SolarWinds MSP Blog en Hiring for the First Time—What to Expect and Who to Hire First <p><p>&lt;p&gt;One of the most important milestones for any business is the hiring of its first full-time employee. Managed services providers (MSPs) are no exception.&amp;nbsp;&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/hiring-first-time-what-expect-and-who-hire-first" hreflang="en">Read More</a> Tue, 18 Jun 2019 14:00:00 +0100 SolarWinds MSP HIPAA Compliance Checklist and Requirements <p><p>&lt;p&gt;As a managed services provider (MSP), complying with a range of legal regulations can be a major part of your responsibilities. This is more than a way to provide great value to your customers—staying compliant can also protect you from penalties. This is especially true if you work with customers within the healthcare sector who are covered by the Health Insurance Portability and Accountability Act (&lt;a href=&quot;<a href=";quot">;quot</a>; target=_blank&gt;HIPAA&lt;/a&gt;).</p> <a href="/blog/hipaa-compliance-checklist" hreflang="en">Read More</a> Mon, 17 Jun 2019 16:35:21 +0100 SolarWinds MSP 2 Attacks Traditional Antivirus Is Powerless to Stop <p><p>&lt;p&gt;You do your due diligence when it comes to security: You patch. You have backup in place. You install spam protection on your email servers and train your people to avoid phishing attacks. And you have antivirus (AV) installed on every machine to catch malware that happens to get through all the other defenses.&lt;/p&gt;</p> <p>&lt;p&gt;Yet, somehow, your customers still get attacked.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/2-attacks-traditional-antivirus-powerless-stop" hreflang="en">Read More</a> Fri, 14 Jun 2019 14:00:00 +0100 Chanel Chambers Threat Monitoring: Proactive Security Against Cyberthreats <p><p>&lt;p&gt;Too many organizations leave their network security to chance. If everything is running smoothly and you’ve never encountered a security breach, proactive security solutions may seem like a big investment for your customers to make. But have you sat down with them and looked at the list of potential expenditures associated with a data breach? Cybersecurity risk is business risk.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/threat-monitoring-proactive-security-against-cyberthreats" hreflang="en">Read More</a> Thu, 13 Jun 2019 14:00:00 +0100 Mia Thompson Donuts Are Delicious . . . and Powerful! <p><p>&lt;p&gt;With &lt;a href=&quot;<a href=";&gt;National">;&gt;National</a> Donut Day&lt;/a&gt;&amp;nbsp;taking place last week in the U.S., we at SolarWinds MSP have had donuts on our minds. But not just the tasty, sugary, fried kind. We’re also busy incorporating donut charts into our product interfaces.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/donuts-are-delicious-and-powerful" hreflang="en">Read More</a> Wed, 12 Jun 2019 15:00:00 +0100 Carrie Reber Windows Server 2016 Requirements <p><p>&lt;p&gt;Regardless of industry, it’s imperative that your customers have the right operating system to meet end-user needs, support core workflows, and protect proprietary data. The best OS for business servers will vary depending on a range of factors: budget, organization size, preferred applications, and more. Currently, Windows Server 2016 is a popular option that could offer your customers streamlined user experience and access to next-generation functionality.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/windows-server-2016-overview" hreflang="en">Read More</a> Wed, 12 Jun 2019 14:00:00 +0100 SolarWinds MSP How to Prevent DNS Poisoning <p><p>&lt;p&gt;DNS poisoning, also known as DNS spoofing, is one of the most common domain name system (DNS) attacks out there today. The attack is used by hackers looking to infiltrate enterprises of all sizes and gain access to sensitive data, including user login credentials, financial details, and email exchanges. Clearly, it’s crucial that managed services providers (MSPs) understand how this threat typically occurs, and the steps they can take to prevent DNS poisoning.</p> <a href="/blog/what-is-dns-poisoning" hreflang="en">Read More</a> Mon, 10 Jun 2019 15:28:44 +0100 SolarWinds MSP Creating a Well-Managed MSP <p><p>&lt;p&gt;One question we see asked a lot is what defines being a well-managed&amp;nbsp;MSP (managed services provider)?&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/creating-well-managed-msp" hreflang="en">Read More</a> Sat, 08 Jun 2019 14:00:00 +0100 Eric Anthony Vulnerability Management Best Practices <p><p>&lt;p&gt;In 2018, network vulnerabilities accounted for&lt;a href=&quot;<a href=";&amp;gt">…</a>; 81% of all company security breaches&lt;/a&gt;. On top of that, it takes on average up to 69 days to patch a critical web application vulnerability and 65 days to patch a similar vulnerability for an internal network.</p> <a href="/blog/vulnerability-management-best-practices" hreflang="en">Read More</a> Fri, 07 Jun 2019 16:00:00 +0100 SolarWinds MSP An Overview of Subnet Classes <p><p>&lt;p&gt;In order to effectively manage customer networks, it’s crucial that managed services providers (MSPs) have a firm grasp of internet protocols. You’ll need to understand how to subdivide a &lt;a href=&quot;<a href=";quot">;quot</a>; target=_blank&gt;customer&#039;s network&lt;/a&gt; into subnets if you want to help your customers improve on essential operating functions.</p> <a href="/blog/overview-of-subnet-classes" hreflang="en">Read More</a> Wed, 05 Jun 2019 16:00:00 +0100 SolarWinds MSP The Email Security Education Series: Dangerous Email Attachments <p><p>&lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;em&gt;Please note: For privacy reasons the identity of the hacked account in the example used for this blog has been changed.