Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Mail Assure achieves top result in Virus Bulletin testing

We’re pleased to announce that N-able™ Mail Assure has received a top result in an independent test conducted by the Virus Bulletin, an industry-renowned test laboratory and an important reference for specialists and businesses concerned with computer security. So, what exactly is this test and how did Mail Assure achieve such a great score?

What does a mature MSP actually look like?

We talk a lot about MSP maturity, but I wanted to take the opportunity in this blog to really consider what that maturity actually looks like. For starters, I believe there are three key areas of excellence that currently define maturity in an MSP business: In all these areas, mature MSPs are constantly tweaking the dial and making ongoing investments.

Is babysitting backups destroying your employee retention?

Skilled technical people are the key to any MSP’s success and growth. In fact, data from Service Leadership shows the inability to get and keep such talent can be a top business risk for MSPs. It’s not surprising. These individuals are in high demand, and typically have their choice of where to work. The shocking thing is how often an MSP’s own process and technology choices impact their ability to attract and retain needed colleagues.

Use cyber-intelligence to expand cyber-services & increase differentiation

As MSPs expand their cybersecurity offerings, cyber-intelligence is an area that can help them improve protection for customers, generate additional revenue, and differentiate their services from the competition. However, when we talk to MSPs about cyber-intelligence, we often get the raised eyebrow. This reaction is driven by many factors. One of which is the nebulous meaning of cyber-intelligence—what is it really?

Adding Mac support, part 1: I've never used a Mac, and now I need to manage them

Being in IT can sometimes feel a bit like being a doctor—you’re often called upon to give people the bad news that their beloved computer isn’t going to make it. Other times, people think you’ve performed a miracle just by doing your job and saving their data. Then, there’s the Thanksgiving problem, where any time you’re at a family gathering, you get cornered by a relative wanting to talk about their tech problems, regardless of your actual area of expertise.

Update on the Nobelium APT Attack Group

If you’re like me, you started your week by reading the Microsoft blog about Nobelium, an advanced-persistent-threat (APT) group that was actively targeting cloud service providers (CSPs) and managed services provider (MSPs) in a recent wave of supply chain attacks. Personally, I wasn’t terribly surprised. We all know by now that MSPs have a bullseye on them for adversaries wishing to target the supply chain. What’s different about this attack is the motive.

DNS filtering: What is it and why do companies use it?

The Domain Name System (DNS) makes it possible for users to access websites using domain names, like wikipedia.org, in place of nine-digit IP addresses. Due to its ubiquitous nature, DNS can be used to block access to selected websites, which is commonly known as DNS filtering. Many companies see security and productivity benefits from implementing this strategy where appropriate. Read on as we explore some of the key details around how DNS filtering works and how it can be beneficial.