FEATURE ARTICLES

More Featured Editorial

GUEST CONTRIBUTORS

  • Understand The Language Of Cybersecurity
    Understand The Language Of Cybersecurity

    When you get started working around cybersecurity, it can sound like people are speaking a foreign language. Like most of the IT industry, cybersecurity has a language of its own. We’ve all become familiar with the basic security terms and aspects when we secure our personal data and information, but when you go deeper into the rabbit hole, the more technical things can get.

  • Why You Shouldn’t Share Security Risk
    Why You Shouldn’t Share Security Risk

    There are some things in life that would be unfathomable to share. Your toothbrush, for example. We need to adopt the same clear distinction with cybersecurity risk ownership as we do with our toothbrush. You value sharing as a good characteristic. However, even if you live with other people, everyone in your household still has their own toothbrush. It’s very clear which toothbrush is yours and which toothbrush is your partner’s/spouse’s or your children’s.

  • The Link Between GDPR And The Dark Web
    The Link Between GDPR And The Dark Web

    Designed to protect the data security and privacy of EU citizens, the GDPR was introduced as a replacement to the Data Protection Directive of 1995. As an overview, the regulations empower consumers with greater ownership over their personal information; highlights including the “right to be forgotten”, a fortified consent process, and more stringent breach notification protocol requirements. Aside from expanding the definition of “data processing” to include collection, retention, deletion, breaches, and disclosures of personal data, the penalties associated with infractions are no laughing matter. Since its implementation, multinational corporations have seen fines amounting to $23M. Or even worse, 4% of global revenue.

  • 6 Ways To Differentiate Your MSP

    Based on the IT Glue Global 2019 Benchmark Survey, increased competition and downward price pressure are two major issues currently faced by MSPs. When you think about it, these are to be expected in a rapidly growing market with relatively low barriers to entry. More service providers enter the market, and prospective clients compare their many options. Since the suite of services offered between MSPs are generally undifferentiated (commoditized), the most salient variable when choosing a service provider becomes price.

  • I Don’t Know Any of My Passwords, And That’s Awesome

    I don’t know any of my passwords. I’m okay with this. I don’t need to know them. I don’t want to know them. I don’t use the same password twenty times over, and I don’t have a little notebook with passwords in it sitting in my desk drawer, either. I just don’t know any of my passwords.

More From Guest Contributors

MSP WHITE PAPERS

  • Hook, Line, and Sinker: Why Phishing Attacks Work

    When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

  • 3 Tips To Selling DNS For MSPs

    Threats are everywhere, and endpoint security simply isn’t enough to keep your clients safe. Pairing domain name system (DNS) protection with endpoint security is a proactive way to prevent costly network attacks. Most clients, however, don’t understand the need for this added layer of security.

  • Size Does Matter: Small Businesses And Cybersecurity

    Small businesses are part of the UK’s economic lifeblood. SMBs account for at least 99.5% of businesses in every main industry sector and we need to support and protect them in this challenging climate. Technology is key to helping small businesses grow, reach new customers and thrive. But digital technologies can present challenges and difficulties for any business, the top one is cybersecurity issues.

More MSP White Papers

FEATURED SUPPLIERS

  • Taylor Business Group
    Taylor Business Group

    Taylor Business Group is an executive coaching and peer group firm that focuses on IT Solution Providers and Copier Dealers. Founded in 2001, Taylor has brought efficiencies and higher profits to IT Solution Providers through a focused effort in delivering best practices to the Service Provider and Copier Dealer's service, sales and administrative functions.

  • Webroot
    Webroot

    Webroot delivers intelligent cybersecurity for endpoint, mobile and web to channel partners, consumers, businesses, and enterprises worldwide. Powered by its BrightCloud® collective threat intelligence network, Webroot protects the internet of everything. Our cloud-based threat detection, high performance, lightweight agents, and single, web-based point of control have changed the way businesses think about protecting mobile devices, PCs and servers. Named a ‘Visionary’ in Gartner’s Magic Quadrant for Endpoint Protection Platforms, Webroot’s smarter approach to security is why companies including Cisco, F5 Networks, GateProtect, HP, Microsoft, Palo Alto Networks, Proofpoint, RSA and others choose our solutions for advanced threat protection for their security products and services.

