Ransomware is one of the most dangerous and disruptive types of cyber threats we face today. Not only is it disruptive and costly for businesses, but it also causes massive disruption to the backbone of society. Here’s what happens and how to prevent ransomware in Microsoft 365 cloud.
How to Test Your Backups: A Comprehensive Guide
Some believe that backups are a routine that should be set and forgot about. Such people also believe that ransomware attacks, downtime caused by hardware failures, and human mistakes that lead to data loss are things that happen to people in the news, or topic starters on Reddit – in other words, to someone else. Continue reading
3 Ways to Acquire Your First Three Customers
When you’re starting from scratch, building your customer base takes time. No matter what industry you’re in, a solid customer base doesn’t happen overnight. Continue reading
Types of Malware Attacks MSPs Should Protect Clients From
As MSPs continue to upscale their clients’ cybersecurity resources, cybercriminals are seemingly not taking it lying down. They are, instead, increasingly responding with more sophisticated types of malware attacks. Continue reading
Threat and Vulnerability Management for MSPs
Security threats come in a dizzying area of shapes and sizes. They range from malware, to improperly configured IAM policies, to malicious insiders and beyond.
How can you identify and remediate so many different types of threats? The answer is threat and vulnerability management. Here’s a primer on how threat and vulnerability management works, and why you may wish to add it to the list of managed services that you offer as an MSP. Continue reading
MSP360 Connect 2.5 (Formerly Remote Desktop): Major Security Update
We are excited to announce the release of version 2.5 of MSP360 Connect (Formerly Remote Desktop), with awesome new security enhancements and features, performance and usability improvements.
Continue reading
You’re Not the Only MSP Owner with These Three Fears
It doesn’t matter who you are or how successful you may be, nobody is completely fearless in business. While you may be able to manage your fears more successfully than others (and thriving small-business owners do), we all have them; however, what’s important for you as a small-business owner is that you’re able to recognize that and learn how to not only identify your fears but face them. Continue reading
MSP360 Backup 7.1 with GFS Retention Policy
We are happy to announce that MSP360 Backup 7.1 is now available. With this release, we introduce the Grandfather-Father-Son retention policy that allows you to set up additional backup retention rules to avoid loss of vital data.
Continue reading
3 Steps to Choosing a Cloud Storage Provider
There is no cloud storage solution that fits all the needs of your company. No solution is built to store data backups and be used as a file-sharing and collaboration service at the same time. Sure, you might try using Microsoft OneDrive or Dropbox for Business for backups, or set up AWS Amazon S3 for file sharing but, in most cases, that would end up as an inefficient, expensive and insecure solution. In this article, we will define how you should choose a cloud storage provider, based on your unique needs. Continue reading
IT Security FAQ: Everything You Should Know
Although cyber-attacks are rapidly growing in volume and sophistication, the fact of the matter is that organizations are still struggling to fight back. Continue reading
News You Might’ve Missed. 26 – 29 Apr
What's new this week in the news for MSPs? Google launches new cybersecurity features for Google Cloud and Workspace; Washington, DC Police Department ransomware attack; and Prometei botnet leveraged by hackers in Microsoft Exchange exploits. Continue reading
News You Might’ve Missed. 19 – 22 Apr
What's new this week in the news for MSPs? REvil ransomware allegedly strikes Quanta Computer, takes blueprints for Apple; hacking campaign against Pulse Secure VPN devices breaches government agencies; Qlocker ransomware attack leverages 7-Zip to encrypt QNAP devices; and Codecov supply-chain attack hacks hundreds of networks, according to reports. Continue reading