Discover how SherWeb’s new Office Protect security solution, launched at Accelerate18 in Montreal, is another arrow in the quiver for MSPs to better serve customers. There are three key components:
Do you have a WordPress website? Is it secure enough?
Well, it's an open secret today that no website is 100 percent secure. It's easy for clever cybercriminals to find security vulnerabilities and then hijack and misuse your WordPress website.
Let’s go old school in this review. As a rowdy and gnarly teenager growing up in Alaska, I used the iconic Sennheiser “yellow” headphones to listen to the Allman Brothers and Santana, all the while giving noise relief to my weary parents. It was the start of a life long relationship with Sennheiser with its German engineering roots.
Fast forward the movie
Long-time SMB Nation member Joe Moore - known for attending every single major Microsoft conference - has insights into the five day Microsoft Ignite conference.Bottom line: Tech execs should bring a techie with 'em to get maximum value out of this confab. Will Moore repeat?
It’d be easy enough to say SyncroMSP is so easy to use that even I can do it. There is truth to humor but there is a more serious side to this conversation. You are invited to watch this video that articulates my experience and the experience of a leading managed services provider (MSP) using the SyncroMSP. SyncroMSP crosses a couple of categories like so many MSP solutions today.
Network security is of prime importance in today's world, hence network scanning, or rather network vulnerability scanning, has a crucial role to play as regards the overall security of any enterprise and the data that it handles.
Here's a look at the top 10 useful network vulnerability scanning tools available today:
Long-time SMB Nation tribal members will likely recall our love affair with the Intel “Network Unit of Computing” (NUC) during our 2014 WW Office 365 “Get Modern” tour. This palm-sized PC was one of my favs. So you might imagine my joy when I landed next to Myron Mason from ASI (distributor) at the recent
This is a case of teaching an old dog (backups) a new trick or two. Granted the backup conversation is a well-travelled road. Sticking with the dog analogy, when studying a range of backup reports, I felt like I was chasing my tail. Then I took a closer look at
I’ve had some very interesting conversations about email and protecting your identity and infrastructure. A little context is in order. First – one man’s quick view of infrastructure security history – not necessarily in order:
As a wrap up to the SolarWinds MSP EmpowerMSP 2018 event, I interview newly arrived SolarWinds MSP executive Marco Muto. Muto was "acquired" when his firm, Trusted Metrics, was purchased in early July 2018. He offers a fresh view into his role and his roadmap.
In this Harry Brelsford’s “HOW TO” contribution, the case for use automation to drive efficiency in your technology consulting and managed services provider practice is asserted. You will learn about the following approaches:
I'm on an email theme right now as it's both an essential tool and a popular IT attack vector. This blog is to highlight a cool tool to provide email address protection. And it's been brought to market by well-known player David Hughes. Peeps will remember Hughes from Boston-based Reflexion that was acquired by Sophos.