A Practical Approach to Data Privacy and Compliance

A Practical Approach to Data Privacy and Compliance

Introduction to Privacy Compliance and Data Compliance Many MSPs are looking at becoming vCIOs for their customers. The main difference between the vCIO and the Network Admin is that the admin looks at network health, while the vCIO always analyzes the business...
The Zero Trust Architecture and MSPs

The Zero Trust Architecture and MSPs

  Zero Trust isn’t as new concept in the enterprise space. It was conceptualized in the mid-2000’s, tried by Google (which experience code theft at the time) in the “BeyondCorp” architecture, and subsequently codified by Forrester’s John Kindervag in 2010 (see:...
Data or Exploit? Focusing in on the risk.

Data or Exploit? Focusing in on the risk.

MSPs leverage cybersecurity tool stacks (or integrated platforms) to address their customers threat landscape (viruses, malware, ransomware, vulnerabilities and exploits) and to help ensure that continuity and disaster recovery are fully addressed. The best stacks...