Month: March 2019
IT modernization initiatives begin to gain momentum
Most business and IT leaders intuitively understand that legacy IT applications and infrastructure make their organization less agile. That’s become a significant issue because most of them are also keenly aware of the need to embrace digital business transformation initiatives...
Tech Time Warp: Pentium processor makes its debut
Pentium. Even a quarter-century after the processor first made its debut, the brand name still carries connotations of speed and innovation. Intel’s famous product processor line was introduced March 22, 1993, and despite some notable issues, Pentium was above all...
Your local restaurant might be an IoT hotspot
What telecommuter hasn’t used McDonalds or Starbucks as an office away from the office? I know I’ve spent plenty of hours under those famous golden arches while on the road. The unsecured guest Wi-Fi flows as smoothly as the coffee,...
Percentage of channel partners offering managed services achieves critical mass
It’s been a very long time coming, but it looks like there may finally be more channel partners offering managed services than traditional break-fix services. A survey of subscribers published this week by ChannelPro finds the number of partners offering...
Automation challenges for MSPs to overcome
Previously, we examined why MSPs should move on from manually documenting systems, in favor of automation. Manual documentation comes with far too many of its own challenges to justify a status of being the preferred method of documentation. In its...
Social media management platforms MSPs should consider
Social media can serve as a cost-efficient and highly valuable marketing tool. For MSPs to drive leads and other opportunities, their social media channels must have strong visibility and encourage engagement. However, with many businesses having accounts on multiple social...
Helping SMBs overcome their technology growth fears
When I started in IT support, most office networks consisted of a server room, some desktop computers, and maybe a few printers and scanners. This meant the default 192.168.1.X range was enough for more than a hundred staff. That’s far...
Ask an MSP Expert: What is a BEC attack and how do I explain it to my customers?
Q: We’ve heard that BEC attacks are one of the most prominent cybersecurity threats to our customers’ businesses today. What is this and how can we protect our SMBs from its attempts to breach our defenses? Business Email Compromise (BEC)...
Tech Time Warp: This worm might have been “Witty,” but it certainly wasn’t charming
Some viruses are merely pesky; others are downright nasty. The Witty Worm, which made its debut at approximately 8:45 p.m. PST March 19, 2004, falls into the latter category. Within a swift 45 minutes, the Witty Worm had corrupted the...
Navigating the great IT sales paradox
One of the most frustrating things IT services providers need to contend with these days is that while the sales funnel has collapsed, it’s actually taking longer than ever to close a deal.