Archive - IT Systems Management RSS Feed

5 Features You Need in Your Software Management Solution

Keeping operating systems and third-party software current is a vital step in ensuring your infrastructure is performing optimally and securely. For MSPs, this means keeping customers’ systems patched and up to date. With increasingly vicious ransomware attacks like WannaCry and Petya on the rise, this is more important than ever.

Automatically downloading all patches and updates may seem the easiest way to go to accomplish this. However, not all patches or systems are of equal importance, and not all updates are risk-free. For an MSP managing a small number of systems, deciding on a case-by-case basis what and when to update and doing so manually may make sense. But as you grow, this quickly becomes untenable. Continue Reading…

What’s Worse, an Insider or Outsider Threat?

When IT pros think of hackers, images of young men sitting around a smoky room in Eastern Europe staring at monitors may come to mind. And yes, many hacks, especially large scale incursions, do come from organized groups of outsiders and often foreign entities. This outside threat is why firewalls, and intrusion detection and prevention systems are so common.

But these perimeter defenses do little to fend off what may be the biggest threat – an attack from inside!

Insiders not only have network access, sometimes at a high level, they also know much of what is on the network, and where exactly that data resides. Continue Reading…

Kaseya Powered Services – Authentication and Network Management in an On-Demand Box

Kaseya today announced the fastest, easiest and most effective way for MSPs to deliver authentication and network management as a service. The new Kaseya Powered Services, known as Go-to-Market in a Box, include cloud-based on-demand versions of Traverse and AuthAnvil custom made for fast set up and speedy service creation.

With these powered services, Kaseya has done much of the heavy lifting in developing the services. The MSP can easily take the Kaseya cloud services and offer them as its own. Continue Reading…

Creating the Most Helpful Service Desk Possible

If there is a bread and butter aspect to a successful MSP, it has to be the service desk. Here is where the rubber meets the road, client IT problems addressed, and is the focal point for how clients interact with your company.

A mediocre or substandard service desk is a death knell. In contrast, a superb service desk creates customer loyalty, SLA compliance and great word of mouth. At the same time, such a desk is efficient, creating more revenue and profit opportunity. Continue Reading…

GUEST BLOG: Can You Use a Psychologist’s Technique From Good Will Hunting to Make a Breakthrough With IT Marketing?

The Importance of Morale

IT marketing is a cutthroat game where personal feelings do not play into business decisions. No one’s going to buy from your MSP because it will make your salespeople “feel good.” They’re going to buy based on shifting factors which may or may not be legitimate. Oftentimes, clients buy not based on service, but on the perception of quality. They perceive that a given provider will yield a certain level of quality Continue Reading…

Instant Access Taps Kaseya VSA, MSP to Perfect Mobile Workforce Management

The relationship between an IT organization and its Managed Service Provider (MSP) is critical to efficient IT. Instant Access, an Australian supplier of aluminium scaffolding and elevated working platforms, works closely with MSP CustomTec on network support. The solution to many of Instant Access’ problems is Kaseya VSA, remote monitoring and management (RMM) that keeps end points running properly and securely.

This task is all the more difficult because Instant Access has 100 professionals that operate in New Zealand and Australia. Managing all these end points is tricky as they are spread across 10 offices. Not only do these end user end points need to kept running, they also need to support constant connectivity. Continue Reading…

Petya May be the Worst Ransomware Ever

Ransomware has been wreaking havoc for years, locking up data and decrypting and releasing it only when money is paid, usually through Bitcoin.

Like any successful malware, new variants are based on the old ones, making it a snap for even amateur-hour hackers to tweak an old exploit and unleash it as new.

So now we have Petya, whose victims already include banks, airports, the metro in Kiev, and even Chernobyl radiation detectors. And this is only the beginning, as the malware is still very much in the wild. Continue Reading…

MSPs: Protect Yourself and Customer Endpoints Through Layered Security

PC consumers tend to feel to safe so long as they have antivirus protection in place. Some neophytes are comfortable even without having this modicum of protection.

As experienced IT pros, MSPs know better. Antivirus and anti-malware protection is important, but it is only one aspect of keeping MSP and client endpoints safe. Keeping both the provider and customer sides safe is essential. Customers need to be safe because that is what they pay you for – and your reputation is on the line. Continue Reading…

How IT Automation Can Benefit Your School: Build Efficiency While Staying in Budget

IT departments in elementary and secondary schools have many challenges unique to their environments. One fundamental issue is that these districts are locally funded, and budgets rarely increase by more than a meager percentage point or two.

Despite that, changes in educational approaches and the demands of parents and tech-savvy students mean that schools are constantly pressed to adopt cutting-edge technologies.

Technology has transformed learning, and nowhere is this more evident than in the work that students produce. Even primary school students create papers in Word, craft PowerPoint presentations, Photoshop pictures, and edit videos using Final Cut. Continue Reading…

WannaCry Ransomware Exposes Crisis of Unpatched Systems, Failure to Back up

 

Would it surprise you to learn that one of the most successful computer exploits in history happened against a vulnerability for which a patch already exists?

That’s just what happened with the WannaCry (also called WannaCrypt) ransomware attack that crippled hundreds of thousands of computers last Friday and continues to wreak havoc this week. Continue Reading…

Page 1 of 2012345»1020...Last »
-->