Traditionally, MSPs have leveraged commodity solution types that include antivirus, endpoint protection, as well as endpoint detection and response. But a new method of protection has entered the market that is worth discussing as a viable – and more effective – replacement to protect endpoints: Deep Learning. Discover the benefits of adopting the deep learning technology to protect your endpoints. Continue reading
Working from Home: How to Prepare Your MSP Business and Customers
COVID-19 is upon us. As an MSP, you are likely to find that many of your customers are working from home. Many of your employees may be doing the same. Explore tips for keeping both your own MSP business and your clients' businesses operating smoothly during the mass transition to remote work. Continue reading
Amazon S3 vs Microsoft Azure vs Google Cloud Storage
Cloud storage market is well saturated. Though, the choice is typically spread between the 3 of the biggest cloud-services companies in the world - Amazon Web Services, Microsoft Azure and Google Cloud.
MSP’s Standard Operating Procedures Bundle
Details and specifics are too important for you to just wing it, especially when you’re dealing with long lists of configurations, server names, and other easily-forgotten information. That is the reason why SOPs are so popular and well-supported in the MSP community.
MSP’s Educational Posters on Password Security
Building security awareness can be as complicated as it is rewarding. End-users are the most targeted resource within a company, but they are also the first line of defense. Often, employee security awareness can be the difference between a failed attack attempt and a security breach.
Managing Office 365 Users, Licenses and Groups Using PowerShell
One of the primary tasks of any Office 365 administrator is managing user accounts, licenses, and groups. Sometimes it gets easier to perform these tasks in the Microsoft 365 admin center, but other tasks are much quicker and easier to do with PowerShell.
Steps for Keeping Backup Data Safe From Ransomware
Backing up data regularly is one of the most important things you can do to protect against a ransomware attack. With backups, you have a “clean” copy of your data that you can use to restore operations in the event that ransomware takes control of production systems.
Network Admin Handbook: Basics, Subnets, IPs, Hardware, and Security
A network is a lot like a community. Both a network and a community are made up of hosts. In a community, we’re talking about homes and other buildings; in a network, it’s PCs, servers, and other devices. The roads that deliver traffic between these hosts in the network world are generally Ethernet, although they may include other types of cables.
The 10 Backup Mistakes MSPs Make
By the very nature of the potential disruptions that require backups, the business of backups is anything but predictable – you’re creating backups because you don’t know which system will crash, which data will be accidentally deleted, or which location will lose power. And it’s this unpredictability that causes MSPs to make mistakes that inevitably cause problems, whether during backup itself or during recovery.
Ransomware Awareness Poster Pack
According to 85% of the MSPs surveyed* in 2019, ransomware is one of the most predominant types of malware attacks for small to medium-sized businesses. Also, MSPs further noted that their clients continue to fall victim to ransomware attacks even when they install endpoint detection, pop-up blockers, email filters, plus antivirus software.
Essential Guide to Backup for MSPs
Data losses can happen at any time. The only way to protect your customers’ sensitive data fully is to provide them with comprehensive backup and recovery plans. In this guide, we offer tips and best practices to help MSPs decide where to store backup data and how to tailor backup plans to different types of systems.
PowerShell Remote Alerts for Firewall, Defender and Antivirus
If you find that your Windows security components are suddenly turned off, that might be the first sign of a ransomware attack. On the other hand, these components could simply have been turned off by a user who wanted to stop annoying updates or antivirus messages. Even that, however, opens a gate for possible attack.