SolarWinds MSP Blog https://www.solarwindsmsp.com/blog/feed en Hiring for the First Time—What to Expect and Who to Hire First https://www.solarwindsmsp.com/blog/hiring-first-time-what-expect-and-who-hire-first <p><p>&lt;p&gt;One of the most important milestones for any business is the hiring of its first full-time employee. Managed services providers (MSPs) are no exception.&amp;nbsp;&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/hiring-first-time-what-expect-and-who-hire-first" hreflang="en">Read More</a> Tue, 18 Jun 2019 14:00:00 +0100 SolarWinds MSP https://www.solarwindsmsp.com/blog/hiring-first-time-what-expect-and-who-hire-first HIPAA Compliance Checklist and Requirements https://www.solarwindsmsp.com/blog/hipaa-compliance-checklist <p><p>&lt;p&gt;As a managed services provider (MSP), complying with a range of legal regulations can be a major part of your responsibilities. This is more than a way to provide great value to your customers—staying compliant can also protect you from penalties. This is especially true if you work with customers within the healthcare sector who are covered by the Health Insurance Portability and Accountability Act (&lt;a href=&quot;<a href="https://www.hhs.gov/hipaa/index.html&amp;quot">https://www.hhs.gov/hipaa/index.html&amp;quot</a>; target=_blank&gt;HIPAA&lt;/a&gt;).</p> <a href="/blog/hipaa-compliance-checklist" hreflang="en">Read More</a> Mon, 17 Jun 2019 16:35:21 +0100 SolarWinds MSP https://www.solarwindsmsp.com/blog/hipaa-compliance-checklist 2 Attacks Traditional Antivirus Is Powerless to Stop https://www.solarwindsmsp.com/blog/2-attacks-traditional-antivirus-powerless-stop <p><p>&lt;p&gt;You do your due diligence when it comes to security: You patch. You have backup in place. You install spam protection on your email servers and train your people to avoid phishing attacks. And you have antivirus (AV) installed on every machine to catch malware that happens to get through all the other defenses.&lt;/p&gt;</p> <p>&lt;p&gt;Yet, somehow, your customers still get attacked.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/2-attacks-traditional-antivirus-powerless-stop" hreflang="en">Read More</a> Fri, 14 Jun 2019 14:00:00 +0100 Chanel Chambers https://www.solarwindsmsp.com/blog/2-attacks-traditional-antivirus-powerless-stop Threat Monitoring: Proactive Security Against Cyberthreats  https://www.solarwindsmsp.com/blog/threat-monitoring-proactive-security-against-cyberthreats <p><p>&lt;p&gt;Too many organizations leave their network security to chance. If everything is running smoothly and you’ve never encountered a security breach, proactive security solutions may seem like a big investment for your customers to make. But have you sat down with them and looked at the list of potential expenditures associated with a data breach? Cybersecurity risk is business risk.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/threat-monitoring-proactive-security-against-cyberthreats" hreflang="en">Read More</a> Thu, 13 Jun 2019 14:00:00 +0100 Mia Thompson https://www.solarwindsmsp.com/blog/threat-monitoring-proactive-security-against-cyberthreats Donuts Are Delicious . . . and Powerful! https://www.solarwindsmsp.com/blog/donuts-are-delicious-and-powerful <p><p>&lt;p&gt;With &lt;a href=&quot;<a href="https://en.wikipedia.org/wiki/National_Doughnut_Day&quot;&gt;National">https://en.wikipedia.org/wiki/National_Doughnut_Day&quot;&gt;National</a> Donut Day&lt;/a&gt;&amp;nbsp;taking place last week in the U.S., we at SolarWinds MSP have had donuts on our minds. But not just the tasty, sugary, fried kind. We’re also busy incorporating donut charts into our product interfaces.