtualization capabilities. In simple terms, it acts as an extra server while the main server is down, allowing businesses to get back up and running with minimal downtime.

Disasters can obviously happen to any person and any business...so why don't people take more action? And, how should you sell your BDR solution to these people?

Read More

Topics: Data Protection, Backup and Disaster Recovery

Covering Your Webcam and Other Tips to Keep Out RATs

Posted by Yves Dorleans on June 28, 2016

Some people do it during meetings. I do it myself if I don’t want to be seen during a meeting. Even FBI Director James Comey claims that he does it sometimes!

The Internet has been buzzing about the need to cover your webcam and microphones ever since Mark Zuckerberg, whose Twitter and Pinterest accounts were recently breached likely due to poor and weak password complexity security, was spotted with a taped up webcam and microphone jack on his laptop a couple of days ago. This raises the question, are people just paranoid, or is this a best practice to stress to your clients? Is Big Brother watching you? Are there any risks of unauthorized users and intruders gaining access to your webcam and microphone to secretly eavesdrop on unsuspecting users?

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management

From the Backup Archives: 5 Must-Read BDR Blog Posts

Posted by Mary McCoy on June 20, 2016

Backup and disaster recovery (BDR) is like life-insurance for a small business. Outages can be costly, and it is up to MSPs to ensure that their clients are protected in case of a data disaster. With cyber threats becoming more and more prevalent, BDR is a front-of-mind issue for MSPs. Side note: that's why we have a whole session devoted to marketing and selling BDR at our annual user conference, Navigate, which kicks off in 100 days!

With the lucrative potential involved with adding business continuity as a revenue stream, what better time for us to head into the Backup Archive and dig out these must-read blog posts on BDR? These articles cover a wide range of topics, including fully-managed BDR solutions, business continuity planning, the advantages of cloud computing and more. So dive in and make sure your clients are doing the most they can to keep their information safe and secure! 

Read More

Topics: Data Protection, Cloud Computing, Backup and Disaster Recovery

How to Tell Clients Google Drive isn't BDR

Posted by Joseph Tavano on June 16, 2016

In just a few short years, services like Google Drive, Dropbox, iCloud and Microsoft OneDrive have changed the way everyday people think about file storage. No longer are devices beholden to carry the burden of being a repository for the totality of one’s digital life. Nowadays, desktops, tablets and mobile phones are vectors, similar to old-style terminals, for accessing your cloud-based digital life.

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery

3 Common Backup and Disaster Recovery Objections - and How to Handle Them!

Posted by Brandon Garcin on June 14, 2016

Buying backup and disaster recovery software is a little like buying health insurance; sure, it feels like an unnecessary purchase right now, and nobody’s ever happy about paying monthly premiums. But, just like insurance, everybody neglects backup and disaster recovery or considers it to be a superfluous luxury...until they really need it.

And, let’s face it: if your clients think “This will NEVER happen to me!” the odds are stacked against them. Consider these eye-popping statistics about disaster recovery and business continuity:

Read More

Topics: Data Protection, Backup and Disaster Recovery

Marketing and Selling Business Continuity: How to Prove Value

Posted by Brandon Garcin on June 9, 2016

Marketing and Selling Business Continuity: How MSPs Can Demonstrate ValueFor organizations across nearly all industries, data is one of today’s most valuable business assets. Businesses and consumers demand 24x7 access to information and applications, regulatory restrictions around data retention are becoming increasingly strict, and the potential risks and penalties associated with any data loss can be severe. The need for effective backup and business continuity planning—particularly in the SMB space—is clear; but that doesn’t mean it’s easy for MSPs to actually sell these services to small businesses.

BDR sales can be difficult, and the technology doesn’t sell itself; without an effective value proposition and marketing strategy, it can be difficult for solution providers to break ground in the market. When bringing a BDR offering to potential customers, there are a number of important things to keep in mind:

Read More

Topics: Sales and Marketing, Data Protection, Backup and Disaster Recovery

7 Steps to Avoid a CryptoWall or CryptoLocker Infection

Posted by Hunter Smith on June 9, 2016

The big words in malware these days are CryptoLocker and CryptoWall, the two stalwarts of an emerging group of malware known as “ransomware.” And that term is a very apt categorization of what this type of malicious software does: it literally holds your data and files hostage, demanding ransom payment in order to unlock and regain access to your personal information.

