Select Page

Expand your Cyber Security Knowledge

Did you know that every Monday Andrew Morgan, Ryan Weeks, Gary Pica, and West Spencer host a cyber call (https://www.trumethods.com/lp/cybercall) to expose MSPs to industry exports through a collaborative production. Each week these experts will share their knowledge on specific domains to help elevate your cyber capabilities, grow your knowledge, and elevate your skills to help you grow your business.
Read More

Anatomy of Ransomware Attach

Ransomware is something that has been talked about for quite awhile and has been one of the biggest issues in terms of IT security in the last two years. Although, many people think that Ransomware is a one shot deal, in reality it is a much more detailed process to remove and or get rid of the Ransomware. Watch as Ken Dwight goes through the process of Ransomware, targeting of the machine, how the malware gets on your computer, what hackers harvest, how to secure a machine, and much much more.

How to be an MSSP

Alex Fields is at it again, working on an educational piece on How to be an MSSP. Alex has found that most MSPs are not up to date on information security and keeping their clients protected. In these times you can’t rely on your antivirus software but instead need to do a better job of understanding the information security. Stay tuned for more information to come in the fall. Watch this interview and learn more about the importance of information security.

Webinars vs. Online Conferences

Phelim Rowe – our analyst from the UK, joins us from across the pond! We get insights into his daily life as an existing virtual organization during the COVID-19 (no major changes internally). Rowe optimistically talks about a connected global community that has come together very quickly. We talk about the difference between a webinar and an online event. We talk about how offering your services for free is a MISTAKE.

Rowe: Clearing up the Confusion: MSP v MSS

Analyst and contributor Phelim Rowe clears up the confusion on labels surrounding cybersecurity solutions. Rowe’s analysis starts with analyzing the Service Level Agreement (SLA) with the client. Does the client need (or will they pay for) military grade security. Rowe defines Managed Security Service (MSS). Rowe also discusses his event model that combines MSPs, MSS and Customers.