dcsimg

How Do You Know When You’ve Met “the One?”

<p>It’s February, and love is in the air. Or maybe not? We all know managed services providers (MSPs) like to periodically shop around to see if the “one” partner is out there, to provide their remote monitoring solution. What are the key things to look for to help you decide if the grass is truly greener? Or if you really have found “the one?”</p> Read More … [Read more...]

Migrating a Customer to Your Business from Another MSP

<p>When a customer decides to jump ship from their existing managed services provider (MSP) to you, it usually is not an amicable situation with the other MSP. There are many things that need to be considered, including the potential that the other MSP could become hostile once they know they are being fired. Here are a few of the things to plan and look out for when this situation … [Read more...]

February 2020 Patch Tuesday Update:  One of the Largest by Vulnerability Count

While January 2020’s “Patch Tuesday” release from Microsoft wasn’t large in size, it had a few “high profile” vulnerabilities that demanded immediate attention. February is a different story.  At the time the patches were released, Microsoft reported only one of the vulnerabilities had an active exploit against it. There are a whopping 99 individual vulnerabilities fixed across operating … [Read more...]

How to Move up the Automation Maturity Model—Part 3: Beyond the Basics

<p>In previous blogs in this series, I discussed how partners typically fit in four main automation maturity categories. The categories include partners who aren’t interested in automating, partners who are interested but aren’t sure how to start, partners who have started the journey towards automation, and partners who automate anything they can.</p> <p>If you haven’t read … [Read more...]

What is Network Discovery?

<p>In the modern digital age, companies are relying on larger networks than ever before. But these networks aren’t just bigger; they’re also more dynamic. With an influx of BYOD policies, SaaS applications, and a myriad of other digital transformation initiatives, it has become more difficult for managed services providers (MSPs) to gain visibility into their customers’ network topology: … [Read more...]

How to Stay Safe from Office Macro-Based Malware with Email Security  

<p>Microsoft Office macros have been spreading malware since the late '90s, ranging from Melissa to well-known ransomware applications such as Locky or the Dridex banking malware. However, as users learned how to combat these threats, this type of attack fell out of favor with hackers.&nbsp;</p> Read More … [Read more...]

Common BYOD Challenges

<p>For many people in today’s increasingly digital landscape, “going to work” has become synonymous with “going to the living room.” <a href="https://www.flexjobs.com/blog/post/flexjobs-gwa-report-remote-growth/&q…; target="_blank">Remote work has grown a staggering 159%</a> over the past 12 years. Read More … [Read more...]

7 Reasons to Partner with a Specialized Security Provider

<p>Over the past few years, cybersecurity has grown more complex. As individuals and businesses grow increasingly connected, there are more opportunities than ever for cybercriminals to attack. As both businesses and consumers continue to learn about current cybersecurity dangers, MSPs will increasingly be expected to enhance their own security capabilities.</p> Read More … [Read more...]

Who hates shopping (for backup software)?

<p>Shopping isn’t everyone’s favorite activity. And even those who enjoy shopping would most likely rather be perusing something fun—like a new car, new favorite pizza place, or new gaming system—rather than something as dull as backup software for your managed services provider (MSP) or business.&nbsp;</p> Read More … [Read more...]

How Does Token-Based Authentication Work?

<p>As a managed services provider (MSP), cybersecurity is never far from your mind. Recent research estimates the damages from cybercrime will reach a startling <a href="https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-201… trillion per year by 2021, up from $3 trillion in 2015</a>. Read More … [Read more...]