Operations | Monitoring | ITSM | DevOps | Cloud

March 2020

3 Marketing Activities to Keep Your MSP Healthy During COVID-19

If you sit back and look at what you’ve actually achieved over the last couple of weeks, you should feel very proud of yourself and your team. With virtually no warning, you’ve supported your clients well through the greatest business upheaval in modern times. You’ve probably set up countless VPNs. And no doubt you’ve been hunting around for new laptops, just like everyone else. While the COVID-19 situation is changing daily, the dust is starting to settle a little.

An Introduction to Web Proxies

Web proxies intercept traffic from your systems as they move to other systems, analyze the packets, then send the data along. There are a lot of reasons why you might want to intercept packets. Originally the main use case for a proxy was as a caching server. In this use case, the first time a person in your network goes to a website, the static content (particularly graphic images) gets downloaded and cached.

Free Software for Supporting Remote Workers During COVID-19

By now you’ve likely been flooded with dozens of client requests to set their employees up to work remotely. While it sounds like a simple request, it’s often easier said than done as many clients are missing the resources they need to effectively work from home. During COVID-19, if you’re searching for ways to quickly enable your clients to work and collaborate remotely while keeping their networks stable and secure, you’ve found it.

How Auvik Can Help Keep Networks Steady During the COVID-19 Pandemic

Your phone is ringing off the hook. Another client is calling, trying to figure out how to ensure their team can continue to be productive in the wake of the COVID-19 pandemic. Even though these are extraordinary times, your role as the IT professional hasn’t really changed. Your job is to make sure your clients are productive and they can still access the resources, tools, and applications they need to do their jobs.

What Is Two-Factor Authentication and Why Is It Important?

You’ve likely heard a thing—or two (ba dum tss!)—about two-factor authentication, or 2FA. After all, it’s become a bit of a hot topic recently as the nature and number of security breaches has evolved. Compromised user data regularly surfaces on the dark web, giving malicious actors access to your password(s) for a couple bucks. That’s why passwords just don’t cut it as your only security effort anymore—and that’s where 2FA comes in.