Ransomware is one of the most dangerous and disruptive types of cyber threats we face today. Not only is it disruptive and costly for businesses, but it also causes massive disruption to the backbone of society. Here’s what happens and how to prevent ransomware in Microsoft 365 cloud.
MSP Voice Episode 48 – “Talking YouTube” with Tom Lawrence
This is our 1 year anniversary week for the MSP Voice podcast!
And this week I was thrilled to have Tom Lawrence back on the podcast. Tom was our first guest and also our most popular. We calculated our top 10 episodes/guests for the first year and Tom came out on top!
Securing Your Office 365 Tenants. Part 1
In the last article, we went over addressing a compromised account, taking the response actions to ensure the account is safe and back under the end user’s control.
Now, as a follow up to the previous article, we will review the actions needed to properly secure an Office 365 tenant. These steps are geared towards MSPs who manage multiple Office 365 tenants and require some level of automation to configure Office 365 tenants in bulk. Continue reading
Meet CloudBerry at ASCII Summit Charlotte
We are excited to be a sponsor and part of the vendor lineup at the ASCII IT Success Summit in Charlotte, May 15-16. Meet David Gugick (VP Product Management) and Doug Hazelman (VP Technical Marketing, MSP Voice host) who will be representing CloudBerry at the event. Continue reading
MSP Voice Episode 47 – “Is Anybody a True MSP?” with Craig Pollack
Craig runs an MSP in the Los Angeles area and has been in business for 28 years. When they started out, FPA did Accounting systems, custom programming, and infrastructure support, now they basically just do infrastructure support (MSP). While FPA now has 25 staff members, Craig still does a majority of the sales and marketing. Continue reading
Introducing MSP360 Backup 2.9 for macOS & Linux
We are proud to announce MSP360 Backup 2.9 for macOS & Linux, the latest version of our product. Version 2.9 introduces a number of important features and enhancements. Learn more below.
Continue reading
How To Detect and Defend Against Triton Malware
Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new.
These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. Continue reading
MSP Voice Episode 46 – “Preparing for Disaster“ with Arismonty Beat
Arismonty “Monty” is in the Dominican Republic and has built a business by just focusing on a few core services instead of trying to offer everything. With natural disasters like hurricanes and earthquakes, data protection and continuity services are their main offering. Eridani focuses on building trust with their clients and that is paying off in referrals. Continue reading
MSP Voice Episode 45 – “It’s not 9 to 5” with Jorge Prieto
This week we have Jorge Prieto out of Texas. Jorge has been in services for 14 years and joined forces with his friend about 3 years ago and business has been great. Like most, Jorge started out with break-fix but now almost all of his clients are on a monthly contract. Continue reading
Clone Phishing Explained
Attempts to infiltrate malware onto computers systems typically come from one of two sources: email and web sites. The most effective often use both. Phishes are one type of email used to attempt to get users to click on a link that will either get them to install malware or enter user credentials that can be used to infiltrate a real website. Continue reading
MSP Voice Episode 44 – “Securing Albuquerque” with Joshua Liberman
Heading out to California to work in the oil and gas industry, Joshua found himself jobless after an explosion in the refinery he was supposed to be working at. While doing odd jobs and temp work, he stumbled onto an opportunity setting up a PC for the temp agency. Working inside appealed to Joshua so he spent the rest of the summer doing PC setups. Continue reading
Why Cloud-Based Storage Is Better Than Traditional Storage
It’s never been more important to back up business data.
Data breaches are happening every day, and there aren’t any signs of attacks slowing down anytime soon.
Even though there are numerous ways to back up data, using cloud-based storage is becoming increasingly popular among businesses. Continue reading