Last week we talked about vendor evaluation from an MSP perspective and this week we talk about it from a client or end-user perspective. Join me as I sit down with Jon Munford of New London Community School District to conti...
In this two-part series we are taking a look at vendor evaluation from the perspective of an MSP and then next week we will look at it from the perspective of a client. While checklists are important one thing that comes up ...
Having gaps in your cybersecurity is inevitable, but plugging gaps with products and services doesn't necessarily make you more secure. It may put your business at a greater risk of compromise. I had the opportunity to sit d...
Policies are a hot topic as insurance companies ask to see them, clients of clients ask to see them and even our peers are asking to see what policies we might have in place. Join me this week as I sit down with Joe Ambrosol...
Sitting down with Marcus J. Ranum, Author of "The Myth of Homeland Security" and credited with a number of innovations in firewalls and intrusion detection systems, as well as being a co-founder at Tenable. We take a look at...
Whether you are required to adhere to regulatory compliance or have voluntarily picked a framework to map your cybersecurity strategy and you inevitably come to crossroads with a vulnerability assessment or a penetration test...
LinkedIn as a social networking platform is an extremely powerful tool. I was given some advice recently, by Corey Munson of PC Matic that I should connect with ProCircular. I followed Corey's advice and randomly selected a...
In this week's episode, I sit down with Stel Valavanis of onShore Security to discuss Cybersecurity tools and solutions from the perspective of an MSP. Stel brings a lot of insight as he has been an MSP who focused on the SM...
One MSP’s journey and transformation into an MSSP or as I like to call it MSsP. Join me as I sit down with Chad Lauderbach of Be Structured Technology Group and hear first hand what it takes.
We have talked about compliance and frameworks. We have talked about products and services and the gaps they fill to improve our security posture. We have even spent time mapping those products and services to the controls th...
For the first time in the MSP 1337 podcast series, I get to sit down with a friend and colleague from across the pond. An opportunity not to be missed as I sit down with Ian Trump-Thorpe to discuss the Great America Recovery....
MSPs have always provided to their clients' products and services that fall into the domains of Detection and Protection as well as Identification. That said, there are two categories in the NIST domain that have often been ...
The past decade and beyond the MSP has always been about managing the technology infrastructure of their clients. As the evolution of an MSP has gone from a business model that was largely break-fix has become over time a pe...
A brief trip down memory lane to simpler times... Looking back 3-5 years we took on the likes of ransomware and malware with additional tools and products that made us look, dare I say, pretty good to our clients in keeping t...
When drinking from the same cup or bowl doesn't make sense. Adding redundancy and capacity in the event there is an outage, not so much for your client but for you, the MSP. This week we welcome back Eric Hanson of Inland P...
I recently had an opportunity to sit down with a long-time friend and colleague, Jason LeDuc of AccessIT Group , and discuss CIS Top 20 and a walk-through of the critical 6. We spend a few minutes on each control, and that w...
This week I had an opportunity to sit down with Corey Muson of PC Matic and talk about Cybersecurity in the K12 space. MSPs have a huge opportunity to come into the K12 space and help the Tech Directors and other K12 staff n...
It is 2021 and we are jumping right in with a conversation focused on co-managed IT and an idea that says we have to educate the unwilling. We aren't as important as we would like to think we are and our clients and prospecti...
Each Week we talk about a different area of Cybersecurity and how it pertains to an MSP. This week I discuss with Eric Hansen of Inland Productivity what it means to position and sell security services, The number of dashboa...
In this episode, I explore with Colin Knox of Gradient what it means to have alignment with our vendors. That not all of our vendors are a good fit for every client. Last but not least make sure that your clients know who you...
What is the correlation between Insurance and Ransomware? Are Insurance companies and Threat Actors in cahoots? Find out as we explore the challenges faced by MSPs. I am joined this week by Frank Bauer of Vade Secure and t...
What does 1337 mean? How did MSP 1337 come about? and more of shiny object syndrome. Join me with our returning guest Joshua Smith as we talk about the mistakes we made when we ran Untangled Solutions and how to avoid our pi...
As a former MSP and a consultant to many MSP and MSSPs I wanted to take a few minutes to talk about "Shiny Object Syndrome". Many of you who know me know that I have always struggled with what I refer to as the shiny object ...
Almost every MSP I have ever talked to has dealt with change control but very few have a change control plan. The feedback is often tied to lack of caring on the part of the clients or it slows us down and prevents us from ge...