Read More

Topics: Tech Quick Tips, Data Protection, Information Security, Cybersecurity and Threat Management

What MSPs Can Learn from the TeamViewer Breach

Posted by Mary McCoy on June 8, 2016

Last week's unsettling discovery of the TeamViewer data breach caused widespread anxiety and public outcry about the remote access tool's network security. While the remote access software company firmly denies any allegations that they were hacked, countless users (including many in the U.K.) flocked to Reddit and other social media sites to report that their accounts had been compromised, giving hackers remote access to their desktops. Although TeamViewer has faced backlash for blaming the breach on careless user behavior, no matter who's to blame in the scenario, this attack highlights the need to teach users stronger password management policies and the importance of a BDR solution. What else can MSPs take away from the TeamViewer breach, and what do users need to know?

Read More

Topics: Industry News, Data Protection, Information Security, Backup and Disaster Recovery, Data Loss

Watch These People Try to Explain the Cloud [VIDEO]

Posted by Brandon Garcin on June 3, 2016

cloud.gif

The cloud can be a mysterious and confusing concept, even for those in tech and IT services. And while there’s no denying the advantages presented by cloud computing, it’s not always easy to actually explain what the cloud is to colleagues, peers or potential customers.

To find out once and for all what the cloud actually is, our own Brody Rhombus hit the streets of Boston and asked people how they define it, how it works and how they’re using it. Not surprisingly, the responses were pretty mixed – and some were pretty hilarious. Tune in now to find out what we learned!

P.S. In reality, these people are no different than your clients and end users. If you're trying to sell cloud-based IT services and solutions, you need to know how to effectively define your offerings and speak their language. If you’re looking for real advice on how to explain cloud computing to your prospects and customers, check out our eBook below.

Read More

Topics: Data Protection, Cloud Computing, Backup and Disaster Recovery, IT Community

The Intangible Costs of Data Breach and Data Loss

Posted by Joseph Tavano on June 2, 2016

The monetary cost of a data breach or data loss, and all the concomitant penalties that arise with it, are substantial and well documented. A single data breach can cripple or close a small business. However, for the smaller percentage that manages to survive, there are also numerous issues to deal with following a data loss event that could lead to significant monetary loss.

Read More

Topics: Data Protection, Backup and Disaster Recovery, Continuity247, Data Loss

HIPAA Compliance Checklist - Updated for 2016

Posted by Brandon Garcin on May 20, 2016

HIPAA (Health Insurance Portability and Accountability Act) compliance is designed to protect patient privacy and set standards for how medical records can be shared and how they must be safeguarded. HIPAA compliance isn’t just for those directly within the healthcare industry, however - in fact, nearly anyone dealing with electronic Protected Health Information (ePHI) including doctors, hospital technicians and yes, the healthcare Managed IT Services Providers (MSPs) who manage hospital computers and networks in the cloud are required to be HIPAA compliant.

What does that mean for YOU?

Read More

Topics: Industry News, HIPAA, Healthcare IT

4 Need-to-Know Ransomware Trends & Findings

Posted by Mary McCoy on May 12, 2016

Ransomware is everywhere right now. Whether it's in the news coverage of latest exploits or in that seemingly harmless attachment sitting in your inbox, malware is running rampant! But beyond the ransomware basics like "email phishing is a major threat vector" and "cybercriminals demand Bitcoin to unlock files," what else do you need to know? What malicious trends are on the rise and how do they impact the way you position your data security services to prospects and clients? We've scoured the Web (well, not the Dark Web) to deliver the latest cybersecurity and ransomware findings!

Read More

Topics: Data Protection, Information Security, Cybersecurity and Threat Management, Data Loss

Badlock/Bad Luck - What MSPs Can Do Before April 12th Patches

Posted by Mary McCoy on April 6, 2016

April 12th. Memorize that date like it's your mother's birthday. April 12th. 

