Chances are, in an average day, you are not accomplishing as many tasks as you would like… and neither are your colleagues or your employees. What is mystifying about that statement is that it seems today’s workforce is putting in more hours and more effort than ever before coinciding with an increased adoption of IT devices and applications designed to improve user productivity. In fact, this has been a key driver for organizations to enable workforce mobility – to provide flexibility in accessing business IT resources (applications, data, email, and other services) from any device at any location at any time in order to improve overall business performance. But even the most accomplished business professionals must admit there are days when little gets done despite herculean efforts.
Three recent studies underline how 2015 is shaping up to be a great year for MSPs in the U.S.
SunTrust Banks’ annual Business Pulse Survey showed that 78% of small- and 84% of mid-sized U.S. businesses are prepped for growth this year. In fact, automating business processes and investing in technology and facilities were among the top projects noted to support this growth (especially for smaller companies).
The eighth-annual American Express/CFO Research Global Business and Spending Monitor reported similar U.S. business growth outlooks, with 35% of the U.S. respondents citing insufficient in-house IT staff and expertise to support this growth.
Finally, the CompTIA study, Enabling SMBs with Technology, found that more than two-thirds of companies surveyed have outsourced IT services in the past 12 months, with 90% somewhat or very familiar with the managed service provider concept.
It’s no surprise that security was the No. 1 SMB concern among respondents surveyed for the recent CompTIA study, Enabling SMBs with Technology. As the report states, “Security is quickly becoming a top priority for all businesses as breaches occur more frequently and carry more serious repercussions.”
Comprehensive security management is no longer a nice-to-have. It’s a basic requirement to make sure a company’s systems and data are protected not only from malicious agents, but also from human error, oversight and procrastination. The risks are just too high. Over half of small businesses go out of business within six months of a security breachsince they don’t have the resources of a Global 2000 company to weather the repercussions.
If your IT group is like most IT organizations at mid-sized companies, your team faces an ever-growing set of IT challenges. As if existing complexity wasn’t enough, new trends like cloud and mobility are placing significant new requirements on your already strained staff and budgets.
The number of projects continues to grow and your team can’t possibly work any harder. So what’s to be done?
As an MSP, does the following scenario sound familiar to you?
A customer (say a small financial institution) calls you to report that one their employees lost a tablet that was used to access sensitive customer information. They are unsure if that information is protected and are now worried about the repercussions if that information is compromised. HELP!
This is a fairly common scenario owing to the proliferation of mobile devices at workplaces. These are powerful computing devices that need management. In this post, let’s discuss the mobility trend and why mobility management is important for Small and Medium-sized Businesses (SMBs)–the typical customers of an MSP.
My talk at Kaseya Connect last week was about the need to wake customers up about cybersecurity. There are far too many people who are still taking a head-in-the-sand approach about cybercrime: ignoring it and hoping it will go away. But in fact it is steadily getting worse, and end users need our help securing their networks. The top takeaways from my keynote are facts which are intended to get customers’ attention:
ESET Remote Administrator Plug-in for Kaseya Improves Security Management
ESET®, the global leader in proactive digital protection, announced today an enhanced version of ESET Remote Administrator (ERA) Plug-in for Kaseya® VSA at Kaseya Connect 2015. The re-designed Plug-in integrates with Kaseya VSA to provide central management of ESET Endpoint Solutions across distributed networks.
At times the IT department and the custodial department share a lot in common. Both spend hours cleaning and disinfecting. Both clean up after user misbehavior. Except custodians get the snappy jumpsuits.
For the IT department, though, its Christmas office party mop-up is the extensive malware infection. Reimaging and rebuilding a workstation after a malware infection is a long, repetitive process that takes a couple of hours.
Rats and worms are on the way… should you be afraid? Unfortunately, for many the answer is yes! The new breeds of malware are increasingly sophisticated and can have devastating effects on companies large and small. The second bit of gloom is that malware volumes are going up exponentially. The AV-TEST Institute is registering over 280,000 new malicious programs every day, so Remote Access Trojans (RATS) with worming functions are just one type of attack that can start to make your knees tremble. Just because we’ve seen APTs and other attacks devastate numerous large corporations this past year, including Sony, Target and Dairy Queen, don’t be fooled into thinking that the SMBs that most MSPs work with are immune. Seventy two percent of the breaches investigated, involve companies with less than 100 employees.
I’ve been working at a security vendor for the past 12 years and focusing on the service provider market for the last five, with a specific focus on small and medium business-focused MSPs. Over the years I’ve met with, worked with, collaborated with and, most importantly, learned from MSPs just like you. I’ve often day-dreamed about starting up my own MSP business, but have never pulled the trigger. What I have done, though, is imagine how I would do things from a security perspective, if I ever did decide to start my own MSP business. For my own future reference, and in the spirit of sharing my security-specific knowledge with you, I present to you my managed security blueprint.
Today’s threat landscape is exponentially more complex and sophisticated than it was even two years ago, as evidenced by the almost daily news of data breaches. So, relying on a single solution isn’t really practical–or the best option for your customers. Given that, I would make sure I built a comprehensive, multilayered solution offering to provide maximum protection (and to reduce any potential costs on my end for cleanups) for my customers.