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;</p> <p>&lt;p&gt;As cybercriminals advance their techniques, you need to stay ahead of the game by taking proactive measures. In this blog, we look at dangerous email attachments and how you can identify them more easily.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/email-security-education-series-dangerous-email-attachments" hreflang="en">Read More</a> Wed, 05 Jun 2019 14:00:00 +0100 Mia Thompson You're Hired: Finding the Perfect First Marketing Candidate—Part 2 <p><p>&lt;p&gt;In the first part of this two-part blog series we look at how you know it’s time to look for a marketing person. (If you haven’t seen that blog, you can read it here) In this piece we’ll take a look at the qualities your potential new marketing hire should have, as well as the ones that you might want to avoid.&lt;/p&gt;</p> <p>&lt;h3&gt;&lt;b&gt;What qualities should I look for in my first hire?&amp;nbsp;&lt;/b&gt;&lt;/h3&gt;</p></p> <a href="/blog/youre-hired-finding-perfect-first-marketing-candidate-part-2" hreflang="en">Read More</a> Tue, 04 Jun 2019 15:00:00 +0100 SolarWinds MSP Understanding PGP Encryption <p><p>&lt;p&gt;PGP (Pretty Good Privacy) is an encryption program used to send highly sensitive information over the internet. It relies on a mix of public key encryption methods as well as more traditional encryption methods to protect against attackers.</p> <a href="/blog/pgp-encryption" hreflang="en">Read More</a> Mon, 03 Jun 2019 15:00:00 +0100 SolarWinds MSP A Security Guide to Preparing for the Future <p><p>&lt;p&gt;We don’t need to tell you how fast the threat landscape is evolving; you’re in the middle of it. Today, being a good guy is getting really hard. So much noise, so many vendors, so many threats—it’s hard to keep up.&lt;/p&gt;</p> <p>&lt;p&gt;As good guys we need to keep making it harder for the bad guys to achieve their goals. We need to protect our customers to an appropriate level based on the risk they face. So, as managed services providers (MSPs) what can we do to stem the tide? Here are some things to think about alongside some more practical advice for now.&lt;/p&gt;</p></p> <a href="/blog/security-guide-preparing-future" hreflang="en">Read More</a> Fri, 31 May 2019 14:00:00 +0100 Tim Brown Four SolarWinds MSP Leaders Honored as CRN Women of the Channel <p><p>&lt;p&gt;&lt;a href=&quot;<a href=";amp;utm_source=globenewswire&amp;amp;utm_content=women-of-the-channel-052819&quot;&gt;SolarWinds&lt;/a&gt;&amp;nbsp;today">;amp;utm_source=globenewswi…</a> announced that four SolarWinds MSP executives have been recognized as 2019 Women of the Channel by&amp;nbsp;&lt;a href=&quot;<a href=";quot">;quot</a>; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;CRN®&lt;/a&gt;, a brand of&amp;nbsp;&lt;a href</p> <a href="/blog/four-solarwinds-msp-leaders-honored-crn-women-channel" hreflang="en">Read More</a> Wed, 29 May 2019 16:19:29 +0100 SolarWinds MSP You're Hired: Finding the Perfect First Marketing Candidate—Part 1 <p><p>&lt;p&gt;For those not in the marketing world, hiring a marketer can seem like the ever-elusive search for bigfoot. What is this mystical being and what do they do? Where do they hide? How can I find them?&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/youre-hired-finding-perfect-first-marketing-candidate-part-1" hreflang="en">Read More</a> Tue, 28 May 2019 14:30:00 +0100 SolarWinds MSP GDPR One Year On: The Data Privacy Wormhole <p><p>&lt;p&gt;Today marks the first anniversary of the launch of the General Data Protection Regulation (GDPR). For many, the past 12 months have been a steep learning curve from a data privacy perspective.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/gdpr-one-year-data-privacy-wormhole" hreflang="en">Read More</a> Mon, 27 May 2019 14:00:00 +0100 Tim Brown Evaluating Risk and Response for Your Customers <p><p>&lt;p&gt;Why are we talking about risk, and not about security?&amp;nbsp;&lt;/p&gt;</p> <p>&lt;p&gt;People consider security a binary—I am either secure or not secure. Even though we are in the “security” business, we can never ensure 100% security, so this is a terrible position to start from. Risk, on the other hand, although constantly changing, is a measurable “nonbinary” thing that can be addressed through a series of questions, like:&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/evaluating-risk-and-response-your-customers" hreflang="en">Read More</a> Fri, 24 May 2019 14:00:00 +0100 Tim Brown Top 5 questions MSPs ask about NetPath <p><p>&lt;p&gt;Over the past year, NetPath has been put through its paces by many of our customers who have benefitted from its numerous enhancements.&amp;nbsp;&lt;/p&gt;</p> <p>&lt;p&gt;In this blog, we will delve into the top five common questions we heard about NetPath. &amp;nbsp;&lt;/p&gt;</p> <p>&lt;h3&gt;1. Why should I use NetPath? Why not Ping or traceroute?&lt;/h3&gt;</p></p> <a href="/blog/top-5-questions-msps-ask-about-netpath" hreflang="en">Read More</a> Thu, 23 May 2019 14:00:36 +0100 Vittal Krishnamurthy What Is Advanced Endpoint Security and Why Is It So Important? <p><p>&lt;p&gt;Right now, potential intruders are probably rattling your network’s digital doors, looking for a way in. Endpoint devices are a common weak spot that allow these attacks access to your infrastructure. Advanced endpoint security can help seal off these attack points, providing valuable protection for your company. Here’s how it works, and why you should invest in it.&lt;/p&gt;</p></p> <a href="/blog/what-advanced-endpoint-security-and-why-it-so-important" hreflang="en">Read More</a> Tue, 21 May 2019 14:00:00 +0100 Tim Brown