dcsimg

How to Decide When to Schedule Patching, Part 1 of 2

I’ve been working with a lot of partners remotely in recent months. Patching is one of the topics I’ve heard partners express the most interest in lately. It seems people want to get better at patching—which I’m all for. I get a lot of questions about … [Read more...]

Don’t Worry—Be Certain, with Backup Recovery Testing

There’s a natural human tendency to put things off. When you’re as busy as the typical managed services provider (MSP) (responding to customers, working to gain new ones, and dealing with the day-to-day management of multiple IT infrastructures), it’s especially easy to postpone things that are time consuming or tedious—things like testing your backups.  Read More … [Read more...]

A Short History of EDR

antivirus (AV) security Read More … [Read more...]

Are You Burning Out Your Techs?

Working from home (WFH) brings both benefits and challenges—all of which can be a source of stress for MSP business owners and technicians. But there are several things you can do to address these stresses and make sure you’re not burning out your technicians. Read More … [Read more...]

What Is Traceroute and How Does It Work?

For the majority of managed services providers (MSPs), IT admins, and technicians, traceroute and ping are likely the first ports of call when troubleshooting network latency or connectivity problems. Traceroute is a simple tool any user with access to a command prompt can run. However, if you aren’t familiar with the basics of traceroute, it can be difficult to understand the test results. This … [Read more...]

12 Ways to Secure PII Data That MSPs Should Know

In a world where we conduct a significant amount of business and other daily operations online, people are becoming increasingly concerned about their online data privacy and how much institutions know about them. There is a rising concern that, in our digital era, preserving our privacy is almost impossible. Every time a user accesses a website, buys something online, or even interacts with a … [Read more...]

Is the Business World Ready for DNS Over HTTPS (DoH)? 

DNS is one of the older networking protocols in the modern technology stack. It was first invented in 1983 and was given a standard in 1987 after the … [Read more...]

EDR vs. Managed Antivirus—Which Solution is for You?

In my managed antivirus (MAV) and Read More … [Read more...]

Social Engineering Beyond the Inbox

Not all cyberattacks require high-tech wizardry to pull off. Attack vectors requiring technical knowledge certainly do occur, but a good portion of cyberattacks begin with simple social engineering.  The most common form of social engineering is phishing. However, it’s not the only form. In this blog, we’ll talk about phishing and several other forms of social engineering. But first, let’s … [Read more...]

What Is an SLA? 7 Best Practices for an MSP’s Service Level Agreement

Creating service level agreements (SLAs) may not be the most exciting aspect of the role of a managed services provider (MSP), but it remains an absolutely essential part of the customer relationship.  Read More … [Read more...]