Archive - Enterprise IT RSS Feed

Q&A: VSA Drives MSP Internet & Telephone to New KPI Heights

casestudy-graphic.internet-and-telephone-big

MSP veteran Paul Cissel, CEO and founder of Internet & Telephone LLC (I&T), runs a tight ship. A big part of that discipline is the use of Kaseya VSA, a next generation RMM that helps the 14 year-old company tightly manage clients – doing such a great job Cissel’s I&T now dramatically exceeds MSP KPI norms.

Kaseya recently spoke with Cissel to learn more about how he uses VSA to drive operational excellence. Continue Reading…

Two-Factor Authentication: Double your Defense Against Hackers

hacker-protection-blog-wordpress

With the ever aggressive advancement of digital crime from cyber-thieves, and the increase of Internet fraud, companies now fully recognize the importance of high level security. Many businesses know they can’t completely protect their workers’ usernames, passwords and logins through traditional, largely manual means. The companies that really get this use two-factor authentication (2FA) as a defense against hackers trying to gain access to online accounts and company servers. Continue Reading…

The Cloud Is Way More Secure Than You Might Think

cloud-security-again-big

Let’s settle this old argument once and for all. With a good provider, and properly set up, the cloud is more secure than most on-premises infrastructure.

Does that still sound a wee bit equivocal? It has to be. Large enterprises, particularly in industries such as finance, can build superbly secure private infrastructure—they have to and can afford to do it right. Not all companies are gifted with these kinds of budgets, however; nor are  they able to attain such a high level of protection. Continue Reading…

Secure Your Critical Cloud ERP and CRM Data Straight to the Last Mile

cloud-crm-blog-big

In the early days of the cloud, IT worried about security. After all, if your data isn’t in your own hands, how do you know it’s safe?

Fortunately, it is cloud vendors’ business to make their systems secure and they have layers of professionals and security tools to do so. Today, one could reasonably argue that cloud services from reputable providers are safer than in-house applications.

Safer yes, within the confines of the provider’s infrastructure. But there is one key area of vulnerability – end user access. In order for cloud services such as ERP or CRM to provide business value, your end users, and sometimes even your partners, need to access the system, get at the data, and update records. If a hacker gets the keys to this kingdom, they can see what your end users see, steal your data, or corrupt the system. Continue Reading…

Lessons from Yahoo Data Breach Debacle: How to Block Breaches and Minimize Their Damage

data-breach-blog-big

While Denial of Service (DoS) attacks and disabling malware are IT nightmares, what really keeps IT pros (and the execs they report to) up at night are data breaches. And that means a lot of restless nights. These breaches are growing in number and impact.

If you have any doubt, look at what just happened to Yahoo! This December, the tech giant disclosed that over 1 billion accounts were compromised. The crazy thing is this hack happened some three years ago! And hackers gained a treasure trove: customer names, birth days, phone numbers, as well as their encrypted passwords and encrypted security questions, which serve as a second layer of authentication. Continue Reading…

The Future of MSPs Lies in Adding Value to Cloud Services

future-msp-blog-big

Managed Service Providers (MSPs) spent the last decade or so making a major transformation ― moving from a focus on break/fix to true managed services ― and at the same expanding their list of offerings to become more complete providers.

Now they are going through an arguably even more significant change ― becoming cloud leaders to the SMB market.  To do this effectively, MSPs also need to work with clients on a higher level by acting as a trusted advisor and even offering Virtual CIO (vCIO) services, including partnering with clients to conduct in-depth IT consulting, budgeting, and planning projects. Continue Reading…

Why You Shouldn’t End 2016 Without an IT Audit

eoy-audit-blog-big

The end of the year is filled with lots of last minute work – and plenty of employee time off.  Not a good combo. So it’s easy to let things slide. But one item you should not neglect is a year-end IT audit.

Maybe you do this every year and are only now putting it off. Perhaps you’ve never done one and aren’t looking forward to the effort. In either case, we hope you reconsider. While it seems like a lot of work, the time you put in the next few weeks will pay dividends. And with the right technology solution, the time spent can be inconsequential. Continue Reading…

Protect Your Clients’ Data―and Your MSP―with Layered Security

layered-security-big

As an MSP, you have been long aware that your clients need to increase and standardize their IT security defenses to decrease the risk of cyberattacks and possible regulatory fines.  However, did you know that new regulations could extend this risk to your own business?

The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679), which starts to roll out in 2017 and goes into full effect in May 2018, Continue Reading…

Security is an MSP’s Job One

safeguard-systems-blog-big

Security is by far the toughest challenge faced by end user organizations today — which is why so many small- and medium-sized businesses (SMBs) choose to outsource their security to managed service providers (MSPs). SMBs simply can’t afford the security personnel expense (security experts command top salaries) and don’t have the time to do the constant and detailed work it takes to maintain a safe environment. Nor is this a strategic endeavor for busy SMB IT shops.
Continue Reading…

5 IT Cloud Myths and Beliefs – Debunked, Confirmed and In-Between

cloud-and-it-blog-big

The cloud is still full of mystery. After all, you can’t see and touch your applications and data, and you have less control than with their on-premises counter parts. Now that the cloud is maturing, some issues are becoming clearer.

Here is a reality check on 5 cloud myths and beliefs. Continue Reading…

Page 1 of 512345»
-->