Change layout
Follow the Data to Build Your MSP Strategy

Follow the Data to Build Your MSP Strategy

Follow the Data to Build Your MSP Strategy

It was not that long ago that a thought leader had to earn their reputation. These days, just about anyone can set themselves up as a thought leader and share their opinions on a global platform.

They need not have experience or expertise. They just require the ability to market themselves effectively to a wide audience. This helps to seal their reputation and reach “influencer” status. Continue reading

News You Might've Missed

News You Might’ve Missed. 13-17 July

News You Might’ve Missed. 13-17 July

What’s new this week in the news for MSPs? Google launches data analyzer BigQuery Omni; Assured Workloads for Government by Google Started; Confidential VMs Available from Google; GoldenHelper malware in official Chinese tax software; AgeLocker ransomware discovered to use Google encryption tool; and Collabera hit in Maze ransomware attack.

Continue reading

Don’t miss new articles!
Thank you for subscribing!
ITSM for MSPs: Guide to IT Service Management

ITSM for MSPs: Guide to IT Service Management

ITSM for MSPs: Guide to IT Service Management

IT service management, or ITSM for short, is a strategic approach to optimizing and improving IT service company strategy, goals, objectives, and processes to maximize the quality of the service provided to the customer. This approach is popular among managed service providers who target bigger clients with more advanced IT needs and demands, or those whose aim is to build a flawless and streamlined service.

Continue reading

News You Might've Missed

News You Might’ve Missed. 6 – 10 July

News You Might’ve Missed. 6 – 10 July

What’s new this week in the news for MSPs?

Amazon launches AWS Outposts support for its Relational Database Service; ransomware used by hackers to attack and threaten victims for GDPR breaches is targeting MongoDB users; MSP Xchanging suffers ransomware attack; Office 365 users hit by phishing attacks through OAuth apps; and more. Let’s see what it’s all about.

Continue reading

Load more