We’re excited to announce that image-based backup is now available in our free backup software! Continue reading
4 Reasons Not to Use Linux as an MSP
In certain cases, Linux offers great advantages to MSPs who need an operating system to run on their own systems, or to provision servers and workstations for their clients. Most Linux distributions are free of cost. There is also a variety of free applications available to run on them. You don’t need to worry about managing licenses. Linux, in general, is not susceptible to most of the malware that can affect Windows. Continue reading
3-2-1 Backup: What It Means and How to Achieve It
What does 3-2-1 backup mean, and what is the best way to achieve it? Keep reading for a 3-2-1 backup rule overview and best practices for implementing 3-2-1 backup in an easy and cost-effective way.
Pre-Signed URLs Use-Cases
Amazon S3 buckets protection is a critical security measure when using AWS. There have been numerous bad stories about unprotected S3 buckets, from established contractors like Accenture and Booz Allen Hamilton to huge companies like Verizon Wireless and Time Warner Cable. In this article, you will learn how to enhance the security of S3 buckets with pre-signed S3 URLs, and how to generate them for various cases.
Continue reading
News You Might’ve Missed. 23 – 27 Nov
What's new this week in the news for MSPs? AWS Cloud Kinesis Data Stream outage fixed; Amazon starts fully managed Apache Airflow; FBI warning on Ragnar Locker activity; data stolen in a cyberattack against Belden; and TrickBot 100 “debuts” with new features. Continue reading
Vendor Management Guide for MSPs
Behind every great MSP is a lineup of strong vendors to support them.
Just as vendors rely on MSPs to deliver their products to customers, an MSP also relies on the vendor to deliver equipment and technology, as well as support them with financing and other resources. Continue reading
Is the Pay-as-You-Go Model a Viable Option for MSPs?
When it comes to making big IT and services purchases, not every client may want to buy the same way.
This is especially true for MSPs, as small businesses often make up a significant portion of their clientele. A small business with a tight budget might not be able to afford a full-service managed service offering or maybe such a small business that the owners don’t feel like they need that level of support. Continue reading
IAM vs PAM vs PIM: Guide to Access Management
With the rise in the number of solutions and applications that organizations are using, corporate access management becomes a critical layer of protection and should be treated accordingly. However, access management is not a cloud-only concept. It directly affects most of the IT assets in the organization, starting with desktop log-ins and up to physical access to the server lockers. So, to provide maximum possible security in the organization, you should embed a centralized access management policy. Continue reading
News You Might’ve Missed. 16 – 20 Nov
What's new this week in the news for MSPs? Amazon announces AWS network firewall to block cloud threats; new serverless Database Migration Service from Google; Google launches Cloud Armor Adaptive Protection to prevent DDoS attacks; Egregor ransomware new trick besieges victims' printers with ransom notes; REvil ransomware attacks hosting provider Managed.com; and new Jupyter trojan malware steals usernames and passwords. Continue reading
MSP360 VM Backup: Host-Level vs. Guest-Level Approaches
When it comes to protecting your virtual environment, the main question that you face is which approach to choose. Depending on your virtual environment, MSP360 Backup offers two possible ways you can choose from: guest-level or host-level backup. Continue reading
The Importance of Patching While Working Remotely
Remote work environments have exclusively changed how organizations approach cybersecurity. This has fashioned a new tact where there is a greater need for patching and a renewed urgency to educate employees on the critical importance of patching and better security hygiene. Continue reading
Application Rationalization Guide and a Framework
In a small organization, it's easy to track and manage the usage of applications. However, over time, more internal departments appear, more people start to communicate with each other, and operations become more interconnected and complex. All that needs more complex solutions, more licenses, and more apps, all of which means more IT management. Continue reading