In case you haven't heard, a security vulnerability called Badlock was recently discovered in Windows and Samba. While the nature of the bug has not yet been revealed, patches along with details of the flaw will be released next week, on April 12th. Ever since news of the vulnerability broke in March, hackers have been salivating at the mouth, ready to pounce. Indeed, some may have already discovered the bug. Since attackers will be eagerly awaiting the disclosure, once patches are released next week, Windows and Samba users must immediately patch their systems to prevent exploitation. This should serve as a warning to all MSPs to act now, and get your house in order. 

Read More

Topics: Industry News, Data Protection, Information Security

Is Windows 10 already Hiding on your Clients' Computers?

Posted by Joseph Tavano on March 3, 2016

Imagine for a moment that you went to a build-your-own-burrito place for lunch. You build a killer, delicious burrito. You’re not afraid to pay for what you want, and even spring for a few pricier items to be included. Lunch is going to be delicious. Then, the burrito-maker asks you if you’d like to upgrade your burrito with a brand-new flavor sauce you’ve never tasted. Because you have little to no info or desire for this new special sauce, you decline the upgrade.

Read More

Topics: Industry News, Information Security, IT Community

VIDEO: Wireless Devices Put Users at Risk: IT Rewind Episode 67

Posted by Ben Barker on February 26, 2016

Wireless mice and keyboards could allow attackers to take over user devices. Meanwhile, lawmakers are pushing for the creation of an encryption commission. To hear more, just click play!

Read More

Topics: Industry News

VIDEO: Dell Adds Protection to Boot Layer: IT Rewind Episode 66

Posted by Ben Barker on February 5, 2016

VIDEO-_Dell_Adds_Protection_to_Boot_Layer-_IT_Rewind_Episode_66.jpg

Dell is implementing added security to the boot layer of its business laptops and tablets. Meanwhile, WordPress released an update to patch a pair of vulnerabilities. To hear more, just click play!

Read More

Topics: Industry News

VIDEO: Health Care Data Breaches Are up 10-Fold from 2014: IT Rewind Episode 65

Posted by Ben Barker on January 29, 2016

VIDEO-_Health_Care_Data_Breaches_Are_up_10-Fold_from_2014-_IT_Rewind_Episode_65.jpg

Health care data breaches have increased 10-fold since 2014 even though breaches from stolen or lost devices have decreased dramatically. Meanwhile, police officers in Texas are using new technology to collect unpaid court fines. To hear more, just click play!

Read More

Topics: Industry News, Information Security

VIDEO: Vulnerability in Intel Utility Allows Malware Attacks: IT Rewind Episode 64

Posted by Ben Barker on January 22, 2016

 

VIDEO-_Vulnerability_in_Intel_Utility_Allows_Malware_Attacks-_IT_Rewind_Episode_64.jpg

A serious flaw in the Intel Driver Update Utility allows for man-in-the-middle attackers to install malware on user devices. Meanwhile, a Linux kernel vulnerability has been patched. To hear more, just click play!

Read More

Topics: Industry News, Information Security

VIDEO: Flaw in Antivirus Program Allowed Hackers to Steal Passwords: IT Rewind Episode 63

Posted by Ben Barker on January 15, 2016

 

VIDEO-_Flaw_in_Antivirus_Program_Allowed_Hackers_to_Steal_Passwords-_IT_Rewind_Episode_63.jpg

Flaws in Trend Micro's antivirus program left user login names and passwords extremely vulnerable. Meanwhile, eBay has patched a security vulnerability that was leaving customer credentials exposed. To hear more, just click play!

Read More

Topics: Industry News, Information Security

VIDEO: Cyber Criminals Take Advantage of "Let's Encrypt": IT Rewind Episode 62

Posted by Ben Barker on January 8, 2016

 

The "Let's Encrypt" project is running into some problems fewer than two months after it started issuing free certificates. Meanwhile, the hosting company, Linode had to ask its users to reset their passwords after a series of DDoS attacks. To hear more, just click play!

