Featured post

MSP Voice Episode 8: Kevin Bissinger from Dentek Systems, Inc

In the 8th episode of MSP Voice, we are joined by Kevin Bissinger from Dentek Systems, Inc.

Dentek Systems, Inc. (DSI) was founded in Richardson, Texas circa 2002 as a turnkey Information Technology and Audio/Video solutions provider. We offer an array of services and support for new and existing small to mid-size companies. We specialize primarily in the healthcare industry, however, we have experience with a wide variety of professional and residential projects.

This is also the very first episode to feature our new rubric - the Best of Reddit where we choose the most interesting (in our opinion) topics from r/MSP subreddit. Check the 8th episode of the MSP Voice under the cut!

Continue reading

Featured post

Coming Soon: CloudBerry Managed Backup for iPhone and iPad

Today we're excited to announce our upcoming product — CloudBerry Managed Backup for iPhone and iPad. As CloudBerry MBS continues to evolve as a full-fledged software-as-a-service solution, it is only fitting that we enable our MSPs to track backup activity of their users on the go with the help of a mobile app.

Continue reading

Full Disk Encryption: Approaches and Solutions for MSPs

Full Disk Encryption bitlocker

Data leaks and ransomware infections are common threats nowadays, which you can avoid by using data encryption technologies. If no one can read your data, you do not need to be too afraid of its theft.

That is why it is becoming more popular to encrypt system drives. In this article, we are going to overview the BitLocker tool and a few of its alternatives. Continue reading

A Few Steps to Windows Server Hardening

Windows Server Hardening Checklist banner

What is server hardening? There are many different ways for a hacker to attack a Windows server, from unpatched system vulnerabilities to misconfigured settings, unnecessary protocols, or vulnerable applications. The process of getting these vulnerabilities closed off or patched (or at least most of them) is server hardening Continue reading

Cloud Disaster Recovery: Building a DR Plan for the Cloud

Cloud Disaster Recovery Guide

You can never know when a disaster will occur to your cloud infrastructure. You can, however, prepare a cloud disaster recovery plan that enables you to restore operations quickly whenever disaster does strike your cloud. This article explains how. Continue reading

Want to Start Your Own MSSP? Here’s a Basic Checklist

MSSP Managed Security Service Providers article

Cybersecurity threats are constantly evolving. It’s absolutely necessary for businesses with internal or external networks to run intrusion detection and prevention systems, antivirus solutions with advanced malware detection heuristics, vulnerability monitoring, ensure regulatory compliance and maintain security information and event management systems. Continue reading

Spear Phishing Prevention Best Practices and Tools

How to Prevent Spear Phishing Attacks

What Is Spear Phishing?

Spear phishing attacks are executed through the use of electronic or email communications. Targeted phishing may impact an individual, corporation or business, depending upon the objectives and intentions of its perpetrators. Cybercriminals may launch spear phishing attacks for the following reasons: Continue reading

Fibre Channel vs. iSCSI

FC vs FCoE vs iSCSI

A SAN is a key piece of technology in data storage in several types of infrastructure, but there are varying implementations and standards on the market. In this article, we are going to review the key differences between FC, FCoE and iSCSI in order to help you choose the best option. Continue reading