We are happy to introduce MSP360 Backup for Microsoft 365 and Google Workspace 4.8, which brings a major addition to the storage experience – built-in managed cloud storage.
With this release, the need for third-party storage setup is entirely eliminated, configuration time is reduced, and administrators can start protecting Microsoft 365 and Google Workspace data immediately upon sign up. Continue reading
The vCIO Process: What MSPs Should Know
Not every business is large enough to have its own CIO, so instead of employing someone, an MSP or a contractor is oftentimes hired to fill the role. While MSPs are properly trained in the services and offerings they provide, they aren’t always well equipped to tackle the business challenges CIOs face daily. By understanding how CIOs transform businesses, managed services providers can improve how they manage technical environments and deliver business results effectively as vCIOs. Continue reading
MSP Voice Episode 51 – “If You Don’t Ask, You Don’t Get“
Corey runs 5K Technical Services out of Plano, TX. 5K specializes in engineering/architecture firms but also does work with local non-profits. Having spent time working for some big tech companies, Corey decided it was time to branch out on his own and start up 5K. While Corey started his career on the technical side, he eventually chose to focus more on the management (non-technical) as his career progressed. Continue reading
How to Prevent Spear Phishing Attacks
Spear phishing prevention strategies are essential against attacks, which are executed through the use of electronic or email communications. Targeted phishing may impact an individual, corporation, or business, depending upon the objectives and intentions of its perpetrators. Cybercriminals may launch spear-phishing attacks for the following reasons: Continue reading
NAS Backup Strategy: Local, Cloud and Hybrid Backup
Unlike typical external hard drives, NAS devices provide built-in operating systems that support features like remote access, printer streaming, or native media streaming. Additionally, you can save images, server data, application databases, and so forth without any supplementary management device. Continue reading
Meet Up with CloudBerry at the IT Nation Explore
Join us at the IT Nation Explore 2019! The conference runs from the 13th to the 15th of June and is one of the largest MSP events of the year. Continue reading
QNAP Cloud Backup: Best Practices, Software to Use
A QNAP NAS is a great way to keep data safe and available. But the fact is that even if you have data redundancy built into the NAS, it’s still important to perform QNAP cloud backups as well to back up your NAS data to a remote location. Not only does backing up QNAP data to the cloud help you to meet the requirements of the 3-2-1 backup rule, but it may also be required by compliance regulations. Continue reading
MSP Voice Episode 50 – “Carve Out Your Space” with Hank Holbrook
Most MSPs on the show offer a range of IT services to small businesses in a particular geographic area, Bluesky Technology is a bit different, they offer one service nationwide. Hank tells me about how focusing on just the one service has helped Bluesky be successful. Continue reading
How to Activate MSP360 Products Offline via a Command Line Interface
In case that you don’t have the opportunity to activate your copy of MSP360 Explorer, MSP360 Backup, or MSP360 Drive online, you can use the offline activation.
Offline activation can be done via the command-line interface of the product, as well as via a graphical interface (check out this article for instructions). Continue reading
Social Engineering Prevention
When you think of a modern-day hacker, chances are you picture a shady character camped out behind a sea of monitors, working all day and night to infiltrate networks and systems through fancy coding and password cracking.
MSP Voice Episode 48 – “Talking YouTube” with Tom Lawrence
This is our 1 year anniversary week for the MSP Voice podcast!
And this week I was thrilled to have Tom Lawrence back on the podcast. Tom was our first guest and also our most popular. We calculated our top 10 episodes/guests for the first year and Tom came out on top!
Securing Your Office 365 Tenants. Part 1
In the last article, we went over addressing a compromised account, taking the response actions to ensure the account is safe and back under the end user’s control.
Now, as a follow up to the previous article, we will review the actions needed to properly secure an Office 365 tenant. These steps are geared towards MSPs who manage multiple Office 365 tenants and require some level of automation to configure Office 365 tenants in bulk. Continue reading




