Month: October 2020

Email threat types: Data exfiltration
Data exfiltration, sometimes referred to as data theft, is the unauthorized transfer of data from your computer, network, or other devices. The stolen data is transferred from the victim to a control server or some other device that is controlled...

The Creeper and the Reaper make cybersecurity history
“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”

Selling co-managed IT: Is it the right fit for your MSP?
Co-managed IT is becoming a popular option among businesses in need of additional IT support, particularly larger ones with internal IT departments. While some MSPs are turning toward co-managed IT services to generate additional monthly recurring revenue (MRR), it’s important to consider the following: The co-managed IT model isn’t the right fit for every MSP,...

Managed compliance services put money in the MSP bank
A survey of 300 IT security professionals published this week by Telos Corp., a provider of IT services, finds organizations on average comply with 13 different IT security and/or privacy regulations and spend $3.5M annually on compliance activities. Over the...

Four first steps to hiring for your MSP business
Hiring is not the easiest task no matter what industry you work in. Add that to the fact that the MSP industry is full of people with a lot of technical expertise, but lacking some of the soft skills that...

Maintaining your brand promise as your MSP grows
There is one fact in the managed services space that can’t be ignored: everyone has I.T. support. Those who already understand and value managed I.T. services are already buying it. Your whole sales process is now built around displacing competitors....

Ask an MSP Expert: Overcoming human error to secure the cloud
Data breaches in the cloud are becoming more common, impacting industry giants and small players alike, and MSPs now have to dig deeper to prevent them.

Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”
Picture a “cybersecurity expert” in your mind, and then catch yourself if you imagine a stereotype. Not every cybersecurity expert is a white male—as proven by the influence and impact of Rebecca “Becky” Bace, an intrusion detection pioneer who passed...

Helping your clients choose sales and marketing software
As the IT experts for their clients, MSPs often have to make business software recommendations. When it comes to sales and marketing automation tools, SMBs are often faced with a choice of expensive offerings, choosing an all-in-one solution, or cobbling...

Organizations need WFH help from MSPs now more than ever
Many organizations are just now starting to come to terms with the inherent challenges with supporting employees as an anticipated second wave of COVID-19 infections appears to be all but inevitable. A survey of more than 100 C-level executives and...