dcsimg

3 Ways to Say Goodbye to a Problem Customer

<p>For many entrepreneurs, having the laser focus to identify a customer that is not a good fit for their business model is not always on their list of priorities.&nbsp;However, the most profitable MSPs know who their ideal customer is and steer clear of those that aren’t. Read More … [Read more...]

Taking the Fear Out of Backup and Recovery

There is an old combat adage, often associated with the U.S. Civil War, that describes warfare as "long periods of boredom punctuated by moments of sheer terror.” While, thankfully, I have no direct combat experience, I can see parallels (on a much smaller scale) with the world of backup.  Read More … [Read more...]

Find Out Which SEO Keywords Your Competitors are Using

<p>As a Managed Services Provider (MSP) knowing what Search Engine Optimization (SEO) keywords your company should target for your website and how to outperform your competitors in this area can seem like a daunting task.</p> Read More … [Read more...]

Why MSPs Should Team Up with MSSPs

<p>Businesses are struggling to protect themselves against cyber threats. The threat landscape is always expanding, cybersecurity talent is scarce, and security solutions can get pretty complex, so companies increasingly turn to their Managed Service Providers (MSPs) for help.&nbsp;</p> Read More … [Read more...]

Why Properly Documenting Non-Technical Conversations and Decisions is Essential

<p>If you’ve read any of my articles, you’ve probably guessed there’s a theme running through many of them—that theme is “setting expectations.” If you’re good at setting expectations with your customers, your business should benefit.</p> <p>An often overlooked, but vital, part of setting expectations is documenting those discussions. Some of the discussions can have significant … [Read more...]

Password Stealing 101: Common Methods and Defenses

<p><i></i>If you want to defeat a cybercriminal, you have to understand how they think. When you know the tools of their trade, you can learn defenses to help you fight back.&nbsp;</p> Read More … [Read more...]

Imaging vs. Cloning: Key Differences

Whenever there’s discussion about the difference between a clone and an image, confusion between the two terms abounds. For the most part, this confusion is warranted—both are information technology tactics for copying the complete content of a hard drive. Both create an exact or near exact record of your drive. And you can use both to back up a drive or replace an old, corrupted, or failed drive … [Read more...]

Should You Give Your Clients Gifts Over the Holiday Season?

<p>When I owned my managed services provider (MSP), I made a special point to thank my clients for their business every year. This came in the form of holiday cards and gifts since it’s a simple way to say thank you at the end of the year. Showing customer appreciation is crucial in the MSP business because it helps build long-term customer relationships.</p> Read More … [Read more...]

DDoS—What You Need to Know

<p>DDoS (or distributed denial of service) attacks have hit the headlines again recently with news that the <a href="https://www.theguardian.com/politics/2019/nov/12/labour-reveals-large-s…; target="_blank">UK’s Labour Party was attacked twice in the space of two days</a>.</p> Read More … [Read more...]

Compliance is Not a Synonym for Security

<p>For many businesses, regulatory compliance is a big part of their daily operations. Terms like HIPAA, PCI DSS, SOX, NERC, and CIP are now widely recognized, as are the list of standards and processes organizations need to have in place to protect, store, and process information.&nbsp;</p> Read More … [Read more...]