Operations | Monitoring | ITSM | DevOps | Cloud

March 2024

MSP Lawsuit Underscores Importance of Multi-Factor Authentication (MFA)

Sacramento, CA law firm Mastagni Holstedt has alleged that its MSP LanTech LLC failed to protect it from a ransomware attack that took down its systems. According to ChannelE2E, Mastagni Holstedt is also suing LanTech’s backup vendor Acronis, which has denied any responsibility for the ransomware attack. We’ll be watching to see how it all shakes out. In the meantime, let’s look at what happened and what we can take away from it. Hint: multi-factor authentication matters. A lot.

Microsoft Releases Out-of-band Updates to Address Critical Windows Server Domain Controller Issue

In a recent development that has sent ripples across the IT landscape, Microsoft has identified a critical issue plaguing Windows Server Domain Controllers (DCs). This issue, originating from a memory leak within the Local Security Authority Subsystem Service (LSASS), has emerged as a significant concern for organizations relying on both on-premises and cloud-based Active Directory domain controllers to process Kerberos authentication requests.

Network Technician Guide: Key Roles, Tools, and Career Growth

In the ever-evolving landscape of the digital era, the backbone of our interconnected world is woven together by an intricate web of networks. Behind the scenes, ensuring the seamless operation of these networks are the unsung heroes known as network technicians. These skilled professionals wield their network toolkits to maintain, troubleshoot, and optimize the complex systems that keep our data flowing and communications thriving.

Why MSPs Are Choosing Virtana for AIOps and Observability

If you are an MSP, AIOps can be a game changer for your business. By leveraging AI-driven automation, analytics, and insights across your managed IT services portfolio, you can drive operational excellence, improve service quality, and deliver greater value to your clients. But there are many AIOps and observability tools in the market. Here are 13 reasons why many MSPs select Virtana as their AIOps and observability partner of choice.

How to Deploy Applications Using Microsoft Intune Admin Center

Deploying software used to mean traveling to the physical location of each machine and running the executable file. However, with today’s distributed workplaces and remote and hybrid workers, that’s not a feasible solution. Fortunately, your IT team can use remote management tools to deploy apps and software updates without leaving their desks.

7 Most Common Types of Cyber Attacks: How to Spot and Prevent Them

There are many ways a malicious actor could get into your systems, and the list of threat vectors is increasing every day. Understanding the types of cyber threats you’re most likely to encounter puts you in a good position to build up your security practices against them. This article reviews the 7 most common cyber attacks and best practices you can implement today to strengthen your defenses.

Elevate Your Security with 8 Network Segmentation Best Practices

There are many moving parts to a zero trust strategy, and network segmentation cybersecurity is an important piece of the puzzle. Network segmentation involves dividing a network into smaller, isolated segments to minimize the potential damage caused by unauthorized access or attacks. In this article, we will explore the role of network segmentation in security, the key principles behind it, and eight network segmentation best practices to implement it effectively.

AIOps as a Service for MSPs: What to Look For

AIOps is a game changer for MSPs. But how do you implement AIOps to ensure you get those game-changing benefits? Chances are, you’re not interested in spending the resources and time required to build it yourself with all of the development, testing, maintenance, etc. that entails. Instead, AIOps as a service provides you with the capabilities to better manage the IT infrastructure and operations of multiple clients.

MSP innovation requires a flexible toolkit

In a recent meeting, long-time N-able partner Wade Weppler of WW Works mentioned that one of his customers requires high availability for a business-critical application. “High availability,” in this case, meaning two fully replicated servers set up for nearly instant failover. Weppler solved this using Hyper-V’s native replication. “There’s no extra cost, other than the second server, but Hyper-V replication is complex to set up and manage,” he said.

Network Troubleshooting: A Guide for IT Professionals

Imagine your organization’s network suddenly goes down, halting operations and causing revenue loss by the minute. While this scenario is unsettling, it goes to show why network troubleshooting skills are essential for today’s IT professionals. The smooth operation of network infrastructure not only supports your organization’s day-to-day operations, but also safeguards against disruptions and downtime.

Mastering SNMP Traps: Understanding, Implementing, and Best Practices

Effective network monitoring and management are essential for maintaining optimal performance and ensuring business continuity in today’s complex IT environments. One of the key tools for achieving this is the Simple Network Management Protocol (SNMP), which can be used with SNMP polling or SNMP traps.

6 Ways AIOps Is a Game Changer for Managed Service Providers

The managed service provider (MSP) model delivers tremendous value for clients. They benefit from expertise and implementation that would be difficult and cost-prohibitive to build and manage themselves. The MSPs take on those responsibilities, which means they are on the hook for delivering the services to their clients in an effective and efficient manner.

