Latest posts

Change layout
How to Define the Bundle and Not Overengineer Things

How to Define the Bundle and Not Overengineer Things

How to Define the Bundle and Not Overengineer Things

Your managed IT bundle is the cornerstone of your business. The bundle comprises software and hardware solutions, services, prices and other conditions of your services. The core of your bundle and the pricing will be the same for most customers. But the devil will still be in the details, since each of your prospects, even if they come from the same vertical, is unique. So, your price and services offer will also be unique. Continue reading

How to Create Standard Operating Procedures

7 Steps to Mastering SOPs

7 Steps to Mastering SOPs

A standard operating procedure, or SOP for short, is a step-by-step document that comprises workflows, frameworks, and procedures that are taken as the standard for your managed IT services. SOPs are a common instrument for most MSPs wanting to standardize and streamline their operations. These documents help to onboard new tech staff members faster and ensure that the quality of support is of the required level. Continue reading

MSP Risk Management

MSP Risk Management Guide

MSP Risk Management Guide

It is easy to say that you need to evaluate your risks, control and mitigate them and, if anything bad happens, perform damage control, overview the situation and make appropriate changes. All that sounds great, but what is “risk” exactly? And how do you make risk management a part of your value-based managed IT offering? Continue reading

How Do You Limit Liability as an MSP?

How Do You Limit Liability as an MSP?

How Do You Limit Liability as an MSP?

Some managed IT providers think it's obvious that they have limited liability for data breaches, failed hardware, and clients’ data loss. On the other hand, many clients believe that their managed IT providers are totally liable for any of these incidents, and they will go straight to court to sue the MSP for any damage, downtime, or loss. While the court may not be on the side of the clients, a lawsuit is a long and expensive process by itself. Continue reading

MSP Business Plan

How to Create an MSP Business Plan

How to Create an MSP Business Plan

Some MSPs will tell you that you should not waste even a minute of your time creating a business plan while your business is only a project. Other, more mature managed IT providers will tell you that, unless you have to secure funding from a partner or investor, an MSP business plan is - you guessed it - a waste of time. Continue reading

End-User Training Guide for MSPs

Guide to End-User Training for MSPs

Guide to End-User Training for MSPs

Many managed IT providers believe that, no matter how hard you train the end users, they will still click the links, download the malware, provide account information, or simply send corporate money to the malefactors. End-user training is, indeed, not a panacea. However, it aims to decrease the chances of a successful attack or intrusion.

Continue reading

MSP’s Guide to Targeting Prospects with Internal IT

MSP’s Guide to Targeting Prospects with Internal IT

MSP’s Guide to Targeting Prospects with Internal IT

Quite often when you reach out to a new prospect, you might hear: “You know, that sounds great, but we already have an IT department in place.” Whether this “IT department” is a real department or a one-man army, the answer comes across clearly as “not interested”. Or does it? Not really. Companies with internal IT are indeed harder nuts to crack, but there are several possibilities for landing them. In this article, we will overview four such possibilities.

Continue reading

Louisiana Law Requires MSP Registration With the State

Louisiana Law Requires MSP Registration with the State

Louisiana Law Requires MSP Registration with the State

The managed IT provider business is on the rise in the US, and MSPs are operating in every public and private sector of the economy. Many private-sector organizations working with sensitive data were forced to operate under certain compliance regimes, such as HIPAA for the medical sector. These regimes make strict stipulations about the way sensitive data should be managed and IT infrastructure secured in an organization.

Continue reading