When ransomware or disaster strikes, your customers will inevitably call you. The Critical Customer Conversation You Must Have: A Blueprint for Ransomware Readiness
Automation is the solution great Managed Service Providers (MSPs) use to free up time spent on repetitive tasks. MSP - Automation Ebook
In an increasingly regulated and hostile internet environment, companies (and their IT staff) are often forced to move at a... Turning Data Protection Into a Game Changer
Unfortunately, many IT terms and concepts can be confusing if you don’t have a technical background. Online Storage Isn't Backup
Whether you find yourself lost in a sea of legacy backup systems or struggling to scale as your business grows, data... Five Common Data Protection Problems: How Leading MSPs Solved Them
We know. Sales and marketing can feel like busywork that takes you away from your billable tasks. The Big Book of Sales and Marketing for MSPs
This short e-book accompanies the 60 Minute GDPR Fast Track course online, presented by Ardi Kolah. GDPR Pocketbook
As an MSP, your clients expect you to keep them safe from cyberattacks. Indications of Compromise Part 1: The Lifecycle of a Cyberattack
In part one of our Indications of Compromise series, we discussed the Lockheed Martin Cyber Kill Chain® framework, wh Indications of Compromise Part 2: The Roles of Antivirus and Patch Management
In the previous two parts of this series, we went over the phases of a malware attack and the ways patching and antivirus can... Indications of Compromise Part 3: Attack Surface Reduction, Behavior Based Antivirus, and User Awareness Training
Unfortunately, even the best preventive security defenses can fail from time to time. Indications of Compromise Part 4: Securing the LAN to WAN Communications
If you have been following along through the Indications of Compromise series, then you already know quite a few techniques... Indications of Compromise Part 5: Last Ditch Actions and Cleanup in a Malware Attack
Technology professionals are increasingly expected to provide at least a basic level of cybersecurity protection for their... The Foundations of Cybersecurity