Best Practices Tag

Network assessments are a unique and effective offering under the “network security” umbrella. A network assessment tool doesn’t simply monitor a network like RMM software does. It provides ongoing network “snapshots,” which help identify patterns and behaviors that can predict a breach. It’s a more...

“All our data is stored on servers.” You hear this over and over again, but it's almost never true. In fact, you can usually find legally protected data, including Personally Identifiable Information (PII), Protected Health Information (PHI) and business-sensitive data like payroll information, stored on desktops...

When a client says, “All our data is stored on servers,” they are usually wrong. Yes, you read that right. It’s quite common to find legally protected data, including Personally Identifiable Information (PII), Protected Health Information (PHI) and business-sensitive data like payroll information, stored on desktops...

In our first managed services client lifecycle segment, we covered acquisitions and how Network Detective can help MSPs bust through the break-point. Next up, we’re discussing onboarding.  You got your foot in the door, made your pitch, and landed the contract. Now you’ve got the onboarding. This gets your client set up with your essential tools –...