Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

"I love it when a plan comes together"-the questions to ask your customers before the next software vulnerability

I’m probably dating myself, but I used to love the television show The A-Team when I was little. Every week, the team would be put into the middle of a problem and work together to overcome some challenge. Plus, they had Mr. T and a really cool van.

15 tips on how to market effectively when you're an MSP of one, part 1

With the end of another year, and a bright, shiny new year just ahead, many businesses take stock to reflect on their accomplishments and what they still need to do. In this vein, I have been getting quite a few questions lately about marketing and lead generation—specifically, how to conduct marketing when the MSP is small, without a lot of time or money to devote to such an initiative.

Business continuity after a ransomware attack: the case for end-to-end encryption

Imagine the scenario: you get an urgent call from one of your customers. All her files seem to be corrupted. And then there’s that email demanding payment via Bitcoin for restoration. She needs your immediate help to get her business up and running. Later on, she’ll demand to know how you let her business be vulnerable to this attack. You had installed firewalls, required strong passwords, and conducted email phishing drills—and still your customer was attacked.

What Is Credential Stuffing and How Do You Prevent It?

In their effort to protect their customers from a range of modern threats, managed services providers (MSPs) may encounter a strategy known as credential stuffing. This hacking technique involves rapidly inserting large numbers of usernames and passwords—often collected from corporate data breaches—into the login fields of other sites and digital services.

Why should you audit privileged access management?

To pull off a data breach, today’s cybercriminals have some formidable tools at their disposal. They can use software to guess simple passwords. They may infect a system with ransomware, only returning stolen information when they’re received payment. They might choose to deploy a social engineering attack and gain access to a network through human error.

Mail Assure achieves top result in Virus Bulletin testing

We’re pleased to announce that N-able™ Mail Assure has received a top result in an independent test conducted by the Virus Bulletin, an industry-renowned test laboratory and an important reference for specialists and businesses concerned with computer security. So, what exactly is this test and how did Mail Assure achieve such a great score?

What does a mature MSP actually look like?

We talk a lot about MSP maturity, but I wanted to take the opportunity in this blog to really consider what that maturity actually looks like. For starters, I believe there are three key areas of excellence that currently define maturity in an MSP business: In all these areas, mature MSPs are constantly tweaking the dial and making ongoing investments.