  • SherWeb
    SherWeb

    SherWeb has been helping businesses around the world work smarter in the cloud since 1998. Our cloud solutions help companies be more agile in today’s competitive market and trim IT costs.

  • Shift4 Payments
    Shift4 Payments

    Shif4 Payments is a leading national provider of touch-screen point of sale (POS) systems and payment processing services. As pioneers of the "as a service" model, Shif4 Payments offers an unprecedented "free" POS program that allows the company's sales partners to offer a full-featured POS system with no up-front costs.

  • Kaseya
    Kaseya

    Whether you are part of an IT organization at a mid-sized company, continually asked to do more with existing budget, or part of a Managed Service Provider (MSP) business looking for new revenue streams and new ways to increase profit margins, our mission is to help you simplify IT management.

  • ConnectWise
    ConnectWise
    ConnectWise is the leading business management solution designed exclusively for technology organizations, such as IT solution providers, MSPs, software companies, hardware/software resellers, and System Integrators.  

     

View All Featured Suppliers

MSP INSIGHTS CONTENT COLLECTIONS

MSPi_ManagedITCyberSecurityEbook_300x200

 

What’s the right approach for your MSP in this hyper-security-aware business environment? Learn more about why MSPs are the newest targets of ransomware, how to build your security stack, how to price and package MSP security services and more in this free collection of articles.

More Content Collections

CHANNEL EXECUTIVE DIGITAL MAGAZINE

Channel Executive magazine Digital Edition

MSP INDUSTRY INSIGHTS

  • 6 Keys To Succeeding In Managed Services
    6 Keys To Succeeding In Managed Services

    In order to thrive in today’s business environment, IT solutions providers must deliver the best possible service to their clients. To build a successful MSP business, you need to create a systematic plan that outlines specific steps ranging from understanding your target market to implementing essential automation.

  • The Clarity Security Vendor Report
    The Clarity Security Vendor Report

    The Channel Futures MSP 501 is the most comprehensive, independent Managed Services Provider (MSP) survey conducted annually. Only the top 501 applicants make the list, based off the data gathered through submitting survey questions and certified accounting information through a financial professional or QuickBooks. MSPs from around the globe are motivated to respond to the survey for their chance to be on the MSP 501 list as it is seen as the best mechanism to benchmark their organizational progress against other leading providers with real numbers. 

  • The Wipro Breach: A Demonstration Of Third-Party And Supply Chain Risk
    The Wipro Breach: A Demonstration Of Third-Party And Supply Chain Risk

    Advanced phishing and supply chain vulnerabilities - these seem to be the successful attack vectors that hackers have used to compromise Wipro, an Indian multinational corporation that provides information technology, consulting and business process services. Notable security researcher, Brian Krebs, reports confirmation that a nation-state actor had been inside the company’s systems for months, identifying opportunities to attack its vast customer base – currently, at least a dozen of the firm’s clients have been targeted as a direct result of this breach. Additional sources have claimed that Wipro’s corporate e-mail system had also been compromised for some time, forcing the company to build out a new private system.

  • You’ve Been Breached: Now What?
    You’ve Been Breached: Now What?

    It can happen to anyone – you’ve taken steps to limit your exposure to a cyber incident. You’ve purchased and implemented top-of-the-line IT solutions. You’ve carefully thought about security best practices and strived to adhere to them. But somehow, you’ve just become the latest victim of a data breach. It might have been discretely packaged ransomware hidden in a seemingly innocent application file. Perhaps it was the result of poor password management. Maybe your employees were duped by a convincing phishing e-mail. But at this point, the only question racing through your mind is, “What do I do next?”

  • Skills For Successfully Implementing Smart Cities Solutions
    Skills For Successfully Implementing Smart Cities Solutions

    CompTIA's Smart Cities Advisory Council has identified these 4 critical skills needed for successfully implementing smart cities solutions. Check out this inforgraphic to discover these critical skills along with other hard skills, soft skills, and management skills.

More Industry Insights