<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1309184189147252&amp;ev=PageView&amp;noscript=1">

Mobile Device Management and IT Mobility

Simplifying 3 Trends That Are Changing the IT Landscape

Posted by Meaghan Moraes on April 21, 2017

Simplifying 3 Trends That Are Changing the IT Landscape

Let’s face it, modern IT is complicated. With new components being continuously added to the mix, managing and securing the IT landscape requires new tools fit for the challenge. However, the last thing managed services providers (MSPs) need is yet another disparate management tool that adds more complexity to their services. Without cohesive IT and service level management, there will be serious disconnects—from servers and networks, to storage and end points. 

Amidst the changing tides of technology, MSPs can help their clients ensure IT service and business success with an integrated approach. The following are three growing trends that MSPs should understand how to embrace and capitalize on in order to achieve sustainable profitability and business growth.

Read More

Topics: Cloud Computing, SMB Trends, Mobile Device Management and IT Mobility

How MDM Can Fend off Threats to Endpoint Security [CHART]

Posted by Lily Teplow on September 16, 2016

Mobility is a necessary part of the modern workplace. Mobile devices improve business efficiency and productivity, but they also have the ability to expose and compromise company data. If your client’s endpoints aren’t being protected by a solution like Mobile Device Management (MDM), vulnerabilities have a higher likelihood of being successfully exploited. To determine if clients and prospects are ready to invest in your MDM solution, ask them this: are you fully protected against today’s endpoint security threats?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Mobile Device Management and IT Mobility, MSP Sales Chart

Mobile Security Framework: The Mobile Device Management Foundation

Posted by Rob Patey on September 8, 2016

Here’s a riddle: How does a mobile strategy turn from a gleaming skyscraper touching new heights of business productivity into a towering inferno? The answer: a poor mobile security foundation.


As the average mobile device gets more minuscule in the form of wearables and whatever technology comes next, many organizations need to go back to the basics of mobile security. That is one of the lessons Tyler Shields of Forrester Research recently shared in a mobile security video series.

Read More

Topics: Mobile Device Management and IT Mobility, Navigate 2016

Are Your Employees Risking Sensitive Company Data? [CHART]

Posted by Lily Teplow on July 22, 2016

In today’s job landscape, the ability to access work files and email on-the-go has become part of everyday operations. Smartphones and tablets continue to flood the workplace, and your clients’ employees are storing a lot of important data on them. So how can they ensure that the corporate data being accessed through these mobile devices stays secure?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Mobile Device Management and IT Mobility, MSP Sales Chart

A Bad Case of Stagefright: Vulnerability Resurfaces in Apple Devices

Posted by Joseph Tavano on July 21, 2016

Imagine this scenario:

You woke early from a great night of sleep, well rested. The sun is shining outside. It’s Saturday, and you have no plans whatsoever, for the first time in a long time. The day is yours to make it whatever adventure you choose it to be. The world isn’t perfect, but right now life is good.

You take your phone off the charger, and notice tat you have no messages. Odd! You typically have a few, if only from social media. Further investigation reveals your contact list is gone. Emails, texts, messages, and photos too. Apps, data—everything has been wiped from your phone! While you were sleeping, the attacker gained access to all of your sensitive data through your phone, locked you out of your email and banking accounts, and gained access to your business’ secure network. And to make matters worse, you don’t know how it happened.

Read More

Topics: Industry News, Information Security, Mobile Device Management and IT Mobility

Pokémon GO and What It Means for MSPs

Posted by Lily Teplow on July 19, 2016

Over the past two weeks, cartoon creatures have officially taken over our world. If you haven’t seen them, it’s because they’re only visible when playing the new game, “Pokémon GO”. This free smartphone game fuses virtual technology with the physical world, causing it to quickly become a cultural phenomenon and the biggest mobile game in U.S. history.

However, Pokémon GO’s rapid rise in popularity has also raised some major security concerns. While millions of users wander the world searching for Squirtles and Pikachus, they may not be aware of what they’re giving up in return for playing the game.

