Many organizations are realizing that sometimes their weakest link regarding cybersecurity is not found within their organization but in their supply chain or with their vendors.  With their data not being within their organization it is hard to get visibility into the hygiene of the data.    The great thing is there are Risk

By Gary Audin

You have adverse events that hamper or stop your IT and network operations. There are power outages, fires, floods, and security attacks. But you must also deal with interruptions due to new application installation, software upgrades that fail, data base changes,

We met with IAMCP chapter president Danny Brown, to chat about Microsoft Inspire. Inspire is Microsoft’s worldwide partner conference. Typically, companies involved in Microsoft’s Partner Network travel from around the world to spend a week meeting with other partners, attending various sessions and keynotes led

Multi-factor authentication (MFA) is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence to authenticate themselves.  These authentication methods have

Managed Services Providers (MSPs) are hyper focused on generating new sources of revenue to generate badly needed cash to survive the current economic correction. In part one of this series on Third Party Maintenance (TPM), we painted the

Frank Ohlhorst and Harry Brelsford revisit the analytics conversation.  They tie the conversation to the current economic status and pandemic taking place.  When you couple data and analytics you can come to the conclusion on where to drive your business helping to build big profits.

Phelim Rowe joins Harry Brelsford to explore privacy with Data.  Phelim explores GDPR and the California privacy act and how it affects your data.  He then goes onto to talk about why companies collect certain information

Peeps will recall that we’ve taken a leadership position in driving the One Million Smiles campaign to send cheerful greeting cards to senior citizens who are locked down in assisted living centers and nursing homes.

Join Harry Brelsford and Phelim Rowe for a morning cup of coffee and discussion on the current state of the event industry.   Phelim noticed that people are currently thirsting for education, and are willing to attend virtual events as long as the content

Alex Fields is at it again, working on an educational piece on How to be an MSSP.  Alex has found that most MSPs are not up to date on information security and keeping their clients protected.  In these times you can’t rely on your antivirus software but instead need to do a better job of understanding the information

With the second half of 2020 coming into focus, we need to have a talk about your Managed Services Provider (MSP) business model. The original “Payroll Protection Program” funds that many MSPs received in the second quarter of 2020 are starting to run out and it’s time to talk about what’s next.

I’m suggesting we think about a well-established revenue generating opportunity known as Third Party Maintenance (TPM).

By: Gary Audin

IT assets can include servers and storage devices, but also computers, tablets, cameras, and even our phones. It is called e-waste when you discard it.

What is E-Waste?
E-waste is the term applied to consumer and business electronic equipment that is near or at the end of its useful life. There is no clear definition for what is