<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1309184189147252&amp;ev=PageView&amp;noscript=1">
MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Posted by Meaghan Moraes on June 21, 2017

Putting the S in MSSP Part 4: Top Ways to Sell Cybersecurity to SMBs

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure SMBs with the tools needed to tread the modern threat landscape without fear.


In part three
, we examined the lifecycle of a cyber attack and walked through how to devise a solid remediation plan and manage vulnerabilities. In this post, we’ll take that knowledge a step further and offer key tips on how MSPs should be framing the topic of cybersecurity to their clients.

Read More

Topics: Sales and Marketing, Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Posted by Meaghan Moraes on June 14, 2017

Putting the S in MSSP Part 3: Examining the Lifecycle of a Cyber Attack

Putting the S in MSSP” is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. Throughout this six-part series, you’ll learn how to become a comprehensive MSSP who can secure small- and medium-sized businesses (SMBs) with the tools needed to tread the modern threat landscape without fear.

In the first part of this series, we offered tips on how to begin defining and deploying the three pillars of cybersecurity. In part two, we went on to talk about the three major pitfalls of managing multiple security vendors. In this post, we will examine the lifecycle of a cyber attack, providing insight on how to devise a solid remediation plan and manage vulnerabilities.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 2: 3 Pitfalls of Managing Multiple Security Vendors

Posted by Meaghan Moraes on June 7, 2017

MSSP: 3 Pitfalls of Managing Multiple Security Vendors

As a managed IT services provider, you’ve served as the tech backbone of your clients for years, in a variety of ways. From RMM to BDR to security, your offerings provide small- and medium-sized businesses (SMBs) with the level of support, cost-efficiency and scalability they need to survive in the modern business world. Or so you hope.

"Putting the S in MSSP" is a weekly blog series that aims to set up MSPs to succeed as managed security services providers (MSSPs) by offering the insights and recommendations you need to profit from this new and important line of business. In part one of this series, we offered tips on how to properly define and deploy the three pillars of cybersecurity so you’re setting a solid foundation for your security services. In this post, we’ll highlight three major downsides to offering your clients security via a number of different vendors, and discuss best practices for implementing truly robust cybersecurity.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

Putting the S in MSSP Part 1: Defining and Deploying the 3 Pillars of Cybersecurity

Posted by Meaghan Moraes on May 31, 2017

Putting the S in MSSP Part 1: Defining and Deploying the 3 Pillars of Cybersecurity

With increasingly complex threats flooding the modern IT landscape, small- and medium-sized businesses (SMBs) are struggling to keep their heads above water. We’ve all seen the stats, right? Malicious attacks are on the rise, and your SMB clients are increasingly (and successfully) becoming the targets. Unfortunately, this means that your IT services of yore simply aren’t enough to keep up with the ever-present, ever-evolving cyber threats that plague modern business. As an MSP, what is there left for you to do? The answer might be to adopt a managed security services provider (MSSP) model and integrate security services into your portfolio.

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services

How to Explain WannaCry to Your End Users

Posted by Meaghan Moraes on May 16, 2017

How to Explain WannaCry to Your End Users

Despite the term “cyber attack” now being virtually synonymous with “modern business,” the world has never seen anything like WannaCry before. This new strain of ransomware, also known as WanaCrypt0r and WCry, recently hit computers in 99 countries, spurring 75,000 cases of the ransomware around the world. It was a big one—the big one.

Read More

Topics: Industry News, Information Security, Cybersecurity and Threat Management

Orange Is the New Hack: 3 Cybersecurity Lessons for MSPs

Posted by Meaghan Moraes on May 2, 2017

Orange Is the New Hack: 3 Cybersecurity Lessons for MSPs

Hype surrounding the Netflix original series, Orange Is the New Black, got several shades darker this past weekend when a hacker literally stole the show. The hacker, who goes by “thedarkoverlord,” obtained and shared the first ten episodes of the coming season of Orange Is the New Black on Saturday after Netflix failed to meet their ransom requests.

