dcsimg

HIPAA Compliance Checklist and Requirements

<p>As a managed services provider (MSP), complying with a range of legal regulations can be a major part of your responsibilities. This is more than a way to provide great value to your customers—staying compliant can also protect you from penalties. This is especially true if you work with customers within the healthcare sector who are covered by the Health Insurance Portability and … [Read more...]

2 Attacks Traditional Antivirus Is Powerless to Stop

You do your due diligence when it comes to security: You patch. You have backup in place. You install spam protection on your email servers and train your people to avoid phishing attacks. And you have antivirus (AV) installed on every machine to catch malware that happens to get through all the other defenses. Yet, somehow, your customers still get attacked.  Read More … [Read more...]

Threat Monitoring: Proactive Security Against Cyberthreats 

Too many organizations leave their network security to chance. If everything is running smoothly and you’ve never encountered a security breach, proactive security solutions may seem like a big investment for your customers to make. But have you sat down with them and looked at the list of potential expenditures associated with a data breach? Cybersecurity risk is business risk.  Read More … [Read more...]

Donuts Are Delicious . . . and Powerful!

With https://en.wikipedia.org/wiki/National_Doughnut_Day">National Donut Day taking place last week in the U.S., we at SolarWinds MSP have had donuts on our minds. But not just the tasty, sugary, fried kind. We’re also busy incorporating donut charts into our product interfaces.  Read More … [Read more...]

Windows Server 2016 Requirements

<p>Regardless of industry, it’s imperative that your customers have the right operating system to meet end-user needs, support core workflows, and protect proprietary data. The best OS for business servers will vary depending on a range of factors: budget, organization size, preferred applications, and more. Currently, Windows Server 2016 is a popular option that could offer your customers … [Read more...]

How to Prevent DNS Poisoning

DNS poisoning, also known as DNS spoofing, is one of the most common domain name system (DNS) attacks out there today. The attack is used by hackers looking to infiltrate enterprises of all sizes and gain access to sensitive data, including user login credentials, financial details, and email exchanges. Clearly, it’s crucial that managed services providers (MSPs) understand how this threat … [Read more...]

Creating a Well-Managed MSP 

One question we see asked a lot is what defines being a well-managed MSP (managed services provider)?  Read More … [Read more...]

Vulnerability Management Best Practices

<p>In 2018, network vulnerabilities accounted for<a href="https://www.prnewswire.com/news-releases/edgescan-release-the-2019-vuln…; 81% of all company security breaches</a>. On top of that, it takes on average up to 69 days to patch a critical web application vulnerability and 65 days to patch a similar vulnerability for an internal network. Read More … [Read more...]

An Overview of Subnet Classes

In order to effectively manage customer networks, it’s crucial that managed services providers (MSPs) have a firm grasp of internet protocols. You’ll need to understand how to subdivide a … [Read more...]

The Email Security Education Series: Dangerous Email Attachments 

<p><i></i><em>Please note: For privacy reasons the identity of the hacked account in the example used for this blog has been changed.&nbsp;</em></p> <p>As cybercriminals advance their techniques, you need to stay ahead of the game by taking proactive measures. In this blog, we look at dangerous email attachments and how you can identify them more … [Read more...]