The latest News and Information on Managed Service Providers and related technologies.
Mobile device management (MDM) is a key aspect of your enterprise mobility management approach. This guide will help you understand it, outline why having a robust enterprise MDM strategy is so important for managed services providers (MSPs), and offer tips on how to improve it.
Your path to creating an elevated version of your current Microsoft 365 services is one that you already know is needed to create predictability for you and for your customers- predictability yields profitability. The reality is that Microsoft is more focused today on the commodity customer than your specific business needs as an MSP. This is one of the reasons most MSPs tend to take the backup/DR/cybersecurity angle.
Happy New Year everyone! Don’t worry, I’m well aware it’s only August and we still have another four months or so before the “official” new year arrives. But with the winding down of summer and the commencement of the school year, I tend to view September as a type of New Year as well. September has always been my favorite month of the year.
Sometimes it makes sense to switch your RMM vendor. For example, if your services have evolved to new requirements or you know there’s a good vendor who can really help your business. But I often see MSPs consider it for the wrong reasons. They think they’ll find a silver bullet in the next technology solution, not realizing their technology issue may actually be a deeper business issue. This is where having an MSP vendor who truly treats you as a partner can matter.
The N-able Head Security Nerd, Lewis Pope, just published a blog outlining the top 25 cybersecurity bad practices demonstrated by MSPs today. To accompany his post, I wanted to add one more risky bad habit to his list. It’s something I commonly see being practiced by too many MSPs from a business perspective—allowing a customer’s budget to dictate what a cybersecurity offering should look like.
The CISA (Cybersecurity & Infrastructure Security Agency) recently started an initiative to create a catalogue of exceptionally risky cybersecurity bad practices. While this will be a welcome and very useful tool once it is complete, only two practices are currently listed. Since cybersecurity and business decisions can be time-sensitive, we wanted to expand on the CISA’s list.
Following the security issues in the MSP market over the past 24 months, our customers, who are understandably concerned, have been asking what we do to keep the N-central® appliance (hosted or on-premises) updated and secure for them. I will do my best in this short article to outline how our engineering team keeps up with security. Please note this is valid as of the time of writing, but can change at any point.