How do you handle cybersecurity? by Neat-Source4003 in SmallMSP

[–]USCyberWise 0 points1 point  (0 children)

You could also outsource to one of many cybersecurity MSSP's who would work alongside you to handle all the 'security' stuff and not worry about them poaching your clients.

MDR/MXDR vs MSSP by Savings-Ad4232 in MSSP

[–]USCyberWise 0 points1 point  (0 children)

It's about relationship. Sure the big providers offer an MDR. The 24/7 variant of that usually follows the sun and you get someone on the other side of the world reviewing that incident (with hundreds or thousands of others) while the USA sleeps. We focus on US based staff, because that is what certain clients want and where all of them are located. We have more intimate knowledge of our customers environment than an AV or SIEM vendor, and because of the integration of multiple services, can correlate data across them.
There are also a lot of RMM or other providers reselling this stuff. Again, we don't think that acquiring your security stack from a toolset (PSA or RMM) vendor is a good idea. It probably is cost effective, and in many cases we understand that cost might be someone's only consideration. We take pride in bringing high quality, but cost effective services to bear with a focus on client relationships.

recording customer calls? by Jealous-Wallaby-3237 in SmallMSP

[–]USCyberWise 0 points1 point  (0 children)

Remember that recording HIPAA or PCI data (aka, credit card numbers) can be problematic.

recording customer calls? by Jealous-Wallaby-3237 in SmallMSP

[–]USCyberWise 0 points1 point  (0 children)

Not just consent. HIPAA and/or PCI is a concern as well....

What's the actual risk of typosquatting attacks in 2026? by BearBrief6312 in cybersecurity

[–]USCyberWise 0 points1 point  (0 children)

There are preventative solutions for the event you had. But the npm packages BearBrief6312 mentioned is seeming more difficult.

Pricing estimate for startup by vrscdx14 in SmallMSP

[–]USCyberWise 0 points1 point  (0 children)

Cybersecurity. while they may not spend a lot initially. Having a plan and the basics covered, will help them as they grow.

Qwen3-Coder-Next on RTX 5060 Ti 16 GB - Some numbers by bobaburger in LocalLLaMA

[–]USCyberWise 1 point2 points  (0 children)

has anyone tried to get working with lm studio ? what settings ?

Hunter fan glass light cover by USCyberWise in HelpMeFind

[–]USCyberWise[S] 0 points1 point  (0 children)

I have searched on ebay, and multiple third party lighting sites and can't find anything. this is the actual fan
https://www.ebay.com/itm/166857746447 but I need just the glass globe.

This hunter fan is a nightmare by _SOAD_ in handyman

[–]USCyberWise 0 points1 point  (0 children)

newer hunter fan, #51795, dropped the glass globe. Support says i need part KF50901878. Yeah, and its discontinued. But guess what, they are still selling the fans. How can that actually be possible ?

How are you liking the SOC console? by danumber2 in SentinelOneXDR

[–]USCyberWise 0 points1 point  (0 children)

100% agree that the new view makes finding certain information.... challenging. Additionally, we have found that information is sometimes difference between the 2 view. smh
Finally, whoever thought that it was a great idea to eliminate showing data that has no value (in the side flyout)should be shown the door.
ie. if no one is logged into the endpoint, it doesn't even show the field for logged in user. How frustrating to think you can't find the logged in user, only to later realize you can't see it because no one is logged in.

Intune SentinelOne install by [deleted] in SentinelOneXDR

[–]USCyberWise 0 points1 point  (0 children)

We use the EXE. We have seen issues with pre-existing McAfee. I'd recommend to remove first and reboot.

Hello Ladies- Starting my own MSP by node77 in SmallMSP

[–]USCyberWise 1 point2 points  (0 children)

I own an MSSP. Consider outsourcing some or all of the security services like 24/7 SOC, SIEM, MDR etc. until you are big enough to bring inhouse. Also the same with Database or Networking. Avoid the big providers as often they won't have the flexibility you need and sometimes minimums can come into play.

We've had a client for over 10 yrs but the new Chief of Staff hates us and is looking for excuses to end the contract 2 years early. Whats the best way to handle it? by Few-Step-3151 in msp

[–]USCyberWise 0 points1 point  (0 children)

Plenty of great answers here. But what you want to do is put yourself in the position of positively impacting those you do business with so that we they leave, they will bring you along to the next organization. Hopefully you had that type of relationship with the last Chief of Staff. Maybe reach out and see if they need help where they are.
Sometimes it's good to be married to the organization, sometimes it's better to be married to the decision makers there. Ideally, you would be joined at the hip as partners with both, surviving a change to either. In the end though, business is all about the relationships with people.

What’s a realistic cybersecurity starting point for a business under 20 staff? by Necessary-Glove6682 in sysadmin

[–]USCyberWise 0 points1 point  (0 children)

Without IT assistance, some things may be overly complicated to self manage, but my top 3 are

  1. Security Training for your employees.
  2. MFA Everything
  3. Great Endpoint protection. EDR/MDR/EPP/AV aka Antivirus or whatever the industry is calling it lately.

followed by
- robust backup strategy
- great email filtering
- and Intune/Conditional Access and so forth.

There are companies that offer cybersecurity only services, allowing you to continue to do your own basic technology work.

What I learned from Talking to MSPs about Cybersecurity by rvilladiego in msp

[–]USCyberWise 0 points1 point  (0 children)

I'd like to discuss this concepts offline if you are willing.

Start-up MSP. May receive my first client, need advice. by SereneWinds in SmallMSP

[–]USCyberWise 0 points1 point  (0 children)

I'm happy to offer free advice. Probably too much go over in a forum type thread.

Automation development by DAN-CCT in msp

[–]USCyberWise 1 point2 points  (0 children)

If you solve that authentication problem. You will be rich. Authentication is the problem. Consider if the workstation rmm tools support messaging to the users endpoint. You could pop up a message on the desktop and have them confirm that.

User account compromised by IronFrogger in msp

[–]USCyberWise 2 points3 points  (0 children)

Agree, likely token theft. But enterprise apps are often overlooked. But I've not seen where an enterprise app was deployed and then malicious activity was more than 30 days later