What happens when the managed IT services provider you trust to keep your IT infrastructure safe and secure gets hacked? What do you do when your network and servers are compromised in a secondary attack? Unfortunately, attacks on MSPs by local and foreign bad actors are becoming quite common, but there are certain steps only the most experienced and elite MSPs take that separate them from the rest.
Last week, Continuum, a renowned professional services automation (PSA) firm used by many ...
Call it a case of the Mondays, when you arrive at the office and see the calendar reminder about the regional meeting this afternoon. You know it’ll be an hour or two and it probably won’t start on time because Jim and his team who are driving in from Fairfax are going to get lost, again.
If you’ve ever grumbled and thought “can’t they just put the highlights in a memo and let us read it on our own time?” chances are you’ve ...