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/donuts-are-delicious-and-powerful" hreflang="en">Read More</a> Wed, 12 Jun 2019 15:00:00 +0100 Carrie Reber https://www.solarwindsmsp.com/blog/donuts-are-delicious-and-powerful Windows Server 2016 Requirements https://www.solarwindsmsp.com/blog/windows-server-2016-overview <p><p>&lt;p&gt;Regardless of industry, it’s imperative that your customers have the right operating system to meet end-user needs, support core workflows, and protect proprietary data. The best OS for business servers will vary depending on a range of factors: budget, organization size, preferred applications, and more. Currently, Windows Server 2016 is a popular option that could offer your customers streamlined user experience and access to next-generation functionality.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/windows-server-2016-overview" hreflang="en">Read More</a> Wed, 12 Jun 2019 14:00:00 +0100 SolarWinds MSP https://www.solarwindsmsp.com/blog/windows-server-2016-overview How to Prevent DNS Poisoning https://www.solarwindsmsp.com/blog/what-is-dns-poisoning <p><p>&lt;p&gt;DNS poisoning, also known as DNS spoofing, is one of the most common domain name system (DNS) attacks out there today. The attack is used by hackers looking to infiltrate enterprises of all sizes and gain access to sensitive data, including user login credentials, financial details, and email exchanges. Clearly, it’s crucial that managed services providers (MSPs) understand how this threat typically occurs, and the steps they can take to prevent DNS poisoning.</p> <a href="/blog/what-is-dns-poisoning" hreflang="en">Read More</a> Mon, 10 Jun 2019 15:28:44 +0100 SolarWinds MSP https://www.solarwindsmsp.com/blog/what-is-dns-poisoning Creating a Well-Managed MSP  https://www.solarwindsmsp.com/blog/creating-well-managed-msp <p><p>&lt;p&gt;One question we see asked a lot is what defines being a well-managed&amp;nbsp;MSP (managed services provider)?&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/creating-well-managed-msp" hreflang="en">Read More</a> Sat, 08 Jun 2019 14:00:00 +0100 Eric Anthony https://www.solarwindsmsp.com/blog/creating-well-managed-msp Vulnerability Management Best Practices https://www.solarwindsmsp.com/blog/vulnerability-management-best-practices <p><p>&lt;p&gt;In 2018, network vulnerabilities accounted for&lt;a href=&quot;<a href="https://www.prnewswire.com/news-releases/edgescan-release-the-2019-vulnerability-stats-report-300800162.html&quot;&amp;gt">https://www.prnewswire.com/news-releases/edgescan-release-the-2019-vuln…</a>; 81% of all company security breaches&lt;/a&gt;. On top of that, it takes on average up to 69 days to patch a critical web application vulnerability and 65 days to patch a similar vulnerability for an internal network.</p> <a href="/blog/vulnerability-management-best-practices" hreflang="en">Read More</a> Fri, 07 Jun 2019 16:00:00 +0100 SolarWinds MSP https://www.solarwindsmsp.com/blog/vulnerability-management-best-practices An Overview of Subnet Classes https://www.solarwindsmsp.com/blog/overview-of-subnet-classes <p><p>&lt;p&gt;In order to effectively manage customer networks, it’s crucial that managed services providers (MSPs) have a firm grasp of internet protocols. You’ll need to understand how to subdivide a &lt;a href=&quot;<a href="https://www.solarwindsmsp.com/blog/how-to-design-a-network&amp;quot">https://www.solarwindsmsp.com/blog/how-to-design-a-network&amp;quot</a>; target=_blank&gt;customer&#039;s network&lt;/a&gt; into subnets if you want to help your customers improve on essential operating functions.</p> <a href="/blog/overview-of-subnet-classes" hreflang="en">Read More</a> Wed, 05 Jun 2019 16:00:00 +0100 SolarWinds MSP https://www.solarwindsmsp.com/blog/overview-of-subnet-classes The Email Security Education Series: Dangerous Email Attachments  https://www.solarwindsmsp.com/blog/email-security-education-series-dangerous-email-attachments <p><p>&lt;p&gt;&lt;i&gt;&lt;/i&gt;&lt;em&gt;Please note: For privacy reasons the identity of the hacked account in the example used for this blog has been changed.