Newsletter | October 17, 2019

10.17.19 -- Security-As-A-Service: Where Do I Start?

Channel Insights
How To Streamline Operations By Consolidating Your Vendors
Article | Field Nation

Cutting out unnecessary steps and streamlining your workflow can save you time and money. If you’re using multiple staffing companies and service vendors to manage your onsite contingent labor, you could be slowing down your ability to scale efficiently. Here are four things to consider when consolidating multiple vendors down to a single staffing platform and how one of our clients found success in the process.

Today’s Smart Home Technologies And Turning Them Into Profits
Video | The ASCII Group

Learn about the latest trends and products for smart homes and how to successfully turn them into profit. You’ll also see various sales opportunities and how to market them.

Using Documentation To Nail Your QBRs
Article | By Ashley Ogilvie, IT Glue

Documentation is a critical but often overlooked source of competitive advantage. When you have good documentation practices in place, that means you’ve documented the ins and outs of your clients’ organizations, and you have all the proof of your processes. So, when it comes time to sit down with your clients for the quarterly business review (QBR), your documentation has everything you need in order to deliver productive, transparent, and insightful conversations that strengthen your customer relationships.

The Wipro Breach: A Demonstration Of Third-Party And Supply Chain Risk
Article | ID Agent

Advanced phishing and supply chain vulnerabilities—these seem to be the successful attack vectors that hackers have used to compromise Wipro, an Indian multinational corporation that provides information technology, consulting, and business process services. Notable security researcher, Brian Krebs, reports confirmation that a nation-state actor had been inside the company’s systems for months, identifying opportunities to attack its vast customer base; currently, at least a dozen of the firm’s clients have been targeted as a direct result of this breach. Additional sources have claimed that Wipro’s corporate email system had also been compromised for some time, forcing the company to build out a new private system.

Security-As-A-Service: Where Do I Start?
Article | A discussion with David Barton, Stellar Cyber
Every managed services provider seems to be focusing on security these days. For an MSP adding security services, or an MSSP looking to target a new market segment, here are the common questions I frequently get when I meet with services providers.
Featured Editorial
Managing Hybrid Database Environments Is Key For MSPs
Guest Column | By Nick Harshbarger, SentryOne

One of the predominant business decisions in technology today is not if a database workload will go to the cloud—but when. That timing is likely a moving target in most environments. Workloads will move to and from the cloud for many reasons—some good, and some not so favorable.

The End-User Help Desk In IT Services
Guest Column | By Jeff Connolly, TSIA

VARs and MSPs are often asked to support end users as part of their service portfolio, but delivering this function is sometimes a challenge for organizations without existing or scalable end-user support capabilities. Some providers embrace this function, while others shy away. What should you be considering when adding this capability to your portfolio?

Spotlight On MSP Client Success: Mission
Guest Column

In this SPOTLIGHT ON CLIENT SUCCESS, Mission’s chief operating officer for service delivery, Phaedra Divras, shares how her company is driving the success of its clients.