3 reasons why you should offer your clients a monthly security report

Posted: November 6, 2019 / Author: Keren

MSPs today are required to manage much more than just traditional office and storage software for their clients. Nowadays, as most companies moved to a cloud based working environment, MSPs are not only responsible for managing their clients’ SAAS platforms but are expected to ensure their security.. The challenge is that most SMB clients are not even aware of the fact that cyber security for cloud-based platforms is not as ‘built-in’ as they imagine. It is common for SMBs who outsource their IT needs to an MSP to think that they are completely covered, without taking action or building a…

Read More
Recent Posts

MSP? Here are 5 ways to win and keep a client!

Posted: August 19, 2019 / Author: Keren

Here’s a shocker: 93% of SMBs said they would switch MSPs to get adequate cyber security coverage.   Some might see this as armageddon, but we see this as an incredible opportunity to retain your existing customers, and recruit many new ones.   We narrowed it down to these 5 strategies:  Actively stress the importance of cybersecurity. Let current and potential clients know that cybersecurity is always top of mind, positioning company leaders as thought experts who can be trusted. Make them feel that even if they haven’t brought up the subject themselves, they are in good hands, with a service provider…

Read More

Why any MSP can become a cybersecurity superhero

Posted: June 10, 2019 / Author: Keren

Let’s face it. SMBs are extremely vulnerable to cyber attacks, and the consequences of an attack could be devastating. While many small businesses  turn to managed service providers (MSPs) to help oversee technology implementation and management, security in many cases remains of the table as it is too expensive to deliver profitably to the SMB crowd. Recent studies shows new reality for MSPs. A study commissioned by Continuum found that “9 in 10 small businesses would hire a new MSP…

Read More
More Posts

When it comes to cyberattacks, small businesses are often collateral damage

Posted: May 14, 2019 / Author: Keren

How can small businesses can protect their assets from becoming collateral damage in a cyberattack? Large enterprises and international corporations are shining targets for hackers to gaze upon. From industrial espionage to ransomware, data theft is the obvious jackpot for the majority of malicious parties. While much attention is paid to enterprise threats and risk management, there is little spoken about the risks to the thousands of small companies surrounding the locations of big corporations. This is extremely problematic when…

Read More

Why Small Business Cyberattacks Could Prompt Next Recession

Posted: May 14, 2019 / Author: Keren

While Fortune 1000s dominate many interactions in our daily lives, small businesses remain the bedrock of the U.S. economy. According to the Small Business Administration, the 30 million small businesses operating in the United States employ nearly half of the total workforce. Unfortunately, these same small businesses have begun to fall victim to cyberattacks at an alarming rate, and whether you know it or not, this reality is putting the entire economy at risk. As large companies spend endless amounts of…

Read More

CASB is not enough

Posted: April 23, 2019 / Author: Keren

Businesses need to protect the full cloud security chain, not just part of it CASBs protect cloud data usage only when in fact, there are three other links in the security chain that could jeopardize the entire cloud security operation. The identity of the user and devices accessing the platform, the security posture of the device being used, and the security posture of network through which the connection is made. Only a trust-based platform that ensures that only trusted users,…

Read More

Jim Blasingame interviews Dror Liwer about the steps an SMB must take to avoid ransomware

Posted: March 21, 2019 / Author: Keren

Dror Liwer, our CiSO joins Jim Blasingame to reveal what ransomware is as a cyber security threat, how it costs small businesses and how to avoid it. Listen to what Dror had to say about the technical steps a SMB has to take to avoid ransomware here.

Read More

How Small Businesses Can See Past the Misinformation of Enterprise Security Companies

Posted: March 13, 2019 / Author: Dror Liwer

How small businesses can see past the misinformation of enterprise security companies Cyberattacks against small businesses are on the rise, and many are falling victim to data theft, phishing, malware and ransomware attacks at an alarming rate. According to a special report by Cisco, 53 percent of SMBs have experienced a data breach with more than half of those attacks resulting in more than $500,000 worth of damages – more than enough to put many SMBs out of business within…

Read More

Is Your Small Business Under Cyber Attack?

Posted: February 15, 2019 / Author: Dror Liwer

Is Your Small Business Under Cyber Attack? Small businesses are falling victim to cyberattacks at an alarming rate, and they must learn to better identify and respond to the threats, in spite of the real and perceived limitations to time, money and resources. Today, both the businesses’ short-term financial health and its long-term sustainability depend on a strong cybersecurity posture, as phishing, malware, ransomware, cloud and other threats prove extremely challenging for small businesses to overcome. With a relatively low…

Read More

4 Reasons Why Marcomm Agencies Must Get Serious About Cybersecurity

Posted: January 15, 2019 / Author: Dror Liwer

Attention decision-makers at marcomm agencies – whether that’s a public relations, advertising, digital media or marketing firm – when is the last time your firm truly thought about network, device or data security? If this answer isn’t “yesterday” or “today,” then your agency­, and the client data it is entrusted with, is likely at risk. Today, the vast majority of most agency’s clients invest in cybersecurity (some more than others). However, because of budget, time and resource constraints, as well…

Read More