Operations | Monitoring | ITSM | DevOps | Cloud

NinjaOne

Reaffirming Our Commitment to Partners During Seismic Moves in the Channel

In light of the news that Datto is being acquired by Kaseya, we’ve understandably had partners reach out asking for our take along with a variety of questions. In addition to responding 1:1, I also wanted to share some thoughts in a broader way here on the blog. For starters, I think this acquisition reflects a reality that we have long believed — that the MSP market is healthy and growing fast. Investor interest wouldn’t be so high, otherwise.

Getting Back into In-Person Sales & Networking

As the world opens back up, are you missing in-person sales and networking opportunities that growth-focused MSPs are jumping on? View this recording of a special live discussion with growth and revenue expert Adam Slutskin, the channel veteran behind wildly successful worldwide sales and marketing strategies at Liongard, ConnectWise, and others.

Building a Culture of Security: Practical Tips to Spot a Phish

Technologies exist to limit and spot the number of phishing emails that come into your business. Still, humans are the last line of defense against social engineering attacks like this at the end of the day. At some point, you're going to "be beat" as an employer or MSP. Instead of locking everything down and slowing business communications, staff from the c-suite on down need to be equipped to identify phishing emails, so the worst happens in a training environment and not the real thing.

10 Help Desk Best Practices for IT Professionals

As people continue to expand their business operations on technology and devices, the necessity of a functional and efficient help desk cannot be overstated. With ticketing software, help desk teams can provide excellent and swift assistance that keeps end users productive and IT operations running smoothly. As these roles become increasingly important to maintaining efficient workflows, organizations should understand how to apply best practices that make an impact.

Hardware Asset Management (HAM) Explained

A well-run IT team keeps track of every asset in their domain, including hardware, software, and licenses. The specific task of managing hardware assets is known as hardware asset management. This involves keeping tabs on hardware from the time it's requested and purchased to the time it's phased out of use and disposed of. As you can imagine, this can be a daunting task when handled manually. Without procedure and special tools, the process can be scattershot and rife with opportunities for error.

Driving Business Efficiency with Endpoint Management

Endpoint management solutions enable businesses to manage their entire IT portfolio more efficiently and effectively. Combining monitoring, management, patching, remote support, and automation functionality in a single-pane-of-glass, endpoint management solutions like NinjaOne give you full visibility and control over your IT assets.

What is Microsoft's New Commerce Experience (NCE)?

Microsoft began the launch rollout of the New Commerce Experience (NCE) in January 2022. This launch brings about changes that impact how MSPs and end-users purchase Microsoft 365 licenses. In addition, Microsoft created the NCE to reduce complexity and offer savings for long-term commitments while also bringing on new features to make CSP a competitive alternative to the traditional Enterprise Agreement (EA). This post will cover everything you need to know about Microsoft NCE.

7 IT Asset Management (ITAM) Best Practices for 2022

Technology has become increasingly prevalent in business operations, to the point that it's practically mandatory. IT assets can range from individual computers to entire networks. Since there are typically countless different IT assets, the process of IT Asset Management has become increasingly essential.

April Phools' Phishing Challenge

Can you do what you advise your clients and spot a phishing attempt when you see one? Watch this "April Phools" edition of our MSP Live Chats series with special guest Connor Swalm, CEO of Phin Security, who showcased the latest tricks and tactics attackers are using to get victims on the hook. Don't miss OITVOIP CEO Ray Orsini, Lifecycle Insights' Alex Farling, and the rest of our panel as they played a high-stakes game of "spot the phish" on the LIVE event.

4 Big Risks to Your MSP Business: And Candid Tips to Mitigate Them

Owning an IT business isn't for the faint of heart. Risk naturally comes with the territory, but according to successful MSP veterans, owners can do several key things to mitigate their risk and give themselves a foot up over the competition. Instead of preparation and proactivity, many businesses find themselves where quick reactions to risks that arise are the only way forward—business whack-a-mole, for lack of a better term.