As your MSP practice develops, you will handle everything from recruiting to terminating, advertising, seller relations, and developing your product offerings. Juggling all of these things and making customers happy is not just about fast, friendly service, because everybody says they can do that, but it's more about efficacy, and about inculcating a corporate culture or company culture
For more than a decade, the IAITAM Annual Conference & Exhibition (ACE) has served as the premier event in IT Asset Management. This year’s IAITAM event will be held May 19th and 20th online and is focused on taking your IT Asset to the next level. Through this strictly educational conference, you will not only walk away with nuggets of information you can use right away,
The past year has been a whirlwind of changes not only for organizations and businesses, but for life in general. With all of the changes that have gone on we have seen organizations mature, build amazing resilience, and come to grips with this new reality that people can actually be more productive from home. With the last year as a testing ground many companies have announced plans for post pandemic work life.
Josh Weiss joins us to share his experiences with Ghost Policy. About two months ago Josh installed some Intune files that set up a bunch of baseline policies, that included it’s app locker policy (a Software Restriction Policy). After realizing this was to much for his company he deleted it from his tenant. He then spent two months trying to figure out why he couldn't install any software
On February 4, 2021, House and Senate Democrats introduced the Protecting the Right to Organize (PRO) Act of 2021. This is followed by an earlier version of the PRO Act that passed in February of 2020. If this act passed it would be the most significant labor law reform in the United States since the World War II-
We almost hear daily about data breaches that expose sensitive information about businesses and people. These breaches and attacks are costing companies not only a lot of money, but time and their reputations. In attempt to win against these cyber attacks many companies are using layers of security and remote management to access their information.