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;</p> <p>&lt;p&gt;As cybercriminals advance their techniques, you need to stay ahead of the game by taking proactive measures. In this blog, we look at dangerous email attachments and how you can identify them more easily.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/email-security-education-series-dangerous-email-attachments" hreflang="en">Read More</a> Wed, 05 Jun 2019 14:00:00 +0100 Mia Thompson https://www.solarwindsmsp.com/blog/email-security-education-series-dangerous-email-attachments You're Hired: Finding the Perfect First Marketing Candidate—Part 2 https://www.solarwindsmsp.com/blog/youre-hired-finding-perfect-first-marketing-candidate-part-2 <p><p>&lt;p&gt;In the first part of this two-part blog series we look at how you know it’s time to look for a marketing person. (If you haven’t seen that blog, you can read it here) In this piece we’ll take a look at the qualities your potential new marketing hire should have, as well as the ones that you might want to avoid.&lt;/p&gt;</p> <p>&lt;h3&gt;&lt;b&gt;What qualities should I look for in my first hire?&amp;nbsp;&lt;/b&gt;&lt;/h3&gt;</p></p> <a href="/blog/youre-hired-finding-perfect-first-marketing-candidate-part-2" hreflang="en">Read More</a> Tue, 04 Jun 2019 15:00:00 +0100 SolarWinds MSP https://www.solarwindsmsp.com/blog/youre-hired-finding-perfect-first-marketing-candidate-part-2 Understanding PGP Encryption https://www.solarwindsmsp.com/blog/pgp-encryption <p><p>&lt;p&gt;PGP (Pretty Good Privacy) is an encryption program used to send highly sensitive information over the internet. It relies on a mix of public key encryption methods as well as more traditional encryption methods to protect against attackers.</p> <a href="/blog/pgp-encryption" hreflang="en">Read More</a> Mon, 03 Jun 2019 15:00:00 +0100 SolarWinds MSP https://www.solarwindsmsp.com/blog/pgp-encryption A Security Guide to Preparing for the Future https://www.solarwindsmsp.com/blog/security-guide-preparing-future <p><p>&lt;p&gt;We don’t need to tell you how fast the threat landscape is evolving; you’re in the middle of it. Today, being a good guy is getting really hard. So much noise, so many vendors, so many threats—it’s hard to keep up.&lt;/p&gt;</p> <p>&lt;p&gt;As good guys we need to keep making it harder for the bad guys to achieve their goals. We need to protect our customers to an appropriate level based on the risk they face. So, as managed services providers (MSPs) what can we do to stem the tide? Here are some things to think about alongside some more practical advice for now.&lt;/p&gt;</p></p> <a href="/blog/security-guide-preparing-future" hreflang="en">Read More</a> Fri, 31 May 2019 14:00:00 +0100 Tim Brown https://www.solarwindsmsp.com/blog/security-guide-preparing-future Four SolarWinds MSP Leaders Honored as CRN Women of the Channel https://www.solarwindsmsp.com/blog/four-solarwinds-msp-leaders-honored-crn-women-channel <p><p>&lt;p&gt;&lt;a href=&quot;<a href="https://www.solarwindsmsp.com/?utm_medium=pr&amp;amp;utm_source=globenewswire&amp;amp;utm_content=women-of-the-channel-052819&quot;&gt;SolarWinds&lt;/a&gt;&amp;nbsp;today">https://www.solarwindsmsp.com/?utm_medium=pr&amp;amp;utm_source=globenewswi…</a> announced that four SolarWinds MSP executives have been recognized as 2019 Women of the Channel by&amp;nbsp;&lt;a href=&quot;<a href="http://www.crn.com/&amp;quot">http://www.crn.com/&amp;quot</a>; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;CRN®&lt;/a&gt;, a brand of&amp;nbsp;&lt;a