Read More

Topics: Industry News, Information Security, Mobile Device Management and IT Mobility, Cybersecurity and Threat Management

5 Tips to Beef Up Your Email Security

Posted by Joseph Tavano on March 25, 2016

You’ve implemented the strongest firewalls. Your passwords are 100 character strings that must contain Capitals, lowercases, and special characters in non-repeating patterns. You skipped over two-factor and went straight to five-factor authentication. Everything is retina scanned. Your encryption is encrypted.

And one email from a prince needing money wired to his account brought the whole thing crashing down.

Read More

Topics: Data Protection, Information Security, Mobile Device Management and IT Mobility

CES 2016 - What MSPs Need to Know

Posted by Joseph Tavano on January 12, 2016


CES®,
the global technology event formerly known as the Consumer Electronics Show, wrapped up last week to record-breaking numbers - showcasing innovators, inventors, makers and breakthrough technologies that seek to push the present day into tomorrow. Over 170,000 industry professionals from around the world attended CES, representing 150 countries and including more than 100 official delegations. CES is so large that it’s nearly impossible to see everything—there’s over 2.47 million square feet of exhibit space with 3,800 exhibitors.

Read More

Topics: Information Security, IT Community, Mobile Device Management and IT Mobility

Protect Yourself and Clients from Malware

Posted by Hunter Smith on January 7, 2016

"Attention! We've detected malicious activity on your computer. Download antivirus now."

Spyware, Keyloggers, Scareware (described in example above), Ransomware and more. It seems like malware, or malicious software, lurks around every corner of the Internet, be it in a threatening email attachment or false online advertisement. There are now newer, subtler ways for your clients to have their personal data stolen, and few will be able to detect the warning signs of the various types of malware attacks before the damage is done and the data is lost. It is time to teach yourself and your clients how to prevent malware from causing unnecessary problems on your computers and servers.

Read More

Topics: Data Protection, Information Security, Backup and Disaster Recovery, Mobile Device Management and IT Mobility, Cybersecurity and Threat Management

Why MSPs Need to Vigilantly Monitor Endpoint Security in 2016

Posted by Jaq Baldwin on January 6, 2016

With the Consumer Technology Association's CES 2016 conference kicking off today, I can't help but think of how many new gadgets, or endpoints, will be unveiled at the event by week's end. Endpoint management is becoming increasingly challenging due to the growing number of personal devices, as well as the growing number of places where a connected device can be found. 

Not too long ago, I wrote a post on my own blog about IoT (Internet of Things). When taking a quick inventory, I was a little stunned to realize I actually carry six connected devices on my person each and every work day! Counting Bluetooth, Wi-Fi, and 3G/LTE devices, I have a laptop, smart pen, fitness watch, iPhone, iPad, Kindle and occasionally a USB stick. While these all bring enjoyment and productivity to my life, if not properly managed, they could also leave the security of my personal data and company's data seriously vulnerable. Considering how highly connected to the Internet we've become at home through TVs, thermostats or even Wi-Fi enabled refrigerators, it should make you and your clients wonder: how much of our data could we be potentially and unknowingly putting at risk? 

Read More

Topics: Information Security, Mobile Device Management and IT Mobility

3 Mobile Security Quick Tips to Share with Clients

Posted by Matt Mainhart on May 13, 2015

From-the-Help-Desk-of-Matt-3-Mobile-Security-Tips.png


We live a mobile lifestyle. Our mobile devices keep us connected, and we can do anything from our mobile devices - from anywhere in the world. Online banking, hotel reservations, email – all can be accessed with a tap of the finger.

If you forget your phone at a restaurant, at work, or at the pub – how confident are you that nobody else can access your information?

While browsing the Internet, how confident are you that your information is only being viewed by you?

Follow these steps for a confidence boost in your mobile security:

Read More

Topics: Information Security, Client Quick Tips, Mobile Device Management and IT Mobility

iSpy With My Little Eye… Are MDM Administrators Accessing Personal User Data?

