The pandemic has forced the adoption of new ways of working.   From working at home, to social distancing at the office, organizations are having to reimagine not only their office space, but also how to create safe, productive, and enjoyable jobs and lives for employees.   Before the pandemic, the conventional wisdom

By Gary Audin
“Customer Privacy and Security; MSP Liabilities?

 The MSP manages customer resources. The MSP may also manage security for its customers. If the security is breached and consumer data is released does the MSP have liability? Possibly!

Our virus duo (Michael Jenkin and Ken Dwight) take over SMB Nation to chat about the new developments in the malware and security field.   These two explore a virus that has been around since 2016 and has been reappearing with new versions regularly during recent years.    

During any disaster or pandemic, such as COVID-19, MSPs must prepare for disruption in their business as well as prepare to protect their customers and clients vital IT services.    As many of you know MSPs are one of the most important players for many businesses not only during the pandemic,

By Gary Audin

Digital transformation is not just technology, not just a tool, not just an application. It is a change in doing business.

Josh Liberman has been busy this year not only with the pandemic, and running a business, but Josh has been writing and contributing to many community sites.  Last year Josh set a goal to write more and boy has he done so.  Check out some of his articles here.   

By Harry Brelsford

Clearly one of the greatest opportunities for resellers, Network Service Providers (NSP) and Managed Services Providers (MSP) in the current economic climate rests with the speed and efficiency that Third-Party Maintenance (TPM) agreements can rapidly be sold and implemented

Josh Weiss joins SMB Nation to chat about summer 2020 and what is new.  Josh feels privileged to be able to provide services to clients, jobs to his employees, and some personal journey through meditation and exercise. 

Many organizations are realizing that sometimes their weakest link regarding cybersecurity is not found within their organization but in their supply chain or with their vendors.  With their data not being within their organization it is hard to get visibility into the hygiene of the data.    The great thing is there are Risk

By Gary Audin

You have adverse events that hamper or stop your IT and network operations. There are power outages, fires, floods, and security attacks. But you must also deal with interruptions due to new application installation, software upgrades that fail, data base changes,