Read More

Topics: Industry News, Information Security

VIDEO: Companies Exposed for Lack of Encryption: IT Rewind Episode 61

Posted by Ben Barker on December 11, 2015

A number of companies were exposed for not encrypting sensitive information on their mobile apps, including credit card data! Meanwhile, a possible early termination of SHA-1 could lead to a lack of access on certain websites. To hear more, just click play!

Read More

Topics: Industry News, Information Security

What is EMV Compliance and Why Must MSPs Know about It?

Posted by Mary McCoy on December 7, 2015

Hospitals, barber shops, clothing retailers, movie theaters, hardware stores. What do they all have in common? For one, they likely represent the small-to-medium-sized businesses you serve. Secondly, they all need point-of-sale (POS) devices to process credit card transactions. Oh, but there's a catch. Now, the legacy systems that clients may currently have in place don't cut it, and the consequences for failing to upgrade could be dire. As of October 1, 2015, all U.S. merchants are required to be Europay Visa Mastercard (EMV) compliant. What does that entail, and what's it got to do with you? We reveal the channel opportunity for IT solutions providers. 

Read More

Topics: Industry News, Data Protection, Information Security

VIDEO: A New Malware Campaign Is Targeting SMBs: IT Rewind Episode 60

Posted by Ben Barker on December 4, 2015

A new malware campaign is posing a serious threat to small and mid-sized businesses. Meanwhile, a Chinese cyberthreat group is using Dropbox to compromise systems. To hear more, just click play!

Read More

Topics: Industry News, Information Security

VIDEO: Hacking Group Responsible for South Korea Attacks is Back: IT Rewind Episode 59

Posted by Ben Barker on November 20, 2015

The hackers responsible for the 2013 attacks on South Korea are believed to be back at it. Meanwhile, a security company has discovered two tools that may have been used to bypass security in the Sony Pictures Entertainment hack. To hear more, just click play!

Read More

Topics: Industry News, Information Security

VIDEO: Thousands of Java Applications are at Risk: IT Rewind Episode 58

Posted by Ben Barker on November 13, 2015

VIDEO: Thousands of Java Applications are at Risk: IT Rewind Episode 58


Thousands of Java applications are currently at risk, and you'll be surprised to hear what the profile of a fraudster looks like! To hear more, just click play!

Read More

Topics: Industry News, Information Security

CryptoWall 4.0 - What We Know & Why Your Clients Need BDR

Posted by Mary McCoy on November 6, 2015

"CryptoWall 4.0 is the latest encrypting ransomware out right now and we've already observed it spreading. With the huge 'success' of CryptoWall 3.0, I anticipate this variant to be the number one threat to watch out for going into 2016.” – Tyler Moffitt - Sr. Threat Research Analyst, Webroot

Yep, it's back. According to researchers at Heimdal Security and Bitdefender, CryptoWall has returned, and version 4.0 - the latest release - is more aggravating than ever. Here's what business owners need to know to educate their clients and technicians.

Read More

Topics: Industry News, Information Security

VIDEO: Malware Attacks are Targeting the End User: IT Rewind Episode 57

Posted by Ben Barker on November 6, 2015

VIDEO: Malware Attacks are Targeting the End User: IT Rewind Episode 57

Hackers are switching their attention from company servers to end users. Meanwhile, Microsoft is considering moving up its ban on SHA-1 certificates. To hear more, just click play!

Read More

Topics: Industry News, Information Security

VIDEO: U.S. Senate Passes Cybersecurity Bill: IT Rewind Episode 56

Posted by Ben Barker on October 31, 2015

User error is the leading cause of cloud security risks, and the U.S. has passed the Cybersecurity Information Sharing Act! To hear more, just click play!

Read More

Topics: Industry News, Information Security

Keys to Cryptolocker Survival - You've Been Hit, Now What?

Posted by Chad Bacher on October 27, 2015

Ransomware: Be Afraid. Be Very Afraid.

If you want to strike fear into the hearts of small business owners and IT managers, you need only whisper one word: Cryptolocker.

Cryptolocker, CryptoWall, and other ransomware in the same family can wreak havoc on a small business, encrypting sensitive data from financials to personnel files. Not only does this grind productivity to a halt, but it also creates headaches for IT, who must scramble to immediately disconnect the infected computers from the network, scrub them and check the remaining computers for signs of compromise.