Posted by Brandon Garcin on May 7, 2015

As today’s bring-your-own-device (BYOD) movement continues to grow, mobile device management (MDM) is quickly becoming a must-have offering for technology service providers – and with good reason. The end user benefits of a well-defined mobility policy are undeniable; the ability to collaborate on-the-go makes mobile employees significantly more productive, and having access to corporate data, email and applications at our fingertips allows employees to work offsite or after hours without being in front of a computer.

Read More

Topics: Mobile Device Management and IT Mobility

Time Out: Security Concerns You Should Keep an i on with the Release of the Apple Watch

Posted by Mary McCoy on April 22, 2015

With the Apple Watch's big release in two days and pre-orders already having sold out, the security implications of wearable technology and the Internet of Things have been front in center and for good reason. With widespread adoption of the Bring Your Own Device (BYOD) revolution in offices of all sizes today, MSPs have to educate their target audience on the importance of mobile security and encourage clients to establish use policies and response plans, should their devices become compromised.

Have you considered offering Mobile Device Management (MDM)? While one should always be wary of potential vulnerabilities in new gadgets and gizmos, the security concerns around Apple Watch can be mitigated if you encrypt the iPhone it connects with. Still, there are a few aspects of Apple's newest toy you should watch out for...

Read More

Topics: Industry News, Information Security, Mobile Device Management and IT Mobility

3 Lessons MSPs Can Learn From Kentucky's Epic NCAA Run

Posted by Ben Barker on April 7, 2015

If you ask any member of the Kentucky Wildcats men's college basketball team, they'll probably tell you that their season was a failure. A perfect 38-0 season was spoiled when Wisconsin upset Kentucky in a Final Four match-up over the weekend. Still, winning thirty-eight games in a row is nothing to be ignored and although they won't be cutting down the nets as National Champions this season, Kentucky still had an incredible run. That degree of success does not happen by accident, and MSPs should take note. 

Read More

Topics: Data Protection, Backup and Disaster Recovery, Mobile Device Management and IT Mobility

7 Must-Have Managed IT Services Offerings for 2015 [Slideshare]

Posted by Mary McCoy on March 12, 2015

7-must-have-managed-it-services-offerings-for-2015


Are your 2015 revenue goals baring down on you, seemingly unreachable? How are you tracking for MRR so far? 

If you're not growing as fast as you'd like, take a deep breath. We may already be three months into the new year, but there's still plenty of time to take your MSP business to the next level. The solution may be simpler than you think: expand your portfolio of service offerings! 

Read More

Topics: Revenue Growth and Profitability, Information Security, Remote Monitoring and Management, Backup and Disaster Recovery, Mobile Device Management and IT Mobility

URGENT: New FREAK Attack Exposes Yet Another SSL/TLS Vulnerability

Posted by Mary McCoy on March 5, 2015

Are you FREAKing out about this latest cybersecurity concern? 

Maybe you haven't heard, but a new SSL/TLS vulnerability has surfaced after more than decade of existence, and system administrators everywhere are shaking their heads. This past Tuesday, Factoring Attack on RSA Export Keys - abbreviated FREAK because apparently FAREK isn't as menacing - was discovered by researchers at the French Institute for Research in Computer Science and Automation and Microsoft Research.

Similar to recent security nightmares that exploited SSL backdoors, FREAK allows hackers to weaken the security of HTTPS connections between clients and servers, making it easier to crack the encryption and perform a man-in-the-middle attack.

And now, of course, you're sitting there wondering to yourself, "Which connections are vulnerable and what does it mean for me?"

Read More

Topics: Information Security, Mobile Device Management and IT Mobility

Looking for Love in All the Wrong Places: The Dangers of Dating Websites

Posted by Raj Goel on February 12, 2015

online-dating-security-danger


With Valentine's Day right around the corner, expect heightened activity on popular online dating websites like Match, OkCupid, eHarmony, etc. What threat does this pose? Recently I sat down on a weekly program called “Coffee Break With Sabra” to discuss the issue further. The program offers quick expertise in finance/money, real estate, law and relationships.

