Filtered by Topic: 'cybersecurity-risk-management'

In Times of Crisis, Your MSP Leads Are Closer Than You Think

I think we can all agree that the COVID-19 pandemic has presented MSPs with a range of new business opportunities, particularly in the cybersecurity space. Instead of trying to have conversations with prospects about why implementing enhanced security measures is essential, why not have candid discussions with business leaders you connect with on a regular basis?

... Read more
 
| Author Gary Pica, tagged in MSP, msp sales, cybersecurity risk management, MSP sales tips, cybersecurity

Creating an MSP Incident Response Plan? Here’s Some Advice

The best way to ensure things go from bad to worse for your MSP clients is to not have an incident response (IR) plan in place when you’re hit with a cyberattack.

And many MSPs don’t have an IR plan to follow for one simple reason: They don’t know how to develop one. To make things easier for them, Chris Loehr, EVP of Solis Security, and Wes Spencer, CISO of Perch Security, recently joined me on a webinar to discuss what MSPs should know about IR plans.

... Read more
 
| Author Gary Pica, tagged in top MSP, cybersecurity risk management, MSP security, cybersecurity

Wanted: Trustworthy Guidance from a Security Professional

In the wake of the COVID-19 pandemic, companies are facing the dual challenges of supporting employees working from home while absorbing the fallout from the associated economic downturn. Although economies are slowly re-opening around the world, it’s unclear just how long it will take to get back to where it was before the shutdown.

... Read more
 
| Author Michael Mowder, Senior Director, Global Partner Success at Barracuda MSP, tagged in cybersecurity risk management, IT security, MSP security, cybersecurity

End User Cyber Security Risks and Training Options

In today’s IT environments productivity is necessary, uptime is essential, and security is critical. The latest hardware and software provide layers of protection in hopes of preventing cyber attacks. The newest technology causes most IT providers to forget the weakest link: the end user.

... Read more
 
| Author TruMethods Standards Manager, Brian Dappolone, tagged in MSP training, cybersecurity risk management, email security, cybersecurity

Closing the MSP Cybersecurity Skills Gap

Companies often struggle to create and enforce robust cybersecurity strategies, partly because compliance varies among employees. This inconsistency could be caused by the specifics of job roles within the company that might make policies more or less inconvenient to employees based on their position. In addition, different levels of security awareness and technical skills across an organization can create further security challenges.

... Read more
 
| Author Nathan Bradbury, Manager, Systems Engineering Barracuda MSP, tagged in top managed service provider, cybersecurity risk management, MSP advice, MSP security

Security-Centric RMM: Making Managed Security Better

As the number of cyberattacks targeting small and medium-sized businesses (SMBs) increases, there is more pressure to protect against those attacks. That's why MSPs handling the IT needs of these businesses must place security at the top of their priority list. One way to build a strong security offering is from the ground up, starting with one of the most fundamental tools used by and MSP – their remote monitoring and management (RMM) solution. 

... Read more
 
| Author Neal Bradbury, Vice President, MSP Strategic Partnerships at Barracuda MSP, tagged in cybersecurity risk management, IT security, MSP security

Best Practices for Combating Spear Phishing

As we head into 2020, it’s clear that cybercriminals will continue using spear-phishing attacks as a go-to tactic for attacking victims. In these breaches, attackers heavily research their targets and craft carefully designed messages, usually impersonating a trusted colleague, website, or business. The attacks are designed to steal login credentials, financial data, and other information that can be used for other crimes.

... Read more
 
| Author Nathan Bradbury, tagged in cybersecurity risk management, IT security, MSP security

Subscribe To TruMethods Blog

Discover everything you need to know about becoming a top MSP.