FEATURE ARTICLES

GUEST CONTRIBUTORS

  • Myth Buster: Data Fatigue Is Not Real!

    The noise is real. Of that, we can agree. It started way back in history – whoops, wrong topic (shout out to all of you who know that lyric). Basic packet captures – the final arbiter of proof, started all this and has continued nonstop until this very day. Every security analyst worth his/her salt asks for the packet captures. Why do we have all this data? Do we need it all? With IOT today, my toaster can tell me how many toast points I have burned since 2019. Do we care? Should we care? To be honest, I’m not sure I want folks to know I struggle getting my toast just right :).

  • MSP Industry Trends To Watch For In 2020

    Yes, it’s another one of these forward-looking new year posts. But we’re extremely confident ours will prove to be more accurate than the rest. In 2019 there were 3 notable trends that give indication of what can be expected in the coming year.

  • 12 Things To Cover In Your Managed Services Agreements

    Have you ever opened up a product with ‘some assembly required’ that failed to include instructions (or included them, but only in a language you don’t understand)? So frustrating. Sadly, many clients feel the same way about their managed services agreements.

  • 5 Reasons Why Risk Assessments Should Be A Consistent Part Of Your Operational Strategy

    As your business evolves, the factors that pose security risks are everchanging—which means your defense strategy can rapidly become outdated and ineffective. Risk assessments provide a snapshot of the internal and external factors that threaten your business—and your customers—at a given point in time. Since risk factors are volatile, managed service providers (MSPs) need to perform security risk assessments on a regular basis to stay on top of threats as they emerge or evolve.

  • The Math Behind Successful As-A-Service: Understanding And Calculating Churn

    Sometimes referred to as attrition or turnover, churn is your number of customers at the beginning of a period minus your number of customers at the end. It calculates the overall difference but excludes any new sales over that period. Customer churn can include cancellations, non-renewals, or customers switching to another provider.

MSP WHITE PAPERS

  • Resellers Beware: Hackers Are Using You To Get To Your Clients

    According to a February 2018 White House Report — The Cost of Malicious Cyber Activity to the U.S. Economy — cyberattacks cost U.S. businesses as much as $109 billion in 2016. A 2017 Ponemon survey found a typical firm experiences 130 security breaches each year. Because of this, business owners are turning to resellers to provide cybersecurity protection from hardware using point to point encryption (P2PE) to security services such as Tokenization. Resellers are becoming the first defense against distributed denial-of-service (DDoS) attacks, phishing and spear-phishing attacks, and password and malware attacks.

  • Top 20 Best Tech Cities For IT Jobs

    The CompTIA Tech Town Index illustrates that IT pros are in demand and have nearly endless options when choosing where to live and work. With overall cost of living an essential to 82% of tech workers, and nearly two-thirds citing weather and commute times as important factors as well, the good news is that tech workers have the opportunity to write their own stories.

  • Automating Backup: Opportunities & Best Practices

    You already know that backing up your organization’s data isn’t a nice-to-have, it’s a need-to-have. The external threats alone warrant this. You could be one of the 50% of all organizations operating a data center that can’t withstand, or is unable to operate after, a natural disaster. Or, you could be one of the 39% of global organizations that experienced a ransomware attack in recent months.

FEATURED SUPPLIERS

  • Webroot

    Webroot delivers intelligent cybersecurity for endpoint, mobile and web to channel partners, consumers, businesses, and enterprises worldwide. Powered by its BrightCloud® collective threat intelligence network, Webroot protects the internet of everything. Our cloud-based threat detection, high performance, lightweight agents, and single, web-based point of control have changed the way businesses think about protecting mobile devices, PCs and servers. Named a ‘Visionary’ in Gartner’s Magic Quadrant for Endpoint Protection Platforms, Webroot’s smarter approach to security is why companies including Cisco, F5 Networks, GateProtect, HP, Microsoft, Palo Alto Networks, Proofpoint, RSA and others choose our solutions for advanced threat protection for their security products and services.

  • CompTIA

    CompTIA is the voice of the world's information technology (IT) industry.

  • Taylor Business Group

    Taylor Business Group is an executive coaching and peer group firm that focuses on IT Solution Providers and Copier Dealers. Founded in 2001, Taylor has brought efficiencies and higher profits to IT Solution Providers through a focused effort in delivering best practices to the Service Provider and Copier Dealer's service, sales and administrative functions.

