Operations | Monitoring | ITSM | DevOps | Cloud

N-able

Is babysitting backups destroying your employee retention?

Skilled technical people are the key to any MSP’s success and growth. In fact, data from Service Leadership shows the inability to get and keep such talent can be a top business risk for MSPs. It’s not surprising. These individuals are in high demand, and typically have their choice of where to work. The shocking thing is how often an MSP’s own process and technology choices impact their ability to attract and retain needed colleagues.

Use cyber-intelligence to expand cyber-services & increase differentiation

As MSPs expand their cybersecurity offerings, cyber-intelligence is an area that can help them improve protection for customers, generate additional revenue, and differentiate their services from the competition. However, when we talk to MSPs about cyber-intelligence, we often get the raised eyebrow. This reaction is driven by many factors. One of which is the nebulous meaning of cyber-intelligence—what is it really?

Adding Mac support, part 1: I've never used a Mac, and now I need to manage them

Being in IT can sometimes feel a bit like being a doctor—you’re often called upon to give people the bad news that their beloved computer isn’t going to make it. Other times, people think you’ve performed a miracle just by doing your job and saving their data. Then, there’s the Thanksgiving problem, where any time you’re at a family gathering, you get cornered by a relative wanting to talk about their tech problems, regardless of your actual area of expertise.

Update on the Nobelium APT Attack Group

If you’re like me, you started your week by reading the Microsoft blog about Nobelium, an advanced-persistent-threat (APT) group that was actively targeting cloud service providers (CSPs) and managed services provider (MSPs) in a recent wave of supply chain attacks. Personally, I wasn’t terribly surprised. We all know by now that MSPs have a bullseye on them for adversaries wishing to target the supply chain. What’s different about this attack is the motive.

DNS filtering: What is it and why do companies use it?

The Domain Name System (DNS) makes it possible for users to access websites using domain names, like wikipedia.org, in place of nine-digit IP addresses. Due to its ubiquitous nature, DNS can be used to block access to selected websites, which is commonly known as DNS filtering. Many companies see security and productivity benefits from implementing this strategy where appropriate. Read on as we explore some of the key details around how DNS filtering works and how it can be beneficial.

Why cybersecurity should be your top priority as an MSP

The new year is just around the corner, meaning we’ll be ringing in 2022 before we know it. So how did your MSP fair in 2021? Did you achieve the sales and revenue goals you set? Net new customer acquisition continues to be the #1 challenge facing MSPs today. And because most businesses already have an MSP they are using, the struggle is real. So the test becomes, how can I set myself apart?

Our friends were hit by an impossible cyberstorm. It's time we all change.

A common cliché in cybersecurity is, it’s not a question of if you get attacked, but when. We witnessed this firsthand when our former parent company was part of a major attack last year. While N-able products weren’t affected, it was difficult to watch friends and colleagues deal with the aftermath of an event of that magnitude.

Fight the phish using Bubble Wrap

Bubble wrap®. That obsessively addictive plastic material, made up of hundreds of small air-filled bubbles we all love to squeeze. Although I tend to think of Bubble Wrap as the original fidget toy—melting away our anxieties with every satisfying pop—most people associate it with helping to protect their most precious collectibles when in transit or being placed in long-term storage.

CMMC: What is it and why is it important to MSPs

The Cybersecurity Maturity Model Certification (CMMC) is a security framework implemented by the US Department of Defense (DoD) to improve protection of the defense industrial base. Like other security frameworks, the CMMC has a collection of controls for processes and practices with the goal of achieving a certain level of cybersecurity maturity.