Operations | Monitoring | ITSM | DevOps | Cloud

June 2022

3 Enterprise IT Factors That Will Make MSPs More Successful in 2022

A version of this blog first appeared in APMdigest. A new study by OpsRamp on the state of the Managed Service Providers (MSP) market concludes that MSPs face a market of bountiful opportunities but must prepare for growth by embracing complex technologies like hybrid cloud management, root cause analysis and automation.

Network Basics: What Is SNMP and How Does It Work?

Simple Network Management Protocol (SNMP) is a way for different devices on a network to share information with one another. It allows devices to communicate even if the devices are different hardware and run different software. And despite any rumors you may hear, it’s not going anywhere anytime soon.

What Is Antivirus Software?

Antivirus software refers to any program that’s specially designed to detect and remove malicious software (malware). After installation, antivirus software usually works continuously in the background to offer real-time protection against viruses and malware. A comprehensive AV solution can help you protect your device or network from various cyberthreats like malware, spyware and phishing.

Seven Easy MSP Marketing Activities You Can Do This Summer

Just because school is out doesn’t mean that you should let your marketing efforts take a summer vacation as well. Here are seven easy activities to market your MSP that you can implement that will keep your marketing efforts chugging along through the heated months to set you up nicely for the fall and winter ahead.

The Auvik Network Device Buyer's Guide

Buying the right network devices is an essential part of network design, and can have an impact throughout the network lifecycle. Get it right, and your network is high-performing, easy to troubleshoot, and reliable. Get it wrong, and downtime, complexity, and costs add up fast. A network device buyer’s guide would probably be really helpful. So we made you one.

How to Detect Ransomware: 12 Monitoring & Alerting Opportunities to Automate

Ransomware threatens the loss of crucial data as well as financial loss. However, with the right knowledge and tools, you can take action to protect your business from the damaging effects of ransomware. In a 2022 Coveware Q1 ransomware report, the average ransom payment was $211,529 with an average of 26 days for downtime suffered. Ransomware obviously continues to be a huge and costly threat to industries across the board.

Network Configuration Management: The Benefits & Importance

Configuration management is one of those network management topics people often neglect. It’s not very exciting—but it’s incredibly important. Administrators rely on network configuration management in a variety of circumstances. Let’s discuss what network configuration is, delve further into the importance of network configuration, and explore the benefits of configuration management.

Infrastructure Monitoring: Definition & Best Practices

Organizations are continually increasing the number of devices and technologies used within their IT environments. To ensure these IT environments are functioning well and providing users a good experience, a company’s IT infrastructure must be tracked and maintained. This is accomplished through the use of infrastructure monitoring.

The Path to Continuous Cloud Optimization

Implementing change in an organization always has its challenges, and for it to be successful it requires support from executive management. For one of our large Managed Service Provider (MSP) clients, their new CIO was focused on making their customer’s cloud consumption more efficient, with the outcome being cost savings.

Accelerating the Path to Managed Cybersecurity with M&A

MSPs operate in a challenging and competitive marketplace. Small and medium-sized business (SMB) customers increasingly view the core IT infrastructure support services MSPs have long provided as commodities. At the same time, competitors are growing larger and more sophisticated as industry consolidation continues. Private equity investments have created more than 80 MSP platforms that are aggressively pursuing add-on acquisition opportunities.

When End Users Attack: Tips for Fixing a Hostile Work Environment

Hostile work environments are a real problem in tech and can be a significant driver of IT job stress. This is particularly true for IT helpdesk and support roles. Helpdesk agents often complain of burnout and frustration related to how end-users treat them. IT service roles will never be “stress-free”. The nature of break-fix work for critical systems inherently comes with the job.

Macs and malware, part 2: Are Macs more secure?

Are Macs more secure? If that’s not the very definition of a clickbait headline, I don’t know what is. Spoiler warning: While I have opinions, I’m not a security expert with multiple certifications or years of experience in the field. So, I won’t take sides as to which operating system is the most secure.

Cove Data Protection Modernizes DRaaS with New Standby Image Feature

We’re please to announced that we’ve added a Standby Image feature as part of our Cove Data Protection™ solution. This enables us to deliver on the promise of cloud-first data protection as-a-service combined with business-class disaster recovery, by making it easy to create, manage, and report on virtual server images in the partner’s location of choice, ready for fast and flexible disaster recovery, without an expensive proprietary appliance.

How to Design a Network: 6 Best Practices for Success

A network provides a way for many computers to all be connected and exchange data with each other simultaneously. It allows members of organizations to quickly complete tasks, share information, and carry out any computing responsibilities that rely on a working network. It’s important for each organization to ensure that their network design is suitable for their needs.

Data Protection Plan: Guide & 8 Steps for Creation

There has been a sharp increase in the amount of personal and organizational data that is stored online and on devices. Losing this data could result in disastrous consequences for businesses or individuals, which means that data protection is certainly necessary. Data protection plans are essential for the safety and security of data within all organizations.

How to Respond to a Ransomware Attack the Right Way

It seems that every day we see another ransomware headline. But too often, backup and data protection solutions treat ransomware recovery just like any other type of recovery. The truth is recovery from ransomware has different requirements (and different best practices) than recovery from fire, flood, or hardware failure.

How Long Do Laptops Last? Overview for Organizations

Because of their portability and functionality, laptops have seen explosive growth in many organizations. Today, a new laptop is a typical component to a new employee’s onboarding package. The pandemic driven remote work boom has only accelerated the trend towards laptops and managing these IT assets, including their lifespan, has become a critical task for modern IT professionals.

9 Essential Steps of a Server Hardening Process

In any given IT environment, a server is the foundation that provides services for endpoints to carry out various actions. They are essential for computer networks to have shared access or information. Unfortunately, servers are often targets for cyberattacks due to their ability to reach other parts of the IT environment and wreak havoc. With these attacks on the rise, developing a server hardening process will help organizations improve its security posture.

Your Marketing Worked and You Got the Prospect Meeting... Now What?

Lead generation continues to be the number-one challenge facing MSPs today. Many of my blog posts to date, along with several of the boot camp sessions I have delivered so far, have been focused on this all-important topic. But what do you do when you get a bite and you now have a prospect that wants to meet with you? How do you structure this critical first meeting so that you can successfully navigate the prospect through the rest of the sales funnel to becoming a signed, closed deal at the end?

Do you work as an MSP? Here's why you should invest in an RMM solution.

As a managed service provider (MSP), you are expected to deliver a broad spectrum of IT solutions to meet diverse clients’ needs. With the new normal of remote working and clients based across multiple industries and different time zones, you would have to devote a lot of resources to guarantee reliable service delivery. Furthermore, ensuring seamless deployment, driving user adoption, and generating ROI can be daunting if your clients are using multiple tools.

N-central Custom Properties, if you're not using them, you should be

Over the years, I’ve spoken with many of our partners that use N-central, and it always amazes me how few leverage custom properties. Often when I explain one or two uses for them, their minds are immediately racing with other potential uses as well, so today we are going to look at some of the many uses for custom properties and how they can benefit the support and service you provide to your clients.