Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

How to Respond to a Ransomware Attack the Right Way

It seems that every day we see another ransomware headline. But too often, backup and data protection solutions treat ransomware recovery just like any other type of recovery. The truth is recovery from ransomware has different requirements (and different best practices) than recovery from fire, flood, or hardware failure.

How Long Do Laptops Last? Overview for Organizations

Because of their portability and functionality, laptops have seen explosive growth in many organizations. Today, a new laptop is a typical component to a new employee’s onboarding package. The pandemic driven remote work boom has only accelerated the trend towards laptops and managing these IT assets, including their lifespan, has become a critical task for modern IT professionals.

9 Essential Steps of a Server Hardening Process

In any given IT environment, a server is the foundation that provides services for endpoints to carry out various actions. They are essential for computer networks to have shared access or information. Unfortunately, servers are often targets for cyberattacks due to their ability to reach other parts of the IT environment and wreak havoc. With these attacks on the rise, developing a server hardening process will help organizations improve its security posture.

Your Marketing Worked and You Got the Prospect Meeting... Now What?

Lead generation continues to be the number-one challenge facing MSPs today. Many of my blog posts to date, along with several of the boot camp sessions I have delivered so far, have been focused on this all-important topic. But what do you do when you get a bite and you now have a prospect that wants to meet with you? How do you structure this critical first meeting so that you can successfully navigate the prospect through the rest of the sales funnel to becoming a signed, closed deal at the end?

Do you work as an MSP? Here's why you should invest in an RMM solution.

As a managed service provider (MSP), you must deliver a broad spectrum of IT solutions to meet diverse clients’ needs. With the new normal of remote working and clients based across multiple industries and different time zones, you must devote many resources to guarantee reliable service delivery. Furthermore, ensuring seamless deployment, driving user adoption, and generating ROI can be daunting if your clients use multiple tools.

N-central Custom Properties, if you're not using them, you should be

Over the years, I’ve spoken with many of our partners that use N-central, and it always amazes me how few leverage custom properties. Often when I explain one or two uses for them, their minds are immediately racing with other potential uses as well, so today we are going to look at some of the many uses for custom properties and how they can benefit the support and service you provide to your clients.

5 Important Tools for an IT Asset Management (ITAM) Process

The number of IT assets organizations possess is growing rapidly, but managing this growth doesn’t have to be complicated. Efficient IT asset management comes down to having a process and plan in place to quickly and consistently track all assets. With this in place, you can improve the speed and delivery of IT services across organizations.