The MSP sector currently finds itself in a difficult situation: While the industry is growing, many are finding it increasingly hard to hire skilled techs quickly enough to fill their increasing knowledge gaps. We frequently hear from our partners that there just aren’t enough skilled techs in the market, and things are moving too quickly. This is particularly true in security, but it’s certainly not limited to that area.
Following my previous blog post (which you can read here), I’m continuing to look at marketing and lead-generation activities for small MSPs. Here are my remaining tips on how to effectively market when you are an MSP of one.
I’m probably dating myself, but I used to love the television show The A-Team when I was little. Every week, the team would be put into the middle of a problem and work together to overcome some challenge. Plus, they had Mr. T and a really cool van.
With the end of another year, and a bright, shiny new year just ahead, many businesses take stock to reflect on their accomplishments and what they still need to do. In this vein, I have been getting quite a few questions lately about marketing and lead generation—specifically, how to conduct marketing when the MSP is small, without a lot of time or money to devote to such an initiative.
Imagine the scenario: you get an urgent call from one of your customers. All her files seem to be corrupted. And then there’s that email demanding payment via Bitcoin for restoration. She needs your immediate help to get her business up and running. Later on, she’ll demand to know how you let her business be vulnerable to this attack. You had installed firewalls, required strong passwords, and conducted email phishing drills—and still your customer was attacked.
In their effort to protect their customers from a range of modern threats, managed services providers (MSPs) may encounter a strategy known as credential stuffing. This hacking technique involves rapidly inserting large numbers of usernames and passwords—often collected from corporate data breaches—into the login fields of other sites and digital services.
My previous blog was, “I’ve never used a Mac, and now I need to manage them.” For the second installment of this series I will highlight some key tools and resources for the new Mac admin.
To pull off a data breach, today’s cybercriminals have some formidable tools at their disposal. They can use software to guess simple passwords. They may infect a system with ransomware, only returning stolen information when they’re received payment. They might choose to deploy a social engineering attack and gain access to a network through human error.