Operations | Monitoring | ITSM | DevOps | Cloud

December 2021

Why IT documentation matters in times of crisis

For managed services providers (MSPs), providing the highest quality returns on your customers’ investments is always a top priority. There are many reasons for a business to hire an MSP, but increasing IT productivity and strengthening their bottom line tends to be at the core. While many practices are essential to achieving that goal, few are more important than IT documentation, which can increase productivity, boost quality of service, and heighten consistency.

How to help make sure your clients trust your MSP business

For a managed services provider (MSP) business, building a great relationship with customers is the ultimate way to secure continued business and build your brand. Every strong customer relationship centers on one key concept: trust. Without trustworthy correspondence between you and your customers, you can’t do much to prevent your end users from switching to another MSP team.

Managing the skills gap: to hire or not to hire?

The MSP sector currently finds itself in a difficult situation: While the industry is growing, many are finding it increasingly hard to hire skilled techs quickly enough to fill their increasing knowledge gaps. We frequently hear from our partners that there just aren’t enough skilled techs in the market, and things are moving too quickly. This is particularly true in security, but it’s certainly not limited to that area.

N-able Backup and Other Keys to Our Success: Lionel Naidoo of Dragon Information Systems

N-able™ Backup has provided a refreshing take on backup and disaster recovery, as Dragon IS Director Lionel Naidoo learned firsthand. By looking beyond the traditional legacy backup solutions on the market, Dragon uncovered a golden nugget in N-able Backup.

N-able Backup and Other Keys to Our Success: Nicholas Paulukow, One2One

N-able™ Backup has proven to make a real difference in the efficiency and profitability of managed IT services provider One2One. Hear from One2One CEO Nicholas Paulukow about how the company dramatically reduced the staff time and cost needed to provide top-tier data protection services by switching to N-able Backup.

"I love it when a plan comes together"-the questions to ask your customers before the next software vulnerability

I’m probably dating myself, but I used to love the television show The A-Team when I was little. Every week, the team would be put into the middle of a problem and work together to overcome some challenge. Plus, they had Mr. T and a really cool van.

15 tips on how to market effectively when you're an MSP of one, part 1

With the end of another year, and a bright, shiny new year just ahead, many businesses take stock to reflect on their accomplishments and what they still need to do. In this vein, I have been getting quite a few questions lately about marketing and lead generation—specifically, how to conduct marketing when the MSP is small, without a lot of time or money to devote to such an initiative.

Cove Data Protection and Other Keys to Our Success: Vincent de Beer of Silverbug

N-able™ Backup offers a brilliant solution to a fairly old problem, according to Silverbug Chief Operations Officer Vincent de Beer. The cloud-first innovation from N-able has made a real difference for managed IT service provider Silverbug and its customers.

Business continuity after a ransomware attack: the case for end-to-end encryption

Imagine the scenario: you get an urgent call from one of your customers. All her files seem to be corrupted. And then there’s that email demanding payment via Bitcoin for restoration. She needs your immediate help to get her business up and running. Later on, she’ll demand to know how you let her business be vulnerable to this attack. You had installed firewalls, required strong passwords, and conducted email phishing drills—and still your customer was attacked.

What Is Credential Stuffing and How Do You Prevent It?

In their effort to protect their customers from a range of modern threats, managed services providers (MSPs) may encounter a strategy known as credential stuffing. This hacking technique involves rapidly inserting large numbers of usernames and passwords—often collected from corporate data breaches—into the login fields of other sites and digital services.