What's new this week in the news for MSPs? Peculiar Linux malware targeting VoIP switches; universities under new ransomware attacks; SunCrypt ransomware hits University Hospital in NJ; Google Advanced Protection users now get scans for malicious files; and Equinix hit by NetWalker ransomware Let's see what it's all about. Continue reading
This checklists walks through the main steps and considerations you should cover as you build a new IT department from the ground up, including BDR, admin access to all systems, policies. documentation, budget. and much more. Continue reading
Download this ITIL Incident and Problem Management Checklist to get an example of ITIL guidance in the context of the Incident Management, Request for Change template, and Post Implementation Review template applicable for Problem Management life cycle.
Download this guide to automate repeatable IIS server related duties with PowerShell scripts and accomplish tasks faster and more efficiently. Continue reading
In this free guide, we offer tips and practices for keeping your networks clean and well-organized, including effective labeling practices (both at networks and termination points), determining appropriate sizing for your network, tips on standard network sizing, network cooling and heating practices, and more. Continue reading
Learn more about the essentials of business continuity for companies, including a definition and key concepts, difference between business continuity and disaster recovery planning, measurable metrics in business continuity, including RTO, RPO and cost of downtime.
Using PowerShell to remotely manage your servers is both fast and effective. Once you get everything set up, the rest will become second nature by running the various cmdlets that will be discussed in this guide. Continue reading
One of the primary tasks of any Office 365 administrator is managing user accounts, licenses, and groups. Sometimes it gets easier to perform these tasks in the Microsoft 365 admin center, but other tasks are much quicker and easier to do with PowerShell.
If you find that your Windows security components are suddenly turned off, that might be the first sign of a ransomware attack. On the other hand, these components could simply have been turned off by a user who wanted to stop annoying updates or antivirus messages. Even that, however, opens a gate for possible attack.
Once considered as a “fun gimmick” cloud database platforms have become massively popular in any production environment - whether SMB or enterprise. Amongst the reasons for their popularity are high accessibility and security, as well as dynamic flexibility. You don’t even have to worry about maintenance, hardware, patching, and scaling.
For the common Windows user or even some Windows administrators, Linux often seems like a scary, foreign beast. But it doesn’t have to be. It’s true that Linux does things differently from Windows in many respects, but once you start to wrap your mind around how Linux works, mastering it is much less difficult than you might think.