href</p> <a href="/blog/four-solarwinds-msp-leaders-honored-crn-women-channel" hreflang="en">Read More</a> Wed, 29 May 2019 16:19:29 +0100 SolarWinds MSP https://www.solarwindsmsp.com/blog/four-solarwinds-msp-leaders-honored-crn-women-channel You're Hired: Finding the Perfect First Marketing Candidate—Part 1 https://www.solarwindsmsp.com/blog/youre-hired-finding-perfect-first-marketing-candidate-part-1 <p><p>&lt;p&gt;For those not in the marketing world, hiring a marketer can seem like the ever-elusive search for bigfoot. What is this mystical being and what do they do? Where do they hide? How can I find them?&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/youre-hired-finding-perfect-first-marketing-candidate-part-1" hreflang="en">Read More</a> Tue, 28 May 2019 14:30:00 +0100 SolarWinds MSP https://www.solarwindsmsp.com/blog/youre-hired-finding-perfect-first-marketing-candidate-part-1 GDPR One Year On: The Data Privacy Wormhole https://www.solarwindsmsp.com/blog/gdpr-one-year-data-privacy-wormhole <p><p>&lt;p&gt;Today marks the first anniversary of the launch of the General Data Protection Regulation (GDPR). For many, the past 12 months have been a steep learning curve from a data privacy perspective.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/gdpr-one-year-data-privacy-wormhole" hreflang="en">Read More</a> Mon, 27 May 2019 14:00:00 +0100 Tim Brown https://www.solarwindsmsp.com/blog/gdpr-one-year-data-privacy-wormhole Evaluating Risk and Response for Your Customers https://www.solarwindsmsp.com/blog/evaluating-risk-and-response-your-customers <p><p>&lt;p&gt;Why are we talking about risk, and not about security?&amp;nbsp;&lt;/p&gt;</p> <p>&lt;p&gt;People consider security a binary—I am either secure or not secure. Even though we are in the “security” business, we can never ensure 100% security, so this is a terrible position to start from. Risk, on the other hand, although constantly changing, is a measurable “nonbinary” thing that can be addressed through a series of questions, like:&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/evaluating-risk-and-response-your-customers" hreflang="en">Read More</a> Fri, 24 May 2019 14:00:00 +0100 Tim Brown https://www.solarwindsmsp.com/blog/evaluating-risk-and-response-your-customers Top 5 questions MSPs ask about NetPath  https://www.solarwindsmsp.com/blog/top-5-questions-msps-ask-about-netpath <p><p>&lt;p&gt;Over the past year, NetPath has been put through its paces by many of our customers who have benefitted from its numerous enhancements.&amp;nbsp;&lt;/p&gt;</p> <p>&lt;p&gt;In this blog, we will delve into the top five common questions we heard about NetPath. &amp;nbsp;&lt;/p&gt;</p> <p>&lt;h3&gt;1. Why should I use NetPath? Why not Ping or traceroute?&lt;/h3&gt;</p></p> <a href="/blog/top-5-questions-msps-ask-about-netpath" hreflang="en">Read More</a> Thu, 23 May 2019 14:00:36 +0100 Vittal Krishnamurthy https://www.solarwindsmsp.com/blog/top-5-questions-msps-ask-about-netpath What Is Advanced Endpoint Security and Why Is It So Important? https://www.solarwindsmsp.com/blog/what-advanced-endpoint-security-and-why-it-so-important <p><p>&lt;p&gt;Right now, potential intruders are probably rattling your network’s digital doors, looking for a way in. Endpoint devices are a common weak spot that allow these attacks access to your infrastructure. Advanced endpoint security can help seal off these attack points, providing valuable protection for your company. Here’s how it works, and why you should invest in it.&lt;/p&gt;</p></p> <a href="/blog/what-advanced-endpoint-security-and-why-it-so-important" hreflang="en">Read More</a> Tue, 21 May 2019 14:00:00 +0100 Tim Brown https://www.solarwindsmsp.com/blog/what-advanced-endpoint-security-and-why-it-so-important