dcsimg

Choosing the Right Tools for Your Business

<p>Whether you’re just starting out in the IT service business or you’re trying to expand, having the right tools to help you do your job can not only make your life much easier, it can make your business more successful.</p> Read More … [Read more...]

Understanding DNS Cache 

<p>Most managed services providers (MSPs) will have heard of the Domain Name System (DNS), the distributed network of servers that acts as a directory, cataloging domain names and their corresponding Internet Protocol (IP) addresses. Relatedly, a DNS cache is local storage that contains the records of a computer’s query history, including recent website visits.&nbsp;</p> Read More … [Read more...]

When Should You Consider a Merger or Partnership?

<p>Mergers and acquisitions (M&amp;As) are becoming more prevalent across the IT services industry. This trend is being seen on both the vendor and customer sides of the market.&nbsp;So, why are so many IT service providers making the leap to acquire or be acquired? What are the benefits? And are there any other options?</p> Read More … [Read more...]

What’s the Difference Between OneDrive and SharePoint

<p>The nature of work is changing. For many companies, remote work is becoming more than an added bonus—it’s becoming a norm. <a href="https://www.gallup.com/workplace/236222/build-trust-remote-employees.as… to Gallup, 43% of U.S. employees work remotely</a> at least part of the time. Read More … [Read more...]

Why Email Security Is a Core Part of Cyberhygiene

<p>With cybercriminals lurking ready to pounce on your network, security has become a critical part of our daily lives—requiring you to constantly focus on getting better protection to safeguard you and your customer’s intellectual property and business data.</p> <p>The harsh reality is that you are at risk if you are connected to the internet! You don’t need to have any assets … [Read more...]

Stateful vs. Stateless Firewall Differences

<p>Protecting business networks has never come with higher stakes. <a href="https://www.bonadio.com/news-events/articles/data-breach-report-quantif… average cost for stolen digital files</a> containing sensitive proprietary information has risen to $148 each. When you consider how many files cybercriminals may get away with in a given attack, the average price tag of $3.86 … [Read more...]

Client First Visit Checklist—7 Things to Do When Onboarding a New Customer

<p>There are lots of things to do when onboarding a new customer.&nbsp;Many of those things are routine, ordinary, and mundane (read: boring). Therefore, it is very helpful to have a checklist of all the things you need to do when onboarding to ensure you don’t miss anything.&nbsp;&nbsp;</p> <p><em>Disclaimer: A real checklist could be pages long, … [Read more...]

How Does Rootkit Work?

<p>A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected. Etymologically, “root” refers to the targeted admin account, and “kit” refers to the software … [Read more...]

MSP System Breaches—Be Prepared! Here’s How…

<p><i></i>The managed services sector has seen a wave of customers being hit with ransomware as a result of attackers gaining access to their systems via tools used by their managed services provider (MSP) to remotely manage and monitor client systems.* While the vendors have blamed this on weak account credentials and bad cyberhygiene, MSPs have been increasingly coming under … [Read more...]

How VLAN Works

<p>Virtual local area networks, or VLANs, have become important as network complexity has exceeded the capacity of typical local area networks (LANs). Originally, a LAN connected a group of computers and associated devices to a server via cables in a shared physical location (hence the term “local”). Many LANs now connect devices via wireless internet, rather than Ethernet, although most … [Read more...]