Protect your clients' and employees' online information by reading the interview below. You will learn:

  • About the danger of dating sites (and it’s not what you think)
  • What they don’t want you to know about dating sites
  • What you can do to protect yourself (and your future offspring)
Read More

Topics: Data Protection, Information Security, Mobile Device Management and IT Mobility

Are You Answering the MDM Call? [Slideshare]

Posted by Brandon Garcin on February 4, 2015

You've crunched the numbers, and you’ve got your revenue goals for the year mapped out – but how do you meet (or preferably, exceed) them? One way is to expand your services portfolio by adding a new technology into the mix – and what better way to help your customers support BYOD than by offering mobile device management (MDM)! 

Read More

Topics: Business Development and Growth, Revenue Growth and Profitability, Data Protection, Information Security, Mobile Device Management and IT Mobility

5 Crucial Tasks For IT Departments in The BYOD Era

Posted by Phil Bickerton on January 26, 2015

The pros and cons of BYOD are well documented, but regardless of its merits, it is making an impact in the IT industry and in many offices around the world. Nearly three quarters of businesses are implementing or planning to adopt BYOD, which represents somewhat of a transformation of the modern workplace.

With this trend set to continue in the foreseeable future, the important question is...what will this mean for you and your MSP business?

Read More

Topics: Tech Quick Tips, Data Protection, Information Security, Mobile Device Management and IT Mobility

What If the 2015 NFL Playoff Teams Were IT Solutions?

Posted by Nate Teplow on January 26, 2015

NFL-teams-as-technologies

The Super Bowl is this coming weekend! Hopefully you’re as pumped as I am (although I doubt it unless you’re a fellow Pats fan). But even if my team wasn’t playing in the big game this weekend, I’m still a football fan and always enjoy watching the games. 

So in honor of the Super Bowl this weekend, I asked some of my other football-fan co-workers the question: What if each of this year’s playoff teams were IT Solutions?

Here’s what we came up with.

Read More

Topics: Remote Monitoring and Management, Backup and Disaster Recovery, Mobile Device Management and IT Mobility

MDM Sales & Marketing Strategies for MSPs: MSPradio 36

Posted by Nate Teplow on January 21, 2015

Episode36-MDM-Sales-Marketing

MSPs are always looking for ways to add new lines of revenue. Mobile Device Management offers that opportunity, yet many MSPs aren't sure where to begin. How do you price MDM, package it, market it and sell it? These are questions most MSPs have when looking to add MDM to their service offering.

On this episode of MSPradio, we're joined by Dawn Farrell and Andrew Luhrmann from MaaS360 to discuss MDM sales and marketing strategies for MSPs. If you're interested in offering MDM services this year to your clients, this show will help you know how to get started.

Tune in now to this week's episode of MSPradio!

Read More

Topics: Business Development and Growth, Revenue Growth and Profitability, Mobile Device Management and IT Mobility, Podcast

Learn a New Skill, Add MDM as an Offering: IT Resolution 5

Posted by Brandon Garcin on January 16, 2015

Well, we’re halfway through January – and according to data from the University of Scranton, about 30% of New Year’s resolutions in the U.S. have likely already been thrown out. In fact, the study last year claimed that only of Americans actually achieve their resolutions. Those aren’t great odds.

We want to help improve your chances of success, particularly when it comes to business growth. And while I’m no weight loss expert, nor am I any sort of financial advisor, I can think of one “traditional” resolution that fits in quite nicely with our IT and business development theme – learning a new skill.

Read More

Topics: Business Development and Growth, Revenue Growth and Profitability, Mobile Device Management and IT Mobility

Treating the New Year as "Business as Usual": IT SNAFU Day 10

Posted by Brandon Garcin on December 23, 2014

2015 is just around the corner, and businesses everywhere are racing to put the finishing touches on any outstanding projects, map out key goals and objectives for the new year, and close those last few deals to bring in some extra holiday cheer (and revenue). But the holidays are also a time to relax, see the family, maybe take a vacation – and of course, do some shopping.

