Change layout
Threat and Vulnerability Management for MSPs blog header

Threat and Vulnerability Management for MSPs

Threat and Vulnerability Management for MSPs

Security threats come in a dizzying area of shapes and sizes. They range from malware, to improperly configured IAM policies, to malicious insiders and beyond.

How can you identify and remediate so many different types of threats? The answer is threat and vulnerability management. Here’s a primer on how threat and vulnerability management works, and why you may wish to add it to the list of managed services that you offer as an MSP. Continue reading

You’re Not the Only MSP Owner with These Three Fears blog header

You’re Not the Only MSP Owner with These Three Fears

You’re Not the Only MSP Owner with These Three Fears

It doesn’t matter who you are or how successful you may be, nobody is completely fearless in business. While you may be able to manage your fears more successfully than others (and thriving small-business owners do), we all have them; however, what’s important for you as a small-business owner is that you’re able to recognize that and learn how to not only identify your fears but face them. Continue reading

Don’t miss new articles!
Thank you for subscribing!

3 Steps to Choosing a Cloud Storage Provider

3 Steps to Choosing a Cloud Storage Provider

There is no cloud storage solution that fits all the needs of your company. No solution is built to store data backups and be used as a file-sharing and collaboration service at the same time. Sure, you might try using Microsoft OneDrive or Dropbox for Business for backups, or set up AWS Amazon S3 for file sharing but, in most cases, that would end up as an inefficient, expensive and insecure solution. In this article, we will define how you should choose a cloud storage provider, based on your unique needs. Continue reading

News You Might've Missed

News You Might’ve Missed. 19 – 22 Apr

News You Might’ve Missed. 19 – 22 Apr

What's new this week in the news for MSPs? REvil ransomware allegedly strikes Quanta Computer, takes blueprints for Apple; hacking campaign against Pulse Secure VPN devices breaches government agencies; Qlocker ransomware attack leverages 7-Zip to encrypt QNAP devices; and Codecov supply-chain attack hacks hundreds of networks, according to reports. Continue reading

How to Mitigate BYOD Problems

How to Mitigate BYOD Problems

“Bring your own device”, or BYOD, is a situation where a company's employees use personal devices to access corporate network resources or applications. These devices typically include mobile phones, tablets, and laptops. The BYOD approach can occur intermittently, meaning that some employees enter corporate resources from time to time, without notifying their system administrators. In such cases, ”bring your own device” can be a serious security issue for the company. Continue reading

MSP M&As

MSP Mergers and Acquisitions: Key Ways to Prepare

MSP Mergers and Acquisitions: Key Ways to Prepare

Mergers and acquisitions, or M&A for short, is a great way to enter the MSP business or to increase your customer base. On the other hand, you might want to leave the business if you're tired of it or if you feel like there's nothing more you want to achieve. In this article, we will overview how to get ready for mergers and acquisitions, and where you can find a good deal. Continue reading

Load more