The Risks of Delayed Patching: A Guide to Fix Slow Patching

In today’s interconnected world, the digital landscape is evolving rapidly, but so are the threats that lurk within it. Cyber threats have become more sophisticated and pervasive, targeting organizations of all sizes and industries. This reality underscores the critical need for robust cybersecurity measures, including regular software updates with concerns in regards to the risks of delayed patching.

Patch vs Update: Understanding the Key Differences

The two main ways to improve software are through patches and updates. While some may use the terms interchangeably, they are distinct processes that serve different purposes. By recognizing the differences between patches vs updates, software developers can effectively prioritize and communicate the nature of their releases, and your IT department can easily implement its patch management solution.

Patch Management Mistakes and How to Avoid Them

Because we live in an era where digital security is under constant threat from evolving cyber risks, effective patch management is more critical than ever. This strategy is not just about keeping systems up-to-date – it’s a comprehensive approach to safeguarding IT infrastructures against a spectrum of cyber threats, ensuring systems remain secure, compliant, and operationally efficient.

Unlocking Growth: The Power of Peer Groups for MSPs

In this blog I want to delve into how and why Peer Groups offer a game-changing opportunity for business growth. Peer Groups serve as invaluable platforms where MSPs can come together to share insights and learn from each other’s experiences—good and bad—to enhance operational efficiency, and foster collaborative growth strategies.

Optimizing SD-WAN Monitoring and MSP Team Productivity in Co-Managed Environments with Obkio's MSP Plan

At Obkio, our mission is to provide comprehensive network monitoring and troubleshooting solutions tailored specifically for MSPs (Managed Service Providers), ensuring the proper functioning of their networks and services for their clients. MSPs are a big part of our client base and we've had the chance to chat with numerous business owners and network admins to really get to the core of their needs. Why?

Administration and User Management in Linux: A Complete Guide

Open-source Linux powers everything from servers to personal computers and has become one of the most popular operating systems in the world. Linux administrators must have a solid understanding of Linux administration and Linux user management to manage and secure systems effectively.

A Complete Guide to IT Change Management

In this article, we’ll take on the intricacies of IT Change Management, providing you with a roadmap to navigate transitions smoothly and enhance the resilience of your IT infrastructure. Whether you’re a seasoned IT professional or a newcomer to the field, our guide offers a wealth of knowledge, encompassing essential strategies, best practices, and expert insights to empower you in fostering a culture of change readiness within your organization.

12 Essential Strategies to Improve IT Communication

As organizations navigate complex technological landscapes, the ability to convey ideas, address concerns, and foster understanding becomes paramount. In this article, we delve into essential strategies to improve IT communication, presenting 12 essential strategies that can significantly enhance the way teams within the IT realm interact and collaborate.

Demystifying Zero Trust: Why MSPs Need to Take it Seriously

If you’re still relying on VPN servers to protect customers’ infrastructure, you could be leaving them as sitting ducks for cyber-attacks. This may sound like scaremongering, but VPN servers have increasingly come under the spotlight since COVID-19 forced the world to embrace remote working, and then again in 2021 as hackers shutdown the Colonial Oil Pipeline in the U.S. after gaining VPN access. However, VPN is now facing a much larger threat: an extinction event, driven by Zero Trust.

10 Best Remote Monitoring & Management (RMM) Software Solutions [2024]

Remote monitoring and management, or RMM in short, is software that is widely used by many managed services providers (MSPs) today, and for good reason. As its name suggests, an RMM allows your organization to remotely gather information from multiple endpoints and networks and perform various remote IT management tasks on them without disruption. The benefits of such a tool are priceless, especially as more and more teams become remote and distributed.

How Human Error Relates to Cybersecurity Risks

In the digital age, the threat of cybersecurity breaches looms larger than ever. Inadvertent actions, such as clicking on phishing links, falling victim to social engineering tactics, using weak passwords, or neglecting essential security practices, contribute significantly to cybersecurity risks. These actions create openings for cybercriminals to exploit, leading to unauthorized access and data breaches.

What Is WAF? Web Application Firewall Defined

The rapid evolution of technology has given rise to sophisticated cyber threats that can exploit vulnerabilities in web applications. Cybercriminals continually devise new methods to compromise data integrity, confidentiality, and availability. To counter these threats, organizations must adopt advanced security measures that go beyond traditional security protocols.

Server Management with Windows Admin Center

Windows server management is complex, and when your servers are running in different locations — on-premises, in a distributed network, in Azure, virtually, or in a hosted environment — it gets more complicated. You can simplify server management with Microsoft’s Windows Admin Center, which makes it easier to manage servers, wherever they are, from a single interface.

BYOD Security Guide: Top Threats & Best Practices

Bring Your Own Device (BYOD) is a policy allowing employees to use their personal devices for work-related activities. It is an approach that promotes flexibility and efficiency and has gained widespread adoption in recent years. The BYOD policy framework outlines guidelines and rules governing the use of personal devices in a professional setting, and its significance lies in establishing boundaries that balance the benefits of flexibility with the need for security and data protection.