Webroot Guest Blog

Guest blogs such as this one are published monthly and are part of The VAR Guy's annual platinum sponsorship.

Posts by Webroot Guest Blog

How Webroot Uses Machine Learning to Maximize Protection for MSP Clients

Machine learning offers MSPs an alluring promise of greater protection for their clients. Webroot CTO and rocket scientist Hal Lonas explains why it’....More

Automating the MSP: The Path to Profitability

As the MSP market grows and becomes more established, it’s gotten even more important for MSPs to maximize efficiency in their business operations....More

Phishing Trends for MSPs to Watch-Part II

While it might seem like phishing attacks have been around forever, they’ve only recently reached high levels of efficacy. No matter which anti-....More

8 Endpoint Security Strategies for MSP Success

As the managed services market continues to grow, it’s no longer enough to offer superior services to your clients. You must also partner with a....More

6 Easy-to-Follow Tips for MSPs to Stop Ransomware

Today’s MSP are constantly challenged by the growing variety of ransomware malware that plagues the current IT landscape. While this proliferation of....More

How a Reseller Grew More Profitable by Selling Managed Services

These days, the benefits of making the transition to the MSP business model are established. But, for many, it can still mean venturing into....More

Why Ransomware is Different ... and How to Defend Against It

For the most part, computer security is focused on preventing criminals from stealing information that can then be sold for profit to a third party....More

MSP Best Practices to Protect Clients from Ransomware

Ransomware attacks can have a devastating effect on your clients, so it’s vital that you understand this threat, explain it to customers, and....More

What MSPs Should Know about Crypto Ransomware

With crypto ransomware dominating recent headlines, many MSP clients are understandably concerned that ransomware attacks might disrupt their....More

Best Security Practices for Growing MSPs, Part 3

In this third and final installment of our series on best security practices for growing MSPs, we’ll discuss the importance of selecting the right....More



Sponsored Introduction Continue on to (or wait seconds) ×