Latest posts

Change layout
Shadow IT: Risks and Benefits Explained

Shadow IT: Risks and Benefits Explained

Shadow IT: Risks and Benefits Explained

Shadow IT might be the cause of a security breach at many levels, including data breach through an insecure or legacy solution and up to compliance breach due to uncontrolled data movement. In 2019, this concept was in the top 7 list of IT concerns for US companies. Hence, in most cases, shadow IT is dangerous and MSPs should do their best either to eliminate it or control it. However, there are a couple of surprising upsides for companies implementing shadow IT. Continue reading

How to Define the Bundle and Not Overengineer Things

How to Define the Bundle and Not Overengineer Things

How to Define the Bundle and Not Overengineer Things

Your managed IT bundle is the cornerstone of your business. The bundle comprises software and hardware solutions, services, prices and other conditions of your services. The core of your bundle and the pricing will be the same for most customers. But the devil will still be in the details, since each of your prospects, even if they come from the same vertical, is unique. So, your price and services offer will also be unique. Continue reading

How to Create Standard Operating Procedures

7 Steps to Mastering SOPs

7 Steps to Mastering SOPs

A standard operating procedure, or SOP for short, is a step-by-step document that comprises workflows, frameworks, and procedures that are taken as the standard for your managed IT services. SOPs are a common instrument for most MSPs wanting to standardize and streamline their operations. These documents help to onboard new tech staff members faster and ensure that the quality of support is of the required level. Continue reading

MSP Risk Management

MSP Risk Management Guide

MSP Risk Management Guide

It is easy to say that you need to evaluate your risks, control and mitigate them and, if anything bad happens, perform damage control, overview the situation and make appropriate changes. All that sounds great, but what is “risk” exactly? And how do you make risk management a part of your value-based managed IT offering? Continue reading

How Do You Limit Liability as an MSP?

How Do You Limit Liability as an MSP?

How Do You Limit Liability as an MSP?

Some managed IT providers think it's obvious that they have limited liability for data breaches, failed hardware, and clients’ data loss. On the other hand, many clients believe that their managed IT providers are totally liable for any of these incidents, and they will go straight to court to sue the MSP for any damage, downtime, or loss. While the court may not be on the side of the clients, a lawsuit is a long and expensive process by itself. Continue reading

MSP Business Plan

How to Create an MSP Business Plan

How to Create an MSP Business Plan

Some MSPs will tell you that you should not waste even a minute of your time creating a business plan while your business is only a project. Other, more mature managed IT providers will tell you that, unless you have to secure funding from a partner or investor, an MSP business plan is - you guessed it - a waste of time. Continue reading

End-User Training Guide for MSPs

Guide to End-User Training for MSPs

Guide to End-User Training for MSPs

Many managed IT providers believe that, no matter how hard you train the end users, they will still click the links, download the malware, provide account information, or simply send corporate money to the malefactors. End-user training is, indeed, not a panacea. However, it aims to decrease the chances of a successful attack or intrusion.

Continue reading