Department of Homeland Security Issues Emergency Directive for Microsoft Critical Vulnerabilities

<p>Today Microsoft released several patches to address critical vulnerabilities. Several were of enough concern to prompt the Department of Homeland Security to issue an <a href=" https://cyber.dhs.gov/ed/20-02/">Emergency Directive</a> ordering all Federal agencies to patch these vulnerabilities within the next ten days.</p> Read More … [Read more...]

IT Infrastructure Monitoring

<p>IT infrastructure monitoring is the unsung hero of the modern workplace. It’s a hero because it sustains our technology systems in ways that allow them to function continuously, reliably, and seamlessly. It’s unsung because most employees don’t notice it, so long as the technologies they rely on continue to work without interruption.&nbsp;</p> Read More … [Read more...]

Take a Flexible Approach to Data Protection This Year

<p>The new year means it’s time to take a fresh look at the state of your data protection. Sure, you take backups—but how confident are you that your customers’ data is truly protected and quickly recoverable in the event of a ransomware attack, disaster, or user error? And how many hours are you spending every week to maintain the status quo?</p> Read More … [Read more...]

How Do You Get Your Customer to Buy into Hardware Upgrades

<p>In general, there are two reasons to upgrade or replace hardware outside of a direct customer request; the first is performance and the second is security. Performance issues cause losses in productivity that, if not quantified, the business owner may not realize how much they’re losing. Security is top of mind for many business owners today, but it may still be hard to justify the … [Read more...]

Converged IT Infrastructure Overview and Benefits

<p>The history of converged systems proves everything old becomes new again. The most popular data management systems started out as single, unified mainframes before the prevailing trend shifted and data management became decentralized in the 1980s and 1990s. In 2008, Oracle reinvigorated the converged infrastructure era when it debuted its HP Oracle Database Machine—and managed services … [Read more...]

AD vs. LDAP: What’s the Difference?

<p>For managed services providers (MSPs), Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) are kitchen sink terms. So common and familiar are they that we rarely bother to discuss their functions and how to use them most effectively. This is unfortunate, if for no other reason than the fact that AD and LDAP are critical to all the work that we do as IT experts—within … [Read more...]

Are Your Mobile Devices Making You Vulnerable to Email Threats?

<p>In our previous blog we covered <a href="https://www.solarwindsmsp.com/blog/top-social-engineering-techniques-tr…; target="_blank">Top Social Engineering Techniques Trending on Email</a>. We continue to see that email remains the number one attack vector for businesses. According to a study by 451 Research, email security is the biggest problem we’re not paying … [Read more...]

How to Offboard a Customer

<p>During the life of your MSP, there will come a time when you need to offboard a customer. There are a variety of reasons why, but regardless of the circumstances, a well-orchestrated transfer makes you look professional and leaves the door open for the future.&nbsp;</p> <p>So, what can you do to make sure you are offboarding well?</p> <h3><b>What are the … [Read more...]

How Does Ransomware Spread?

<p>Today’s managed services providers (MSPs) face an increasingly sophisticated cybercriminal landscape. As the Internet of Things (IoT) and BYOD policies grow in popularity in the workplace, and as business networks become more complex, MSPs trusted with the security of their customers’ networks need to stay ahead of the curve when it comes to bad actors and the types of malware they … [Read more...]

Best Practices SIEM: Educational Series Part 1

<p>Security has become a critical part of daily life, requiring constant focus on protection to safeguard intellectual property and business data. The ever-evolving cyberthreat landscape requires businesses to put sophisticated cybersecurity defenses in place to help keep the bad guys out. But what do these defenses look like and how should managed services providers (MSPs) deploy advanced … [Read more...]