dcsimg

How Does LDAP Authentication Work?

<p>Today’s businesses rely on a growing list of professional applications to support mission-critical operations. In fact, <a href="https://www.wsj.com/articles/employees-are-accessing-more-and-more-busi… Wall Street Journal</em></a> reports that 10% of businesses now have more than 200 applications in their tech stack, with figures for both small and large organizations … [Read more...]

Kerberos Authentication Process Explained

<p>In Greek mythology, Kerberos (or Cerberus) is a frightening-looking dog with multiple heads and fangs capable of slicing through human bone. Kerberos is famous for guarding the gates of the underworld to prevent the dead from leaving. Until Kerberos’ capture by the divine hero Heracles, the dog’s tenacious patrol let no soul pass into the world of the living.</p> Read More … [Read more...]

Why MSPs’ Security Keeps Me Up at Night 

<p><i></i>For at least a few years now, the press has rightly brought attention to the fact that small-to-midsized businesses (SMBs) have increasingly become targets for cybercriminal activity. SMBs often contain valuable data, yet rarely have the security controls available to their enterprise counterparts.</p> Read More … [Read more...]

WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation

In the early days, practically all tech support scammers would get their own leads by doing some amateur SEO poisoning and keyword stuffing on YouTube and other social media sites. They’d then leverage their boiler room to answer incoming calls from victims. Today, these practices continue, but we are seeing more advanced operations with a clear separation between lead generation and … [Read more...]

Is Backup Wasting Your Time and Costing You Money?

<p>There’s an old adage that “time is money,” and nowhere is this truer than in the world of managed IT service providers. When you sell professional services and expertise, every wasted minute is a lost revenue opportunity.&nbsp;</p> <p>How many hours are you wasting on a needlessly complex backup setup? Here are some things to consider:</p> Read More … [Read more...]

Understanding Single Sign-On Authentication

<p>Single sign-on (SSO) solutions are an increasingly popular system for managing digital identity in medium and large enterprises. But what exactly is it, and how does it work? In the following article, we’ll look at the basics of how SSO can help manage user access and explore SSO’s many advantages for managed services providers (MSPs).</p> <h3><b>What Is Single Sign-On … [Read more...]

3 Takeaways from FireEye’s 2020 Predictions Report

<p>The security industry publishes reports on threats, trends, and other topics several times each year. It’s hard enough keeping up with the everyday demands required of managed services providers (MSPs)—trying to stay in the loop on these reports can be a nightmare. So I want to make things easier on you by giving you the highlights—and what I think it means for you on a practical … [Read more...]

What Skills Levels Should You Hire at and When?

<p>There is no one-size-fits-all answer to the above title question. However, we <i>can </i>provide some tips to help you figure out what works best for you.&nbsp;</p> <p>There are two main things to consider:&nbsp;</p> <ul> <li>Where is your gap?</li> <li>What are your resources?</li> </ul> Read More … [Read more...]

SNMP Monitoring and Management

<p>As a managed services provider (MSP), you need fast, remote access to your customers’ networks and accurate insights into their infrastructure—enter Simple Network Management Protocol (SNMP).&nbsp;</p> Read More … [Read more...]

How to Move Up the Automation Maturity Model 

<p>In a recent blog, <a href="https://www.solarwindsmsp.com/blog/automation-week-upgrading-powershell…; target="_blank">Upgrading PowerShell and Automation in 2019</a>, I talked about how automation has evolved and how I see our partners fitting into four different categories with respect to their automation maturity. Read More … [Read more...]