Join us at the IT Nation Explore 2019! The conference runs from the 13th to the 15th of June and is one of the largest MSP events of the year. Continue reading
There’s a common misconception out there today: Linux is safe - Windows is not. This simply isn’t true. While there may be more vulnerabilities and risks out there for Windows operating systems - our ways of looking at this needs to change. Instead of looking at the chances of risk, a more binary approach needs to be taken. Continue reading
This is our 1 year anniversary week for the MSP Voice podcast!
And this week I was thrilled to have Tom Lawrence back on the podcast. Tom was our first guest and also our most popular. We calculated our top 10 episodes/guests for the first year and Tom came out on top!
In the last article, we went over the process of addressing a compromised account, taking the appropriate response actions to ensure the account is safe and back under the end user’s control.
Now, as a follow up to the previous article, we are going to review the actions needed to properly secure an Office 365 tenant. These steps are geared towards MSPs who manage multiple Office 365 tenants and require some level of automation to configure Office 365 tenants in bulk. Continue reading
Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new.
These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. Continue reading
Arismonty “Monty” is in the Dominican Republic and has built a business by just focusing on a few core services instead of trying to offer everything. With natural disasters like hurricanes and earthquakes, data protection and continuity services are their main offering. Eridani focuses on building trust with their clients and that is paying off in referrals. Continue reading
This week we have Jorge Prieto out of Texas. Jorge has been in services for 14 years and joined forces with his friend about 3 years ago and business has been great. Like most, Jorge started out with break-fix but now almost all of his clients are on a monthly contract. Continue reading
Attempts to infiltrate malware onto computers systems typically come from one of two sources: email and web sites. The most effective often use both. Phishes are one type of email used to attempt to get users to click on a link that will either get them to install malware or enter user credentials that can be used to infiltrate a real website. Continue reading
Heading out to California to work in the oil and gas industry, Joshua found himself jobless after an explosion in the refinery he was supposed to be working at. While doing odd jobs and temp work, he stumbled onto an opportunity setting up a PC for the temp agency. Working inside appealed to Joshua so he spent the rest of the summer doing PC setups. Continue reading
On April 18, 2019, CloudBerry took part in the SMB TechFest at the Business Expo Center in Anaheim, CA. And we were honored to get the Best Solution Award!
It was great meeting so many managed service providers, expert speakers, vendors at the event. We really enjoyed discussing marketing, sales, technology, business operations, and what you need to grow your business.
George Monroy is based out of San Antonio, TX. His route to becoming an MSP started out as being a temp at a company. When that company let go all of their temps, he was actually “hired” back as a consultant. Starting out as part-time, the opportunity eventually grew to his only client until the company was purchased. He then moved to San Antonio and started up his own IT services business. Continue reading