Uncategorized

Password Vaults: What, where, when & why:

This is the second post in a series from Technology Transition Paradigm, spotlighting mission-critical features that are too often ignored by small and midsize businesses—and their MSPs—at their own peril. In March 2021, Verkada Inc., a Silicon Valley-based surveillance tech company, suffered a massive breach that exposed live feeds from over 150,000 security cameras inside […]

Uncategorized

WTF is the BFD w DNS?

Let’s talk about DNS. Not the Do Not Start kind. I mean Domain Name System—the unsung hero of the internet and the silent gatekeeper of your email security. If your IT team or MSP (Managed Services Provider) doesn’t have their DNS game tight, your business is basically sending emails with a “kick me” sign taped […]

Uncategorized

Microsoft 365 Pricing in 2025: What You Should Know Before You Buy

If you’re managing Microsoft licensing this year, the landscape has shifted — and understanding your purchasing options & channel is more important than ever. As of April 1, 2025, Microsoft applied a 5% price increase to the legacy monthly-billed subscription prices below for annual commitments. This affects: • Microsoft 365• Office 365• Dynamics 365• Windows […]

Uncategorized

GoDaddy’s Office 365 vs. Microsoft 365: A Critical Analysis & Migration Solution

GoDaddy’s Office 365 vs. Microsoft 365: A Critical Analysis & Migration Solution: Yesterday, one of our firm’s vendors complained about the frustrating limits of their GoDaddy version of Office 365. They’re now becoming a client. GoDaddy’s Office 365 version is a bad choice for most. Here’s why: In today’s digital landscape, selecting a reliable and […]

Uncategorized

Maximize your chances of having a successful Cyber Security Insurance Claim:

To increase the likelihood of a successful cyber insurance claim, business owners should take proactive steps before and after a cyber incident. Here’s a guide: 1. Understand Policy TermsReview Coverage Details: Ensure you understand what is covered and excluded, including ransomware, data breaches, and business interruption. Clarify Compliance Requirements: Familiarize yourself with the policy’s specific […]

Uncategorized

The Executive’s Guide to IT Services: Why “Good Enough” is No Longer Good Enough:

In the fast-paced digital world, where threats evolve faster than you can say “ransomware,” businesses need more than the basics to survive. As an executive decision-maker, you’re likely no stranger to IT services. Maybe your company has been cruising along with the basics—backup systems, antivirus software, and a prayer that your team doesn’t click on […]

Uncategorized

Why Every MSP Should Offer Password Vault Management to Clients

After 30 years running and managing managed IT services to end clients, we can tell you that one of the most critical—and often overlooked—components of any MSP’s security offering is encrypted password management. With cyberattacks on the rise, particularly those targeting smaller businesses, password breaches have become a frequent and damaging occurrence. Weak or compromised […]

Uncategorized

“To Fee?”, or “Not to Fee?” At the start of a in Managed Service Provider (MSP) agreement.

That is NOT the question. Avoid the all-too-common modern Shakespearean tragedy of a business owner’s negotiation with an MSP: They shop on price, and presume MSPs and Managed Security Service Providers (MSSPs) have largely identical offerings These price-focused entrepreneurs often first ask these important questions… 1. How much is the upfront/on-boarding fee? 2. How can […]

  • 1
  • 2