Operations | Monitoring | ITSM | DevOps | Cloud

MSP

The latest News and Information on Managed Service Providers and related technologies.

Business continuity after a ransomware attack: the case for end-to-end encryption

Imagine the scenario: you get an urgent call from one of your customers. All her files seem to be corrupted. And then there’s that email demanding payment via Bitcoin for restoration. She needs your immediate help to get her business up and running. Later on, she’ll demand to know how you let her business be vulnerable to this attack. You had installed firewalls, required strong passwords, and conducted email phishing drills—and still your customer was attacked.

SAP HotNews analysis: What MSPs need to know

SAP is one of the most business critical enterprise applications. As a result, keeping it secure is a top priority for managed service providers. In the last year SAP has notified its customers of multiple high risk vulnerabilities, through its SAP HotNews email alerts, which require urgent patching – but the challenge for MSP clients is to know “do these impact me?”

7 Reasons Why MSPs Benefit From IT Automation

Automation has become the backbone for businesses wanting to stay afloat in the highly competitive markets today. Managed Service Providers (MSPs) are among those reaping heavily from IT automation processes. The benefits MSPs obtain from IT automation include lower costs, reduced errors, and increased productivity. With automation, MSPs can acquire better data, become more reliable, and scale their operations.

What Is Credential Stuffing and How Do You Prevent It?

In their effort to protect their customers from a range of modern threats, managed services providers (MSPs) may encounter a strategy known as credential stuffing. This hacking technique involves rapidly inserting large numbers of usernames and passwords—often collected from corporate data breaches—into the login fields of other sites and digital services.