Subscribe To Our Daily Enewsletter:

Posts by Webroot Guest Blog

MSPs Should Monetize Security Awareness Training

The concept behind continuous cybersecurity & compliance training, with liberal amounts of role-relevant phishing simulations, is simple. Webroot explains.

How to Develop vCISO Security Services

When developing a new vCISO (virtual chief information security officer) practice, MSPs should consider the following seven moves, according to Webroot.

5 Cybersecurity Industry Predictions for 2019

Webroot’s five cybersecurity predictions for 2019 involve such topics as passwords, data privacy, cryptojacking, IoT, AI trends in automation and more.

A Look at the 2018 Webroot Threat Report Mid-Year Update

Cryptomining leapfrogs ransomware as the top cybersecurity threat, Webroot’s research reveals. Here are the top three issues facing partners and customers.

MSP Cybersecurity: Automating Your Way to Profits

MSP operational efficiency is the key to profitability, and automation is the key to operational efficiency. Here’s how to get your managed services business started down the road to profitability through automation.

Is RDP Putting MSPs and Your Clients at Risk?

Here are four ways MSPs can protect their businesses and customers from Remote Desktop Protocol (RDP) enabled hacks and cyberattacks, according to Webroot.

Cybersecurity: The Riskiest and Safest U.S. States

Webroot’s annual Riskiest States survey results have been released. Here are the key learnings — and cybersecurity implications for MSPs.

How MSPs Can Protect Customers From Cryptojacking

Here are the symptoms of cryptojacking and practical steps MSPs can take to safeguard customer systems from such attacks, according to Webroot.

5 Ways Security Can Help Boost MSP Profits

Here are five ways managed security solutions can drive MSP profits and revenues, while safeguarding customer assets, according to Webroot.

MSP Security Alerts: Solve the False Positive Headaches

For MSPs, cloud-based security solutions and machine learning can reduce the time spent analyzing false-positive threats and to put more time and effort into tackling real security issues. Webroot explains how.