MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

3 Cybersecurity Threats MSPs Need to Monitor and Manage in 2017

Posted by Lily Teplow on July 14, 2017

3 Cybersecurity  Threats MSPs Need to Monitor and Manage in 2017

In the growing and evolving cyber threat landscape, how can managed services providers (MSPs) ensure that they’re delivering on their promise to secure and protect their clients at all times? Let’s face it, managing and monitoring cyber threats is not an easy task. MSPs are now under immense pressure to be the IT security superhero for their clients, but if you haven’t yet established a security offering, it may stunt your MSP growth.

Luckily, there are tools out there that can help you uphold your commitment to security, even amongst the major threats that are merged with business today. Let’s take a look at the three most crucial cyber threats MSPs need to be aware of in 2017 and how you can keep your clients protected from them.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services, Internet of Things

Putting the S in MSSP: A Recap [SLIDESHARE]

Posted by Meaghan Moraes on July 12, 2017

Putting the S in MSSP: A Recap SlideShare

Today’s cyber threat landscape has caused a cloud of risk and uncertainty to loom over modern business. With the digital wave washing over organizations of all sizes, the potential of experiencing a cyber attack has expanded exponentially. IT security is now seen as a top priority, especially for small- and medium-sized businesses (SMBs) who are at high risk of completely shutting down if proper cyber defenses are not in place. As an MSP who serves these SMB clients, it’s up to you to step in and provide robust cybersecurity that can withstand the modern threat landscape and ensure businesses remain protected and set to scale.

Over the past six weeks, we’ve offered a step-by-step explanation of what it takes to evolve from MSP to managed security services provider (MSSP): the trusted, go-to security expert that offers the level of security that will effectively manage vulnerabilities and prevent clients from potential disasters. Now, let’s recap what steps you need to take to successfully bring an IT security offering to market.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 6: How Traditional IT Service Providers Can Embrace Cybersecurity Services in 2017

Posted by Meaghan Moraes on July 5, 2017

Putting the S in MSSP Part 6: How Traditional IT Service Providers Can Embrace Cybersecurity Services in 2017

Throughout the Putting the S in MSSP series, we’ve shared the building blocks for becoming a comprehensive managed IT services provider capable of keeping clients effectively protected from cyber threats. In part five, we discussed how to offer security-as-a-service in a way that enables both you and your clients to scale. To wrap up this cybersecurity series, we will ensure you understand how to properly define what robust cybersecurity looks like in 2017 so you can include security as part of your offering and prevent your clients’ businesses from becoming obsolete.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

The Top 5 MSP Blog Posts of June 2017

Posted by Lily Teplow on July 4, 2017

The Top 5 MSP Blog Posts of June 2017

Happy 4th of July from all of us here at Continuum! Are you planning on heading to the beach or your local barbeque for America’s most patriotic holiday? As you search for those star-spangled pair of flip-flops or pack up your cooler, why not bring along June’s most popular MSP blog posts for some light reading?

This month, we’re sharing tips on how to demonstrate your MSP value to new clients, which IT certifications you should equip your techs with, the MSP’s guide to Petya ransomware and much more. Let’s dive right in!

Read More

Topics: Business Development and Growth, Cybersecurity and Threat Management

Putting the S in MSSP Part 5: Scaling Your Business with Security-as-a-Service

Posted by Meaghan Moraes on June 29, 2017

Putting the S in MSSP Part 5: Scaling Your Business with Security-as-a-Service

If you’ve been following our “Putting the S in MSSP” blog series, you’re well on your way to becoming a comprehensive MSSP who can secure and protect your SMB clients. However, when building and establishing this new line of business, how can you ensure that your security offering is built to scale?

In part four, we discussed top tactics for effectively speaking to SMBs about cybersecurity. In this post, we’ll focus on how to offer security-as-a-service in a way that enables both you and your clients to scale.  


Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

An MSP’s Guide to the Petya Ransomware Outbreak

Posted by Brian Downey on June 28, 2017

An MSP’s Guide to the Petya Ransomware Outbreak

The headline-grabbing nature of WannaCry put just about every IT and security team in reaction mode. Just one month after the WannaCry outbreak, we find ourselves reverting to reaction mode as the next batch of ransomware spreads across the globe—this time from the Petya family variant.

In a matter of hours, the new Petya ransomware spread its way across 65 countries. While WannaCry and Petya aren’t the first versions of ransomware, they are a new breed of ransomware, ones that use powerful exploits to enable rapid propagation within and to new organizations. As a managed services provider (MSP), it’s imperative that you understand this ransomware outbreak and how it can affect you or your clients’ businesses. Don’t know what Petya is or how you can stay protected? Here is your guide.

Read More

Topics: Industry News, Cybersecurity and Threat Management

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Posted by Meaghan Moraes on June 21, 2017

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure SMBs with the tools needed to tread the modern threat landscape without fear.


In part three
, we examined the lifecycle of a cyber attack and walked through how to devise a solid remediation plan and manage vulnerabilities. In this post, we’ll take that knowledge a step further and offer key tips on how MSPs should be framing the topic of cybersecurity to their clients.

Read More

Topics: Sales and Marketing, Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Posted by Meaghan Moraes on June 14, 2017

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure small- and medium-sized businesses (SMBs) with the tools needed to tread the modern threat landscape without fear.

In the first part of this series, we offered tips on how to begin defining and deploying the three pillars of cybersecurity. In part two, we went on to talk about the three major pitfalls of managing multiple security vendors. In this post, we will examine the lifecycle of a cyber attack, providing insight on how to devise a solid remediation plan and manage vulnerabilities.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 2: 3 Pitfalls of Managing Multiple Security Vendors

Posted by Meaghan Moraes on June 7, 2017

MSSP: 3 Pitfalls of Managing Multiple Security Vendors

As a managed IT services provider, you’ve served as the tech backbone of your clients for years, in a variety of ways. From RMM to BDR to security, your offerings provide small- and medium-sized businesses (SMBs) with the level of support, cost-efficiency and scalability they need to survive in the modern business world. Or so you hope.

"Putting the S in MSSP" is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. In part one of this series, we offered tips on how to properly define and deploy the three pillars of cybersecurity so you’re setting a solid foundation for your security services. In this post, we’ll highlight three major downsides to offering your clients security via a number of different vendors, and discuss best practices for implementing truly robust cybersecurity.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

The Top 5 MSP Blog Posts of May 2017

Posted by Lily Teplow on June 6, 2017

The Top 5 MSP Blog Posts of May 2017

Can you believe that the end of the quarter is right around the corner? As we commemorate May and look towards hitting our June goals, let’s revisit the best content provided on the MSP Blog this past month! 

It’s no surprise that IT security continues to be top-of-mind for most managed services providers (MSPs). Also included in this month's roundup, discover how you can leverage visual statistics to boost your sales and marketing efforts, how to build a team of top IT talent, and how you can optimize your client onboarding experience for long-term success. Check out all of this and more in our most popular posts below!

Read More

Topics: Business Development and Growth, Sales and Marketing, Cybersecurity and Threat Management

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus