Ransomware is one of the most dangerous and disruptive types of cyber threats we face today. Not only is it disruptive and costly for businesses, but it also causes massive disruption to the backbone of society. Here’s what happens and how to prevent ransomware in Microsoft 365 cloud.
MSP Voice Episode 52 – “Diversity in Hiring” with Dawn Sizer
Dawn owns and runs 3rd Element Consulting in central Pennsylvania and she’s expecting some big growth this year. Some of the verticals they focus on are law enforcement and legal. Having spent time in the male-dominated tech industry, Dawn decided that it was time for her to start her own company almost 14 years ago. Continue reading
MSP Infographics: the Main Managed IT Service Business Insights
Recently we have performed a survey across MSP360 customers offering managed IT services to their clients to understand the current MSP market situation and essential needs better. More than 180 MSPs attended the survey and expressed their thoughts on the most vital aspects of the managed services market. And we are glad to present the result of this survey below as the infographics. We hope you will find it helpful. Continue reading
The vCIO Process: What MSPs Should Know
Not every business is large enough to have its own CIO, so instead of employing someone, an MSP or a contractor is oftentimes hired to fill the role. While MSPs are properly trained in the services and offerings they provide, they aren’t always well equipped to tackle the business challenges CIOs face daily. By understanding how CIOs transform businesses, managed services providers can improve how they manage technical environments and deliver business results effectively as vCIOs. Continue reading
MSP Voice Episode 51 – “If You Don’t Ask, You Don’t Get“
Corey runs 5K Technical Services out of Plano, TX. 5K specializes in engineering/architecture firms but also does work with local non-profits. Having spent time working for some big tech companies, Corey decided it was time to branch out on his own and start up 5K. While Corey started his career on the technical side, he eventually chose to focus more on the management (non-technical) as his career progressed. Continue reading
How to Prevent Spear Phishing Attacks
Spear phishing prevention strategies are essential against attacks, which are executed through the use of electronic or email communications. Targeted phishing may impact an individual, corporation, or business, depending upon the objectives and intentions of its perpetrators. Cybercriminals may launch spear-phishing attacks for the following reasons: Continue reading
NAS Backup Strategy: Local, Cloud and Hybrid Backup
Unlike typical external hard drives, NAS devices provide built-in operating systems that support features like remote access, printer streaming, or native media streaming. Additionally, you can save images, server data, application databases, and so forth without any supplementary management device. Continue reading
Meet Up with CloudBerry at the IT Nation Explore
Join us at the IT Nation Explore 2019! The conference runs from the 13th to the 15th of June and is one of the largest MSP events of the year. Continue reading
QNAP Cloud Backup: Best Practices, Software to Use
A QNAP NAS is a great way to keep data safe and available. But the fact is that even if you have data redundancy built into the NAS, it’s still important to perform QNAP cloud backups as well to back up your NAS data to a remote location. Not only does backing up QNAP data to the cloud help you to meet the requirements of the 3-2-1 backup rule, but it may also be required by compliance regulations. Continue reading
MSP Voice Episode 50 – “Carve Out Your Space” with Hank Holbrook
Most MSPs on the show offer a range of IT services to small businesses in a particular geographic area, Bluesky Technology is a bit different, they offer one service nationwide. Hank tells me about how focusing on just the one service has helped Bluesky be successful. Continue reading
How to Activate MSP360 Products Offline via a Command Line Interface
In case that you don’t have the opportunity to activate your copy of MSP360 Explorer, MSP360 Backup, or MSP360 Drive online, you can use the offline activation.
Offline activation can be done via the command-line interface of the product, as well as via a graphical interface (check out this article for instructions). Continue reading
Social Engineering Prevention
When you think of a modern-day hacker, chances are you picture a shady character camped out behind a sea of monitors, working all day and night to infiltrate networks and systems through fancy coding and password cracking.