Change layout
Sell Your Managed Services Effectively with LinkedIn

Sell Your Managed Services Effectively with LinkedIn

Sell Your Managed Services Effectively with LinkedIn

Social media is a free publicity tool at the service of sales forces across businesses. MSPs who are not using social media platforms are likely to lag behind the competition to a considerable extent. Many customers first search on social media for the services they require. Many also seek information about necessary services from their social media contacts. Continue reading

MSP PSA

The Benefits of Professional Services Automation (PSA) Tools For MSPs

The Benefits of Professional Services Automation (PSA) Tools For MSPs

As a business owner, you should already be aware of the impact that good tech solutions have on MSPs. To take your business to the next level, you should consider professional services automation (PSA) software. It’s time to understand what PSA is and how its key features will prove helpful for your business growth.
Continue reading

Add new managed services to portfolio

How to Add New Managed IT Services to Your Portfolio

How to Add New Managed IT Services to Your Portfolio

To meet the demands of an evolving customer base, more and more businesses are leveraging IT to maximize operational effectiveness and deliver products and services efficiently to their customer base. As such, they look for MSPs to help them solve the challenges of running an agile organization in today’s competitive business landscape. Continue reading

Don’t miss new articles!
Thank you for subscribing!
Direct to S3 Glacier vs S3 Glacier Storage Class

Amazon S3 vs S3 Glacier: Which Is Best for Data Archives

Amazon S3 vs S3 Glacier: Which Is Best for Data Archives

Our clients who want to store backup data in Amazon S3 Glacier often ask us how best to back it up: Whether to place it in S3 Glacier storage directly, or instead to select S3 generic storage and configure S3 Glacier as the storage class. Although both approaches provide the same end result, there are reasons why you might prefer one method over the other. Keep reading for an overview.

Continue reading

Backup Retention

Backup Retention and Scheduling Best Practices

Backup Retention and Scheduling Best Practices

Backup is one of the most important practices for any business and should be approached with care and attention to detail. Your choice of retention and scheduling scenarios should be based on your business needs.

In this article we’ll talk about essential retention considerations and assets which will help you  set up your backups properly. Continue reading

Resize Partitions in Linux

MSPs: Selling the Cake vs. Selling the Ingredients

MSPs: Selling the Cake vs. Selling the Ingredients

Managed service providers encounter numerous challenges regularly. From business development and MSP marketing to IT automation and staff, business managers and owners must do it all. But one of the biggest debates brewing on the MSP front for the last couple of years is about the choice of selling MSP packages as a whole or the base and add-ons separately. Continue reading

How Ransomware Works

How Ransomware Works and How Backups Can Help

How Ransomware Works and How Backups Can Help

If you think ransomware works in the same way as other types of cyberattacks, you may be overlooking important steps for protecting against it. This article provides an overview of defending yourself against ransomware by assessing the current state of ransomware threats and discussing the latest developments in ransomware design, and creating a ransomware backup strategy.

Continue reading

PowerShell Remote Alerts

PowerShell Remote Alerts for Firewall

PowerShell Remote Alerts for Firewall

December 2019 has witnessed three major ransomware attacks on MSPs and service providers (and we're only halfway through the month!). The data of more than 100 dentistry practices was encrypted via an attack on an MSP, one of the biggest US data centers provider was hit and the data of several non profit organizations was encrypted with ransom demands of around $500,000.

Continue reading

Load more