Read More

Topics: Industry News, Information Security, Cybersecurity and Threat Management

VIDEO: Beware the Mac Support Scam: IT Rewind Episode 55

Posted by Ben Barker on October 23, 2015

The infamous Windows support scams are now targeting Macs and the nonprofit that calls itself “Let’s Encrypt” reached a big milestone in its goal for universal HTTPS. To hear more, just click play!

Read More

Topics: Industry News, Information Security

VIDEO: Apple Malware is on the Rise: IT Rewind Episode 54

Posted by Ben Barker on October 16, 2015

Recent studies have shown that this year, more malware has been found for OS X than in the last five years combined. Meanwhile, companies that utilize cloud service are growing up to 50% faster! To hear more, just click play!

Read More

Topics: Industry News, Information Security

VIDEO: U.S. & European Data Pact Gets Struck Down: IT Rewind Episode 53

Posted by Ben Barker on October 9, 2015

VIDEO: U.S. & European Data Pact Gets Struck Down: IT Rewind Episode 53


A data transfer agreement between the United States and Europe was struck down on Tuesday. Meanwhile, a new Android malware is affecting users in more than 20 countries. To hear more, just click play!

Read More

Topics: Industry News, Information Security

Summer Trends and Stats Every MSP Should Know

Posted by Lily Teplow on July 8, 2015

Summer is the most popular season for new trends to catch on. This season has most people saying “out with the old, and in with the new!” Even in the business world, it’s essential to stay up to date on current trends in order to keep your business in style. This is especially important to those working in the technology industry, where everything is constantly changing and upgrading.

There’s nothing more important than staying “in-the-know” this season, which is why the next item on our MSP Summer BuckIT List is to familiarize yourself with the industry you’re working in! Here are some key trends and statistics every MSP should know to help you prepare for the fast-changing future. Keep reading to see what’s in this summer, and what's going out of style.

 

Read More

Topics: Industry News, SMB Trends

The Top 5 MSP Blog Posts of June 2015

Posted by Alicia Lazzaro on July 1, 2015

With June wrapping up, we have a lot to look forward to in the coming summer months: weekends away at the beach, barbeque's that last all day and roasting marshmallows by a campfire. Even though there is a lot of fun to be had in the summer, there is still work to be done and lots of blog posts to be read. Check out some of these highlights from June, including why break-fix services are bad for your business, ways to stay secure online and the most common types of user error and how to prevent them.

Read More

Topics: Cybersecurity and Threat Management, Data Loss, Workforce Optimization and Employee Retention

What Your SMB Clients Look for in their MSP [Infographic]

Posted by Mary McCoy on March 27, 2015

Only 17% of SMBs say they're where they want to be with technology. How are you addressing the other 83% with IT support needs? First, you have to better understand those needs to see if your MSP business is the right fit. 

Taken from responses from 500 executives with small to medium-sized businesses, CompTIA's recent Enabling SMBs with Technology study looks at how SMBs use technology, providing meaningful statistics MSPs can use to determine opportunities for their outsourced IT expertise. What are your prospective clients' technology insecurities and priorities? We've synthesized them into this shareable infographic. Enjoy!

Read More

Topics: Business Development and Growth, SMB Trends

The More SMBs Know: BDR Edition

Posted by Joseph Tavano on March 23, 2015

Managed IT service providers are experts in their field (and often in many others as well). Day in, day out, they are focused on a variety of services and issues that are commonplace in the channel: closing tickets, providing support, meeting client needs, and growing business, among many others.

However, time and time again, MSPs find that there is a significant disconnect between the services that MSPs provide and the IT issues SMB clients feel are critical to the success of their business. This can lead to a situation where MSPs are providing all the services requested by their client, but not all the services the client optimally needs. Specifically, many SMBs have gaping holes in their BDR and security strategies that they don’t know even exist.

Read More

Topics: Data Protection, Information Security, Backup and Disaster Recovery, SMB Trends

Load More
RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]