Month: August 2019

How RPA can help drive automation in legacy businesses

How RPA can help drive automation in legacy businesses

Increasingly, companies are looking for ways to automate repetitive internal processes, but most can’t simply rip and replace the systems that they have in place and go for the latest and greatest AI technologies. It’s simply too risky, disruptive, and...

/ August 19, 2019
The new normal – being more flexible as an MSP

The new normal – being more flexible as an MSP

How do you deal with customers who need variable resources? The ones who, for part of the day, or on a cyclic basis of once per week, month, or quarter, show a spike in usage of CPU, network, or storage...

/ August 19, 2019
Tech Time Warp: The superspy origins of Google Earth

Tech Time Warp: The superspy origins of Google Earth

If you’ve played around with Google Earth, you’ve probably been struck by the fact that it’s kind of creepy. It’s fascinating and technologically amazing, for sure, but it can feel a tad invasive. So it should really come as no...

/ August 16, 2019
How MSPs can fight the spiral of commoditization

How MSPs can fight the spiral of commoditization

Each day, a new cloud service or API seemingly comes into play, deeming themselves essential in their particular industry. In the MSP world, RMMs, anti-virus, and backup services have all undergone commoditization. It used to cost thousands to offer a...

/ August 15, 2019
Opportunities for MSPs abound as IoT adoption starts to mount

Opportunities for MSPs abound as IoT adoption starts to mount

A pair of studies suggest that the Internet of Things (IoT) opportunity for managed service providers (MSP) in the months and years ahead is about to increase, as organizations start to significantly increase their level of investment. A new report...

/ August 15, 2019
Supply chain attacks on the rise

Supply chain attacks on the rise

You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

/ August 14, 2019
Survey shines light on chronic need for actionable cybersecurity intelligence

Survey shines light on chronic need for actionable cybersecurity intelligence

A survey of 577 IT and IT security practitioners in the U.S. conducted by The Ponemon Institute on behalf of AttackIQ, a provider of security testing tools, suggests there’s a major opportunity for managed service providers (MSPs) to provide security...

/ August 13, 2019
Ask an MSP Expert: Should my MSP have its own company vehicles?

Ask an MSP Expert: Should my MSP have its own company vehicles?

Q: I’m an MSP owner and business is booming. In fact, I’m planning on hiring two technicians to assist me in servicing customers. Should I have them take their own cars on service calls or should I purchase company vehicles?...

/ August 12, 2019
To grow your MSP business, you need to lead by example

To grow your MSP business, you need to lead by example

As the owner of a managed service business, do you understand the importance of leading by example? In an previous article, I wrote about why your MSP should eat its own dog food. Of course, this doesn’t mean you should...

/ August 12, 2019
Your next hack could arrive by snail mail

Your next hack could arrive by snail mail

When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

/ August 9, 2019