I get a lot of questions about how to do a network security assessment. What tools do I use, what information do I convey, etc. Before I can explain how to do it, we have to discuss the situation – is this a free network security assessment, or is this a paid network security assessment? Read more >>
There’s a news report that the Federal government is looking to “beef up” small business cyber defenses. You can see a report from Reuters here: http://news.yahoo.com/u-eyes-stronger-cyber-defenses-small-business-181619612.html. The story is basically covering the upcoming November release of a government-sponsored “Small Biz Cyber Planner” site, which will allow small businesses to answer some questions and put togetherRead more >>
With over 1200 global technology partners generating more than $360 million in managed IT services revenue, N-Able Technologies are an undisputed heavyweight in the channel. Their speciality is remote monitoring and management (RMM) automation software for MSPs, who in turn feed the highly fecund small and medium sized business (SMB) industry. So when N-Able TechnologiesRead more >>
I have been dealing with network security for my whole career, both in the small business space, and at the Enterprise level. Security remains a challenging and ever-changing arena. Today, I want to discuss how a Managed Services Provider should approach the task of securing their clients’ networks. Here are my main points to considerRead more >>
Zenith Infotech, a substantial player in the RMM (Remote Monitoring and Management) and BDR (Backup Disaster Recovery) markets, has spun off its RMM tool into a new company, to be called Zenith RMM. They have also accepted an investment from Summit Partners for the new company. So, if you use Zenith Management Agents and Anti-Virus,Read more >>
It’s been 10 years since HP bought Compaq Computer, and since then HP has been a juggernaut in the computer industry. When IBM got out of the PC business by selling off that division to Lenovo in 2004, it seemed like HP would be unstoppable. I had been a Compaq dealer since 1989, and whenRead more >>
One of my customers called me the other day. We have quoted them a major server upgrade. They have specific requirements that mean that they need onsite equipment. He called up because he was worried about HP, he was concerned that maybe they wouldn’t be around to support him in five years. There were twoRead more >>
One of the most common problems I see in IT organizations is the backwards nature of how their IT service delivery department is structured. Transitioning to the correct form can be tricky, yet hugely rewarding. It is much easier to just start it the right way. By backwards structure I mean the disproportion of lower-levelRead more >>
Today, I’m going to review some essential tools for the MSP’s toolkit. You may have slightly different products you like, and that’s fine, as long as you’ve got the categories covered. These are tools that you need to invest in for your practice. PLATFORM TOOLS – these are tools that you use proactively across allRead more >>
Today I’m going to discuss the important elements to include in your Security as a Service Offering. The first step will be to define what we mean when we say Security as a Service. This term is most commonly used when describing a firewall or Unified Threat Management (UTM) system, which is provided to theRead more >>