Operations | Monitoring | ITSM | DevOps | Cloud

MSP

The latest News and Information on Managed Service Providers and related technologies.

Macs and malware, part 2: Are Macs more secure?

Are Macs more secure? If that’s not the very definition of a clickbait headline, I don’t know what is. Spoiler warning: While I have opinions, I’m not a security expert with multiple certifications or years of experience in the field. So, I won’t take sides as to which operating system is the most secure.

Cove Data Protection Modernizes DRaaS with New Standby Image Feature

We’re please to announced that we’ve added a Standby Image feature as part of our Cove Data Protection™ solution. This enables us to deliver on the promise of cloud-first data protection as-a-service combined with business-class disaster recovery, by making it easy to create, manage, and report on virtual server images in the partner’s location of choice, ready for fast and flexible disaster recovery, without an expensive proprietary appliance.

How to Design a Network: 6 Best Practices for Success

A network provides a way for many computers to all be connected and exchange data with each other simultaneously. It allows members of organizations to quickly complete tasks, share information, and carry out any computing responsibilities that rely on a working network. It’s important for each organization to ensure that their network design is suitable for their needs.

Data Protection Plan: Guide & 8 Steps for Creation

There has been a sharp increase in the amount of personal and organizational data that is stored online and on devices. Losing this data could result in disastrous consequences for businesses or individuals, which means that data protection is certainly necessary. Data protection plans are essential for the safety and security of data within all organizations.

How to Respond to a Ransomware Attack the Right Way

It seems that every day we see another ransomware headline. But too often, backup and data protection solutions treat ransomware recovery just like any other type of recovery. The truth is recovery from ransomware has different requirements (and different best practices) than recovery from fire, flood, or hardware failure.

How Long Do Laptops Last? Overview for Organizations

Because of their portability and functionality, laptops have seen explosive growth in many organizations. Today, a new laptop is a typical component to a new employee’s onboarding package. The pandemic driven remote work boom has only accelerated the trend towards laptops and managing these IT assets, including their lifespan, has become a critical task for modern IT professionals.

9 Essential Steps of a Server Hardening Process

In any given IT environment, a server is the foundation that provides services for endpoints to carry out various actions. They are essential for computer networks to have shared access or information. Unfortunately, servers are often targets for cyberattacks due to their ability to reach other parts of the IT environment and wreak havoc. With these attacks on the rise, developing a server hardening process will help organizations improve its security posture.

Your Marketing Worked and You Got the Prospect Meeting... Now What?

Lead generation continues to be the number-one challenge facing MSPs today. Many of my blog posts to date, along with several of the boot camp sessions I have delivered so far, have been focused on this all-important topic. But what do you do when you get a bite and you now have a prospect that wants to meet with you? How do you structure this critical first meeting so that you can successfully navigate the prospect through the rest of the sales funnel to becoming a signed, closed deal at the end?