What should your MSP drop or adopt?
We are in a period of rapid change. The next five years is full of drama for MSPs. This should all be information that you've already heard. But have you internalized it or operationalized it yet?
We are in a period of rapid change. The next five years is full of drama for MSPs. This should all be information that you've already heard. But have you internalized it or operationalized it yet?
Cybersecurity is a tricky subject for MSPs and I know it's on everyone's mind. Join me in this AMA, sponsored by SuperOps and let's talk about these issues.
You can gain all of those benefits, if you do customer appreciation right. If you donβt your customer appreciation might just get lost in the shuffle.
The problem with OAuth apps is that they don't ever fully uninstall themselves. The permissions are left there forever, even after you close the account, just waiting for a hacker to figure out how to exploit. In this blog I'll show you what permissions are granted and how to remove them for M365 and Google users.
Opening an MSP is easy. Building an MSP is hard. Establishing a grow pattern is harder. Building culture […]
Much of your data is probably overshared and under managed. Why would this be important for AI and Copilot?
Do not confuse this phrase with the customer is always right or that you have to ask how high when they ask you to jump. Yes, is about empowering your employees.
This newsletter is a curated blog roll of the 8 most important topics published by Microsoft in the previous week.
For Managed Service Providers (MSPs), the process of developing a robust set of services transcends mere compilation; it is an art form that requires a deep dive into creative thinking.
"The trough of success" perked my ears. Used in context it's a phrase that means, you are continuing to feed on past success and being stuck there at the trough of success is a guarantee of future failure.
In today's meeting, a person I met with was sent a meeting recap from "me". Otter had joined a meeting that I was invited to and then emailed them that person a recap of our meeting. I was very disturbed by this event
You will have now prevented misleadingly named apps, potentially malicious apps, apps with misleading publisher names, apps performing unusual amounts of file downloads, the addition of credentials to OAuth, and apps with a strange ISP for an OAuth.