  • Stellar Cyber

    Stellar Cyber’s Starlight is the world’s first open detection/response (Open-XDR) platform, connecting the dots throughout the entire security infrastructure and automatically responding to attacks wherever they occur. Starlight integrates dozens of security applications from an App Store and presents results in an intuitive dashboard to supercharge analyst productivity.

  • ConnectWise

    ConnectWise empowers technology service providers and IT professionals across the world to grow personally and professionally. With our award-winning software suite, a best-in-breed platform of third-party solutions, and the world’s largest community of IT professionals, ConnectWise enables businesses and users to succeed today, and tomorrow. Over 37 years, ConnectWise has grown from a technology service provider to the longest-running market leader in technology and IT software solutions. We’ve been where our partners are and know what’s necessary to be a successful technology service provider.

  • Field Nation

    Field Nation brings companies and service professionals together to do great work. By connecting technicians to organizations in one easy-to-use platform and mobile app, Field Nation solves a critical challenge all service leaders worry about: accessing skilled labor. Unlike traditional job boards and labor platforms, Field Nation is built specifically for quick-turn, onsite service work. Businesses can build their flexible workforce for any skill, scout potential workers in every postal code, and organize go-to service crews fast. Tech professionals can search for work that fits their schedule, build their reputation and get paid within days of project completion. Our mission is to match every contractor with the right job, and connect every service team to professionals who care as much about the work as they do.

MSP INSIGHTS CONTENT COLLECTIONS

20_01_MSP_SecurityEbook_300x200

 

Security is one of the best ways for an MSP to make money and will continue to be so for the foreseeable future. Unfortunately, selling security isn’t simple as it requires you to convince clients they are, in fact, a hacker’s target. Have no fear, MSP Insights has compiled an E-book to help you overcome these challenges. The guide is authored by your fellow MSPs and we're sure it will help you take advantage of the financial boom selling security is.

More Content Collections

CHANNEL EXECUTIVE DIGITAL MAGAZINE

Channel Executive magazine Digital Edition

MSP INDUSTRY INSIGHTS

  • Lockdown Lessons 3: Closing Security Gaps

    We can all agree: it’s the nature of technology to advance. Cybercrime is no exception to this rule, and neither are the tools we use to stop attacks. But you’d be surprised how much a business can accomplish in terms of their own security simply by keeping existing systems up to date and using technology to their best advantage. For instance, just staying on top of patches and disabling unnecessary services that may be on by default can go a long way toward closing security gaps.

  • Do You Need Certification To Be An MSSP?

    There’s no blanket diploma program or global agency regulating who is and isn’t an MSSP. What may be a shocking disadvantage to the consumer when it comes to vetting service providers, is a definite benefit to those looking to capitalize on this growing opportunity. If you’re looking to designate yourself as an MSSP, the barrier for entry is at the floor.

  • Lockdown Lessons 2: Shoring Up Your Network

    Ultimately, every business wants to do what they can to best serve their clients and customers. They also want to grow successfully, increase profits, and create lasting relationships for long-term recurring revenue. But in today’s cyber- climate, if you don’t have a good security setup, the chances you’ll get breached get higher every day. That means all the customers who trust you will have their confidence shaken—no matter how good your products or services are.

  • Times Have Changed And We All Need To Start Thinking About Security And Compliance

    Many companies diligently pursue achieving compliance and believe that their information systems are secure. Unfortunately, this isn’t usually the case. Just making certain that compliance initiatives are in place does not guarantee an optimum security posture. The face and tactics of cybercriminals evolve daily creating an environment requiring continuous monitoring. A safe assumption is… cybercriminals will breach every company, and the question is “how quickly can you stop it?”.

  • Lockdown Lessons 1: Securing Your Business

    When you consider modern attacks, it’s pretty obvious that all businesses—managed service providers (MSPs), small- to medium- sized businesses (SMBs), etc.—need a strong lineup of cyber-defense tools, not just a barebones firewall and old-fashioned antivirus. You need to protect your business first, and to do that, you have to build out a strong cybersecurity stack that can actually withstand the onslaught of modern malware.