Category: Spotlights

data rights management
Clive Longbottom: MSPs need to think beyond physical security

Clive Longbottom: MSPs need to think beyond physical security

As an MSP, you probably spend a lot of time making sure that your platform is secure — using long, complex passwords and (hopefully) two-factor authentication wherever possible; specifically named superuser accounts, rather than general shared sysadmin ones; heuristic-based anti-malware...

/ August 15, 2018
fax security
When it comes to security, even your fax machine could be vulnerable

When it comes to security, even your fax machine could be vulnerable

The fax machine, that ancient document-transmission tool, is still in use in many offices. You would think that technology that was invented in the 19th century, and popularized in offices in the 1980s, would be fairly safe when it comes...

/ August 14, 2018
MSPs have a vested interest in providing end users with cybersecurity training

MSPs have a vested interest in providing end users with cybersecurity training

Given the costs of investigating security breaches and then cleaning up after them, managed service providers (MSPs) arguably now have a vested interest in training end users to better recognize cybersecurity threats. After all, it’s the MSP that usually absorbs...

/ August 14, 2018
Ask an MSP Expert: How do I know when I should make the transition to MSP?

Ask an MSP Expert: How do I know when I should make the transition to MSP?

Q: I keep hearing that the industry is moving toward a managed services model. I’m not convinced I should take the leap. How do I know when I’m ready to make the transition to become a managed services provider? What...

/ August 13, 2018