The hack occurred at the postproduction company Larson Studios, a popular digital-mixing service in Los Angeles for television networks and movie studios. Thedarkoverlord also claimed to have stolen unreleased content from ABC, Fox, National Geographic and IFC, and threatened ransomware attacks on these networks, as well. The theft is merely the latest in a long line of ransomware attacks by cybercriminals over the past year. Specifically, this new development provides a perfect opportunity for managed IT services providers (MSPs) to ensure that clients are adopting a multi-layered approach to IT security.

Read More

Topics: Industry News, Information Security, Cybersecurity and Threat Management

7 Red Flags MSPs Should Identify to Reduce Cyber Attacks

Posted by Chris Thompson on April 27, 2017

7 Red Flags MSPs Should Identify to Reduce Cyber Attacks

Email hacking is one of the most common forms of cyber attacks today. It takes place every day and throughout the world. You may be familiar with the email attack that occurred in 2016 during the Presidential Election. John Podesta fell for a phishing attack, which led to the release of a decade’s worth of emails. The hacker posed as Google and alerted Podesta to change his password because of suspicious activity on his account. By clicking on the link within the email, hackers were granted full access to his inbox.

Situations like this happen to businesses of all sizes, and the rate of these cyber attacks is only increasing. As an MSP, your goal is to protect businesses against these attacks, which can be difficult if the employees are not properly trained to identify potential threats. People are tricked into giving hackers information because they are not aware of the warning signs to look out for. However, here is a list of seven red flags to look out for and include in your security training for your clients.

Read More

Topics: Information Security, Cybersecurity and Threat Management

3 Browser Extensions for Safe and Secure Browsing

Posted by Matt Mainhart on April 6, 2017

3 Browser Extensions for Safe and Secure Browsing.png

With the invention of the internet, almost everything is now one simple click away. Unfortunately, this luxury comes with certain consequences, such as companies being able track your every move as you browse. You might not know it, but the websites you and your clients visit are using one or more “trackers” to follow your browsing habits around the web and learn more about you. These internet shenanigans can come in many forms, like advertisement popups, unauthorized information gathering – you name it.

So, how are you protecting yourselves, or better yet, your clients? Check out these three browser extensions they can install to browse the internet (somewhat) shenanigan free. Share them with your clients in your next newsletter send to help make their browsing experience more secure!

Read More

Topics: Information Security, Client Quick Tips

3 Ways to Increase Laptop Security On-The-Go

Posted by Matt Mainhart on March 9, 2017

3 Ways to Increase Laptop Security On-the-Go.png

Allow me to paint a scary picture for you. You’re on the road for work and answering some emails from a client at the airport. Then you get thirsty, but you see that there’s an overpriced drink stand just a few steps away and you make the sacrifice of spending $4.00 on a bottle of water. As you break out your wallet and pay up, you turn around to see that your laptop is gone! You only stepped away for about 60 seconds and were just a few steps away. However, a thief saw this as a window of opportunity, and took it.

Now you and your boss are freaking out about confidential company information potentially getting into the wrong hands. As the world starts to spin, you find yourself asking “how could this happen?”

Now, we can snap back to reality. In order to prevent this unruly situation from happening to you, check out the three quick tips below for increased laptop security while you’re on-the-go.

Read More

Topics: Information Security, White-Label Resources, Client Quick Tips, Cybersecurity and Threat Management

What Is the Financial Impact of a Ransomware Attack? [CHART]

Posted by Lily Teplow on February 24, 2017

What Is the Financial Impact of a Ransomware Attack.png

Imagine for a moment that you receive a phone call from a client to hear that hundreds of their computers have been infected with ransomware, knocking critical systems offline and putting their organization’s entire operations at risk. What a nightmare, right? Unfortunately, this has been a reality for many unprepared small- and medium-sized businesses (SMBs) as we’ve seen ransomware reach new levels of maturity over the past couple of years.

Ransomware attacks can have a major impact on business continuity, productivity, reputation and much more, and dealing with one is not only time-consuming; it can be extremely costly. SMBs need to be fully aware of the threat posed by ransomware and make strengthening their IT defenses a top priority this year. However, if they’re hesitant or don’t yet have the proper defenses in place, how can you convince them to turn to an MSP like you for help? What other financial impacts could ransomware have on their business and why should they leverage your managed IT services to prevent a business-crippling attack?

Read More

Topics: Information Security, Cybersecurity and Threat Management, Managed Security Services, MSP Sales Chart

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus