1st April, 2021

PSA vs ITSM vs ESM: Part 1—What do they do?

Much like anything in information technology—or IT—we live by the abbreviation of complexity. We do our very best to take things that are complex in nature and simplify them or...

31st March, 2021

Endpoint security for Mac: What you need to know In 2021

In 2021, few managed services providers (MSPs) still think of Mac devices as immune to cyberattacks, although many end users still believe it. IT professionals know the unfortunate truth is...

30th March, 2021

A guide to patch management policies for MSPs

With cybercriminals becoming more sophisticated in their attempts to access company systems and data—and with companies taking on more IT assets than ever—patch management is crucial. Managed services providers (MSPs)...

25th March, 2021

A Beginner's Guide to Unified Endpoint Management

It’s no secret that businesses across the globe are seeing massive increases in the number of devices being used to establish access to their networks and corporate data. For managed...

24th March, 2021

Does your business (really) need an email continuity solution?

Despite several new communication channels and methods popping up in recent years, email continues to play a critical role in business communications and operations. Email is ubiquitous, used for both...

23rd March, 2021

What partnering with N-able means for you

My parents came here from southern Italy and met in Boston. My father started and ran a construction company when I was growing up. I learned a lot from him;...

18th March, 2021

Data recovery: Part one—are you disaster ready?

Don’t be led astray by the common misconception that a successful backup automatically equates to a successful restore. The hard truth is most MSPs don’t perform periodic testing of their...

16th March, 2021

How to Detect and Prevent Business Email Compromise

Business email compromises (BECs) are financial scams that typically target companies and employees that carry out wire transfers. They’re usually more sophisticated than typical phishing schemes, and require a mixture of...

15th March, 2021

Intrusion Detection System (IDS): Signature vs. Anomaly-Based

Intrusion detection systems (IDS) play an important role in helping managed services providers (MSPs) establish robust and comprehensive security. There are several different types of IDS, which can often lead...

12th March, 2021

Exchange, Hafnium and You. How to Respond

As everyone has likely heard by now, Microsoft released emergency security updates on March 2, 2021 for Microsoft Exchange. These updates addressed four zero-day vulnerabilities that were being exploited as...