Most Discussed Posts

How RPA can help drive automation in legacy businesses

How RPA can help drive automation in legacy businesses

Increasingly, companies are looking for ways to automate repetitive internal processes, but most can’t simply rip and replace the systems that they have in place and go for the latest and greatest AI technologies. It’s simply too risky, disruptive, and...

/ August 19, 2019 / 1 Comment
Supply chain attacks on the rise

Supply chain attacks on the rise

You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

/ August 14, 2019 / 1 Comment
Your next hack could arrive by snail mail

Your next hack could arrive by snail mail

When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

/ August 9, 2019 / 1 Comment
Tech Time Warp: Was the Welchia Worm well-intended?

Tech Time Warp: Was the Welchia Worm well-intended?

As the old saying goes, two wrongs don’t make a right — especially if the second “wrong” is a computer worm, albeit a benevolent one. In August 2003, hundreds of thousands of PCs were infected by the Blaster worm, which...

/ August 9, 2019 / 1 Comment
MSPs should start setting expectations for 5G wireless networking services now

MSPs should start setting expectations for 5G wireless networking services now

The time when managed service providers (MSPs) will need to sit down with customers to have a serious conversation concerning the rollout of 5G wireless networks has arrived. While there’s already a massive amount of hype surrounding 5G networks, cities...

/ July 18, 2019 / 1 Comment
Why your MSP should eat its own dog food

Why your MSP should eat its own dog food

Are you familiar with the phrase “Eat your own dog food?” I’ve sometimes heard it also referred to (more nicely!) as “Drink your own champagne”. It refers to the idea that you shouldn’t sell a product or solution to somebody...

/ June 27, 2019 / 1 Comment
Buy or die – long term prospecting

Buy or die – long term prospecting

Recently, Managed Sales Pros has closed two new clients. What’s special about these engagements?  Nothing, except that we’ve been pursuing both clients for around four years. The value of those clients totaled about 42,000 in MRR. A decent win, that...

/ May 24, 2019 / 1 Comment
Social engineering: a hacker’s most effective weapon

Social engineering: a hacker’s most effective weapon

What is the weakest link in your client’s network? It’s not unpatched software (although you should patch) or the unimaginative passwords (although you should change it). The weakest links are humans themselves. It’s Joan in accounting or Stan in human...

/ May 22, 2019 / 1 Comment
Windows 10 migration crisis looms ahead

Windows 10 migration crisis looms ahead

IT organizations, as well as the managed service providers (MSPs) that support them, are now in a race against time, as Microsoft prepares to end free support for Windows 7. Microsoft expects to stop delivering security updates for Windows 7...

/ May 14, 2019 / 1 Comment
Ask an MSP Expert: Should my MSP pursue industrial clients?

Ask an MSP Expert: Should my MSP pursue industrial clients?

Q: We serve primarily healthcare and finance companies, but our region has a robust manufacturing base. Are there many opportunities for MSPs in manufacturing? If so, are there any insights you can provide about taking clients in this vertical? If you...

/ May 13, 2019 / 1 Comment