Unfortunately, these fun and often much-needed breaks can create some sizeable IT headaches when everyone is rushing back to the office in January.

Read More

Topics: Help Desk, Customer Service, Mobile Device Management and IT Mobility

Ignoring Mobile Device Management: IT SNAFU Day 7

Posted by Brandon Garcin on December 18, 2014

Bring-Your-Own-Device (BYOD) and IT mobility initiatives are creating quite an impact on businesses today – both from a productivity and management standpoint. Employees are demanding access to corporate data and applications from personally-owned devices, and initial approaches to mobile device management (MDM) are now falling short in increasingly-complex and interconnected offices.

And although there’s no shortage of benefits to supporting BYOD – improved workforce productivity and employee satisfaction, greater control over mobile data and applications, and more – adoption rates can vary significantly from one business to the next.

Read More

Topics: Mobile Device Management and IT Mobility

Missing the Shadow IT Opportunity: IT SNAFU Day 4

Posted by Mary McCoy on December 15, 2014

day4

No matter what your stance on "Shadow IT" is, the practice of spending money on IT products and services without the knowledge and approval of IT departments has rapidly come to characterize the SMB market.

Think about the sheer quantity of business applications your clients need to run their business - cloud based consumer file sharing apps, collaboration tools, business productivity SaaS applications, even social media! Think their IT departments have the bandwidth to manage all of the requests?

Business decision makers (BDMs) have ever increasing technology needs, and those needs are instant. One IT representative can't possibly handle the volume of orders, but someone needs to make sure everything is in compliance with security standards.

That's where you come in!

Read More

Topics: Data Protection, Information Security, Mobile Device Management and IT Mobility

WEBINAR: The Tricks and Treats of Mobile Device Management (MDM)

Posted by Nate Teplow on November 3, 2014

blog-MDMwebinar

Halloween may be over, but we want you to start your Monday off right, with a frightfully entertaining and informational program about mobile device management. Weren't able to attend our live MDM Hallowebinar with MaaS360 last Thursday? It's nothing to moan about - we have the recording here! Listen to it a second time on your morning commute to learn how you, as an MSP, can take advantage of the MDM opportunity. Afraid of the unknown and still not sure how to begin developing your service offering? We'll walk you through it, so that there are no scary surprises.
Read More

Topics: Mobile Device Management and IT Mobility

The EMM Market Will Double by 2018: How MSPs Can Take Advantage

Posted by Nicolas Dard on October 22, 2014

mdm_opportunity_blog_option_2

A recent report from 451 Research states that they expect the market for Enterprise Mobility Management (EMM) to double in size by 2018. Currently, the market accounts for $3.8 Billion in revenue, and that’s expected to grow to $9.6 Billion in 2018.

Additionally, Gartner expects over 2.2 billion smartphone and tablet devices to ship in 2015, which towers over the prediction of 325 million PC’s expected to ship. What does this mean for MSPs? The opportunity for mobile device management has never been greater.

Read More

Topics: Mobile Device Management and IT Mobility

How Mayhem Ensues When You Don't Establish a BYOD Policy

Posted by Nick Bruno on August 21, 2014

True or false: While the concept of Bring Your Own Device, or BYOD, has been around for a few years, adoption by some companies has been slow. False! As humorously depicted in the picture above (more on this later), BYOD is increasingly taking over the modern office. Is your MSP properly prepared? Are all of your employees on the same page?

Read More

Topics: Mobile Device Management and IT Mobility

Outsourcing Your Help Desk Requirements: MSPtv Episode 20

Posted by Scott Glidden on May 30, 2014

 05-30-2014-Sullo.png

In this week's episode of MSPtv, we sit down with Bryan Sullo, owner of Clocktower Technology Services, and talk with him about his company's switch to Continuum's Help Desk offering and the successes he has experienced. We also talk a little bit about the growing concept of BYOD (Bring Your Own Device) and its Pros and Cons with using it. 

Read More

Topics: Business Development and Growth, Help Desk, Video, Mobile Device Management and IT Mobility

Load More
RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]