Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

7 email blocked list prevention practices for businesses

Email blocked listing is a major problem, but sometimes overlooked in the conversation around spam and email threat prevention . The impact on a business can be devastating if it isn’t caught in time, especially if the company relies on email marketing for lead generation and customer correspondence. While it’s possible to recover from the effects, it’s a complicated process and may set back productivity in the meantime.

3 Sales tips to end the year strong

Happy New Year everyone! Don’t worry, I’m well aware it’s only August and we still have another four months or so before the “official” new year arrives. But with the winding down of summer and the commencement of the school year, I tend to view September as a type of New Year as well. September has always been my favorite month of the year.

Switching RMMs: are you doing it for the right reasons?

Sometimes it makes sense to switch your RMM vendor. For example, if your services have evolved to new requirements or you know there’s a good vendor who can really help your business. But I often see MSPs consider it for the wrong reasons. They think they’ll find a silver bullet in the next technology solution, not realizing their technology issue may actually be a deeper business issue. This is where having an MSP vendor who truly treats you as a partner can matter.

The number one business bad habit MSPs need to stop doing immediately

The N-able Head Security Nerd, Lewis Pope, just published a blog outlining the top 25 cybersecurity bad practices demonstrated by MSPs today. To accompany his post, I wanted to add one more risky bad habit to his list. It’s something I commonly see being practiced by too many MSPs from a business perspective—allowing a customer’s budget to dictate what a cybersecurity offering should look like.

25 cybersecurity bad practices: more than just bad habits

The CISA (Cybersecurity & Infrastructure Security Agency) recently started an initiative to create a catalogue of exceptionally risky cybersecurity bad practices. While this will be a welcome and very useful tool once it is complete, only two practices are currently listed. Since cybersecurity and business decisions can be time-sensitive, we wanted to expand on the CISA’s list.

How we keep N-central updated and secure

Following the security issues in the MSP market over the past 24 months, our customers, who are understandably concerned, have been asking what we do to keep the N-central® appliance (hosted or on-premises) updated and secure for them. I will do my best in this short article to outline how our engineering team keeps up with security. Please note this is valid as of the time of writing, but can change at any point.

How Should an MSP Evaluate a PSA Solution?

Managed services providers (MSPs) juggle a lot of responsibilities. They have to address rapidly changing customer demands while still providing high-quality service, managing increasingly complex environments, evolving their service offerings, and much moreyou’re your business scales, it’s hard to accomplish these goals without the help of professional services automation (PSA) software.