Operations | Monitoring | ITSM | DevOps | Cloud

MSP

The latest News and Information on Managed Service Providers and related technologies.

What is Penetration Testing?

Penetration Testing -- also known as “pentesting” -- are used by cybersecurity professionals and managed service providers to identify vulnerabilities present in a system before a cybersecurity incident takes place. You will often come across clients asking you to perform penetration testing, especially as emerging government regulations begin to make the practice mandatory.

What is SOAR (Security, Orchestration, Automation, and Response)?

As a managed service provider, you know that cyberthreats are increasing in frequency, sophistication, and impact. In recent years, we have seen a dramatic increase in the number of cyber-attacks targeting businesses, governments, and individuals. This explosion of cyberthreats highlights the need for businesses and individuals to take cybersecurity seriously and implement modernized security measures to protect themselves against these threats.

Weathering the IT Storm

The tech world has been on a rollercoaster since the COVID-19 pandemic. During the large-scale shift to remote work throughout 2020-21, big tech firms invested heavily in talent and infrastructure and there was plenty of growth in the IT space. Since the second half of 2022, however, high inflation, big tech layoffs, and the threat of an economic recession have organizations focused more on remaining cost-effective than investing in growth.

Top 6 Cybersecurity Best Practices for MSPs and Enterprises

MSPs own and process large amounts of sensitive data and act as gateways to the sensitive data and infrastructure of their clients, which is why cybercriminals view them as good potential targets. To adequately protect this sensitive data from today’s sophisticated attacks, it is crucial that MSPs leverage cybersecurity best practices to ensure the safety and security of their own systems and their customers’ systems.

PSA vs. RMM: Which One Do You Need?

Two software solutions that most MSPs cannot live without are known as professional services automation (PSA) and remote monitoring and management (RMM). However, it’s no secret that software solutions are expensive, so does your business really need both? Decide which software you should use after reviewing this comparison of PSA vs. RMM.

What is Digital Transformation? Why You Need it for IT Management

The history of digital transformation can be traced back as early as the 1940s when Dr. Claude Shannon published A Mathematical Theory of Communication, which is the theory behind the creation of the internet. Then addition of the microchip and semiconductor transistor, invented In the 1950s, established the foundation for digital transformation. Since then, the capabilities of machines and digital technology have grown exponentially, and they have fundamentally changed ways our society operates.

The Evolution of Network Visibility

As modern work has evolved, so too has the network end users rely on to do their jobs. Today’s network is vastly different from the networks of just a few years ago, with the new last mile of the office network evolving to cover anywhere end users are. This has had a significant impact on the visibility IT professionals have in the office network, and it means we need to revisit what network visibility really means as modern work continues to evolve.

How MSPs Can Own the Risk Management Conversation

Against a backdrop of constantly evolving cybersecurity threats, it’s essential that MSPs understand how to own the risk conversation if they are to really help their customers effectively manage their security posture. In this blog, I want to look at what we mean by “owning the risk conversation”, and how MSPs can achieve this. For me, I look at it from the perspective of my own job.

How to Choose a Patch Management Solution

It’s pretty easy to hit that “remind me later” button when you don’t want to wait for installations, reboots, and possible errors if something goes wrong with the update. Snoozing that patch notification can quickly become a habit, and before you know it, a critical piece of software is weeks or months out of date. More people are learning that this isn’t a bit of harmless procrastination -- it’s actually a huge cybersecurity risk.