<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1309184189147252&amp;ev=PageView&amp;noscript=1">
MSP Blog Logo


Business Growth


Help Desk



Sales & Marketing


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Simplifying 3 Trends That Are Changing the IT Landscape

Posted by Meaghan Moraes on April 21, 2017

Simplifying 3 Trends That Are Changing the IT Landscape

Let’s face it, modern IT is complicated. With new components being continuously added to the mix, managing and securing the IT landscape requires new tools fit for the challenge. However, the last thing managed services providers (MSPs) need is yet another disparate management tool that adds more complexity to their services. Without cohesive IT and service level management, there will be serious disconnects—from servers and networks, to storage and end points. 

Amidst the changing tides of technology, MSPs can help their clients ensure IT service and business success with an integrated approach. The following are three growing trends that MSPs should understand how to embrace and capitalize on in order to achieve sustainable profitability and business growth.

Read More

Topics: Cloud Computing, SMB Trends, Mobile Device Management and IT Mobility

How MDM Can Fend off Threats to Endpoint Security [CHART]

Posted by Lily Teplow on September 16, 2016

Mobility is a necessary part of the modern workplace. Mobile devices improve business efficiency and productivity, but they also have the ability to expose and compromise company data. If your client’s endpoints aren’t being protected by a solution like Mobile Device Management (MDM), vulnerabilities have a higher likelihood of being successfully exploited. To determine if clients and prospects are ready to invest in your MDM solution, ask them this: are you fully protected against today’s endpoint security threats?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Mobile Device Management and IT Mobility, MSP Sales Chart

Mobile Security Framework: The Mobile Device Management Foundation

Posted by Rob Patey on September 8, 2016

Here’s a riddle: How does a mobile strategy turn from a gleaming skyscraper touching new heights of business productivity into a towering inferno? The answer: a poor mobile security foundation.

As the average mobile device gets more minuscule in the form of wearables and whatever technology comes next, many organizations need to go back to the basics of mobile security. That is one of the lessons Tyler Shields of Forrester Research recently shared in a mobile security video series.

Read More

Topics: Mobile Device Management and IT Mobility, Navigate 2016

Are Your Employees Risking Sensitive Company Data? [CHART]

Posted by Lily Teplow on July 22, 2016

In today’s job landscape, the ability to access work files and email on-the-go has become part of everyday operations. Smartphones and tablets continue to flood the workplace, and your clients’ employees are storing a lot of important data on them. So how can they ensure that the corporate data being accessed through these mobile devices stays secure?

Read More

Topics: Sales and Marketing, Data Protection, Information Security, Mobile Device Management and IT Mobility, MSP Sales Chart

A Bad Case of Stagefright: Vulnerability Resurfaces in Apple Devices

Posted by Joseph Tavano on July 21, 2016

Imagine this scenario:

You woke early from a great night of sleep, well rested. The sun is shining outside. It’s Saturday, and you have no plans whatsoever, for the first time in a long time. The day is yours to make it whatever adventure you choose it to be. The world isn’t perfect, but right now life is good.

You take your phone off the charger, and notice tat you have no messages. Odd! You typically have a few, if only from social media. Further investigation reveals your contact list is gone. Emails, texts, messages, and photos too. Apps, data—everything has been wiped from your phone! While you were sleeping, the attacker gained access to all of your sensitive data through your phone, locked you out of your email and banking accounts, and gained access to your business’ secure network. And to make matters worse, you don’t know how it happened.

Read More

Topics: Industry News, Information Security, Mobile Device Management and IT Mobility

Pokémon GO and What It Means for MSPs

Posted by Lily Teplow on July 19, 2016

Over the past two weeks, cartoon creatures have officially taken over our world. If you haven’t seen them, it’s because they’re only visible when playing the new game, “Pokémon GO”. This free smartphone game fuses virtual technology with the physical world, causing it to quickly become a cultural phenomenon and the biggest mobile game in U.S. history.

However, Pokémon GO’s rapid rise in popularity has also raised some major security concerns. While millions of users wander the world searching for Squirtles and Pikachus, they may not be aware of what they’re giving up in return for playing the game.

Read More

Topics: Industry News, Information Security, Mobile Device Management and IT Mobility, Cybersecurity and Threat Management

5 Tips to Beef Up Your Email Security

Posted by Joseph Tavano on March 25, 2016

You’ve implemented the strongest firewalls. Your passwords are 100 character strings that must contain Capitals, lowercases, and special characters in non-repeating patterns. You skipped over two-factor and went straight to five-factor authentication. Everything is retina scanned. Your encryption is encrypted.

And one email from a prince needing money wired to his account brought the whole thing crashing down.

Read More

Topics: Data Protection, Information Security, Mobile Device Management and IT Mobility

CES 2016 - What MSPs Need to Know

Posted by Joseph Tavano on January 12, 2016

the global technology event formerly known as the Consumer Electronics Show, wrapped up last week to record-breaking numbers - showcasing innovators, inventors, makers and breakthrough technologies that seek to push the present day into tomorrow. Over 170,000 industry professionals from around the world attended CES, representing 150 countries and including more than 100 official delegations. CES is so large that it’s nearly impossible to see everything—there’s over 2.47 million square feet of exhibit space with 3,800 exhibitors.

Read More

Topics: Information Security, IT Community, Mobile Device Management and IT Mobility

Protect Yourself and Clients from Malware

Posted by Hunter Smith on January 7, 2016

"Attention! We've detected malicious activity on your computer. Download antivirus now."

Spyware, Keyloggers, Scareware (described in example above), Ransomware and more. It seems like malware, or malicious software, lurks around every corner of the Internet, be it in a threatening email attachment or false online advertisement. There are now newer, subtler ways for your clients to have their personal data stolen, and few will be able to detect the warning signs of the various types of malware attacks before the damage is done and the data is lost. It is time to teach yourself and your clients how to prevent malware from causing unnecessary problems on your computers and servers.

Read More

Topics: Data Protection, Information Security, Backup and Disaster Recovery, Mobile Device Management and IT Mobility, Cybersecurity and Threat Management

Why MSPs Need to Vigilantly Monitor Endpoint Security in 2016

Posted by Jaq Baldwin on January 6, 2016

With the Consumer Technology Association's CES 2016 conference kicking off today, I can't help but think of how many new gadgets, or endpoints, will be unveiled at the event by week's end. Endpoint management is becoming increasingly challenging due to the growing number of personal devices, as well as the growing number of places where a connected device can be found. 

Not too long ago, I wrote a post on my own blog about IoT (Internet of Things). When taking a quick inventory, I was a little stunned to realize I actually carry six connected devices on my person each and every work day! Counting Bluetooth, Wi-Fi, and 3G/LTE devices, I have a laptop, smart pen, fitness watch, iPhone, iPad, Kindle and occasionally a USB stick. While these all bring enjoyment and productivity to my life, if not properly managed, they could also leave the security of my personal data and company's data seriously vulnerable. Considering how highly connected to the Internet we've become at home through TVs, thermostats or even Wi-Fi enabled refrigerators, it should make you and your clients wonder: how much of our data could we be potentially and unknowingly putting at risk? 

Read More

Topics: Information Security, Mobile Device Management and IT Mobility

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus