MSPs, know what you’re really looking for in an RMM platform
June 10, 2020 - When ransomware targeting MSPs began making headlines, things started to change. This also made MSPs assess their current RMM platform and, should they decide to switch, change the criteria of what to look out for when finding “the right” vendor. We have 5 considerations for you.
5 tips for building an effective security operations center (SOC)
December 13, 2019 - A security operations center (SOC) can significantly improve an organization's security posture, but it's not a perfect solution and can be challenging to implement. Read on to learn how to clear hurdles and build an effective SOC team.
Not us, YOU: vendor email compromise explained
November 7, 2019 - Vendor email compromise (VEC) is a new cybersecurity term for a familiar practice, taken to the thousandth degree. Learn the similarities with business email compromise and how your organization can protect against them both.
Why all organizations must better protect sensitive data
October 17, 2019 - The truth is that companies, businesses, and organizations have an obligation to the data that belongs to their employees, users, and customers. For some organizations, that obligation is a matter of real, physical safety.
Securing the managed service provider (MSP)
October 11, 2019 - Managed service providers (MSPs) have become the target of attacks, as lack of aggressive security posturing has left them—and the high-value data of their clients—vulnerable. Learn how MSPs can secure against a rising tide of threats.