Partnering—The Way to Win with SIEM and SOC Without Breaking the Bank

<p>According to Symantec, <a href="https://www.symantec.com/security-center/threat-report&quot; target="_blank">58% of cyberattacks target small and-medium sized businesses</a> (SMBs); the Federation of Small Businesses (FSB) reported that SMBs in the UK alone “<a href="https://www.fsb.org.uk/media-centre/press-releases/small-firms-suffer-c…; Read More … [Read more...]

Types of Network Security

<p>Cybercrime is one of the fastest-growing forms of criminal activity. The global cost of dealing with the damage caused by cybercrime is estimated to reach $6 trillion by 2021 [https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/], doubling the damage recorded in 2015. Read More … [Read more...]

Automation of the Week: Upgrading PowerShell and Automation in 2019

<p>Over the past five years we‘ve seen a steady increase in the use of automation by MSPs. They’ve been working on automating their monitoring, patching, self-healing of issues, maintenance, and more. When I started focusing on automation a few years ago, I used to see that only a small subset of MSPs was actively investing in it. In the past year, I’ve found that MSPs now typically fall … [Read more...]

Is Ransomware Dead or Still as Deadly?

<p><i></i>In 2017, it seemed you couldn’t go more than a few weeks without hearing about a major ransomware attack. From Petya/NotPetya to WannaCry to BadRabbit, ransomware was the terror of businesses and individuals across the globe.&nbsp;</p> Read More … [Read more...]

CSAM: Safeguarding Clients Against Insider Betrayals (and Mistakes)

<p>We’re two weeks into National Cybersecurity Awareness Month. Last week, Brandon Shopp focused on the fundamentals of protecting your customers against cybercriminals. However, not all threats come from external sources—many breaches begin with employees or contractors. Today, I want to clue you in on some worrying issues with insiders by offering two important safety … [Read more...]

Data Protection Requires Breadth and Depth 

<p>In <a href="https://www.solarwindsmsp.com/blog/selling-backup-what-leading-msps-do-…; target="_blank">an earlier post</a>, we shared some tips and tricks on how to effectively sell data protection, and one key concept is matching your offering to different customer needs and budgets. It makes sense—some customers are only willing to pay for the minimum amount of … [Read more...]

10 Tips to Help You Improve Password Management

<p>Passwords are the cornerstone of your cyberdefenses, but managing them effectively and securely can be a real challenge—particularly if you’ve got hundreds spread out across a large number of different customers. Here are ten things that will help you take your password management to the next level, both for your own company and your customers.</p> <h3><b>1/ Educate your … [Read more...]

The Key Differences Between On-Premises and Cloud Security

<p>Today’s businesses can decide between on-premises vs. cloud solutions for just about every element of their IT services, including software, servers, storage, backups, security, and enterprise resource planning (ERP). <a href="https://www.solarwindsmsp.com/blog/cloud-services-market-exceeding-busi… cloud is becoming increasingly popular</a>, but on-premises or “onprem” … [Read more...]

Recognizing the Red Flags of Customer Churn

<p>Earlier this year, we did some <a href="https://www.solarwindsmsp.com/about-us/press/press-releases/new-report-…; target="_blank">research on churn and managed services providers</a> (MSPs).&nbsp;&nbsp;We were staggered by the statistics that in North America, for every four customers gained each month, the average MSP lost three. Read More … [Read more...]

IoT Security for Your Devices

<p>The internet of things (IoT) has changed the way people interact with technology. When<a href="https://www.solarwindsmsp.com/blog/iot-coming-how-do-we-prepare-it"&gt; IoT technology</a>&nbsp;emerged around 2008, no one could have predicted that smart refrigerators would become as ubiquitous as smartwatches. Read More … [Read more...]