Month: March 2019

Your local restaurant might be an IoT hotspot

Your local restaurant might be an IoT hotspot

What telecommuter hasn’t used McDonalds or Starbucks as an office away from the office? I know I’ve spent plenty of hours under those famous golden arches while on the road. The unsecured guest Wi-Fi flows as smoothly as the coffee,...

/ March 20, 2019
Percentage of channel partners offering managed services achieves critical mass

Percentage of channel partners offering managed services achieves critical mass

It’s been a very long time coming, but it looks like there may finally be more channel partners offering managed services than traditional break-fix services. A survey of subscribers published this week by ChannelPro finds the number of partners offering...

/ March 19, 2019
Automation challenges for MSPs to overcome

Automation challenges for MSPs to overcome

Previously, we examined why MSPs should move on from manually documenting systems, in favor of automation. Manual documentation comes with far too many of its own challenges to justify a status of being the preferred method of documentation. In its...

/ March 19, 2019
Helping SMBs overcome their technology growth fears

Helping SMBs overcome their technology growth fears

When I started in IT support, most office networks consisted of a server room, some desktop computers, and maybe a few printers and scanners. This meant the default 192.168.1.X range was enough for more than a hundred staff. That’s far...

/ March 18, 2019 / 1 Comment
Ask an MSP Expert: What is a BEC attack and how do I explain it to my customers?

Ask an MSP Expert: What is a BEC attack and how do I explain it to my customers?

Q: We’ve heard that BEC attacks are one of the most prominent cybersecurity threats to our customers’ businesses today. What is this and how can we protect our SMBs from its attempts to breach our defenses? Business Email Compromise (BEC)...

/ March 18, 2019
Tech Time Warp: This worm might have been “Witty,” but it certainly wasn’t charming

Tech Time Warp: This worm might have been “Witty,” but it certainly wasn’t charming

Some viruses are merely pesky; others are downright nasty. The Witty Worm, which made its debut at approximately 8:45 p.m. PST March 19, 2004, falls into the latter category. Within a swift 45 minutes, the Witty Worm had corrupted the...

/ March 15, 2019
Navigating the great IT sales paradox

Navigating the great IT sales paradox

One of the most frustrating things IT services providers need to contend with these days is that while the sales funnel has collapsed, it’s actually taking longer than ever to close a deal.

/ March 14, 2019 / 1 Comment
The rise of malspam

The rise of malspam

If you are like me, you are probably finding it hard to believe that the first quarter of 2019 is almost over. It seems like a good time to stop and take a breath and look at what some of this...

/ March 13, 2019 / 1 Comment
3 Key steps to building the perfect email marketing campaign

3 Key steps to building the perfect email marketing campaign

While email may not seem like the most avant-garde medium, the truth is the average dollar spent on email marketing leads to a return on investment of nearly $40. It is among the most effective marketing tools when used correctly,...

/ March 13, 2019
Privilege access management emerges as next big cybersecurity opportunity for MSPs

Privilege access management emerges as next big cybersecurity opportunity for MSPs

Privilege access management (PAM) as of late has become a major area of cybersecurity focus because cybercriminals have become more adept at targeting attacks at specific individuals within organizations. The goal of these attacks is to compromise the credentials of...

/ March 12, 2019