Skip to main content

How do you know you're working with a bad MSP?

What are some traits of bad MSP's?

The most common complaint I get from new or potential customers;
"Whenever we need something, we can never get a hold of them."
As a customer that relies on your MSP partner for day to day operational support it can be frustrating when you feel expectations aren't being met, and you are left to deal with the aftermath.
"I don't feel like my current provider is taking the security of our data very seriously."
I can tell you we recently on-boarded a customer who's firewall was configured to forward all the needed ports for file sharing, remote application licensing, etc from anyone on the internet to the customers servers by another MSP. Needless to say that even for small businesses there is a better way to support work from home users that doesn't involve risking the clients infrastructure. Click here to learn how you can check your own infrastructure with your cellphone for security risk. 
"He's charging us X for Y products or services do these prices seem expensive"
Sometimes the wrong solutions are implemented so rather than pay premiums for enterprise level services, we'll work to find enterprise style solutions meant for the size and scope of your organization. 

What should I be asking my future MSP?

Here are 9 questions to ask your future Managed Service Provider and our answers to these questions to help make the decision easier:

  • What is your Service Level Agreement (SLA) for tickets or requests that are made?
    • SLA's for us range from 15 minutes to 24hrs depending on the severity of the issue.
  • Can you provide on-site support in all the cities we have offices?
    • We have technicians available in over +150 cities nationwide and growing
  • How long does it take to have someone show up on site if there is an issue?
    • We can usually provide on-site visit's within 1-2 hours.
  • Do you include remote support? If not what's the additional cost or circumstances associated?
    • Remote support is included with all our plans.
  • What Line Of Business (LOB) hardware and software do you provide support for?
    • We provide support for all LOB hardware and software.
  • Do you provide up time monitoring for the office or our web properties?
    • We monitor the up time of your internal office infrastructure and web properties.
  • Do you use security best practices when providing deployment and implementation services?
    • As hackers security best practices++ is our approach to security for small business.
  • How are passwords dealt with?
    • We do NOT manage your passwords, we teach you proper password management that gives us custodial access when we need it.
  • If we decide to go with another provider how does the hand-off work when we switch providers?
    • We understand sometimes we're not always going to be the best fit for everyone, so any and all data that was collected about the specifics of your infrastructure, notes about how to manage it, and the different pieces that make up business operations. And we provide you a PDF with all of that data including any pictures and network diagrams that might be associated. 
If you're in Los Angeles looking for a MSP that will treat you and your team right click here to learn more and schedule a consultation. 




Comments

Popular posts from this blog

Ensuring Cyber Insurance Coverage: The Crucial Role of Security Controls

In today's digital landscape, many business owners believe that obtaining a cyber insurance policy automatically guarantees protection. However, this assumption is far from reality. Even with general liability policies that cover cyber claims, organizations must meet specific minimum requirements to ensure their claims are approved. In fact, some insurance carriers may collaborate with cybersecurity partners to evaluate the implementation of security controls before determining coverage applicability. Xcape, Inc.  can offer the guidance and expertise to ensure these security controls are implemented to strengthen your overall security posture. In addition, our Managed IT Provider Services implementation of the following security controls gives organizations quicker recovery in the event of a security incident so that our customers can get back to work in minutes and hours vs. days and weeks.  Although often overlooked by insurance providers, your policy documents clearly outline th

Have you tested your backup recently?

We're in the business of helping people, so when a business owner reached out for assistance during a ransomware attack they had experienced, our first question was, "When was your most recent backup?" The owner said his CTO assured him they backed up their Amazon Web Services infrastructure.  Well, they had one snapshot from several years ago, which wouldn't do anything for them. Of course, we always feel bad for giving business owners awful news. But, sometimes, even as experts without the absolute minimum being done technically, we're only left with a few options in ways we can help. So we reversed-engineered and created a decryption application based on the ransomware sample we recovered during our investigation. Recovering over 3 TB of data in the process. While that's not always a possibility, in this case, many things went right for us during the investigation.  Is there a better way to handle ransomware attack recovery ? YES! But the issue wasn't t

How secure is your SMB's domain name?

Studies show that small businesses are being targeted now more than ever in cyber attacks. ( Forbes: Small Businesses Are More Frequent Targets Of Cyberattacks Than Larger Companies ) When cybersecurity professionals discuss two-factor authentication, domain registrars or DNS hijacking is often not the topic. (Think 2FA for GoDaddy , NameCheap , and SquareSpace , to name a few. Take a moment and use these links to setup 2fa for your domain, or google "How to turn on 2fa for name of provider .") Surprisingly, even in 2023, some providers still don't support this essential security control.  However, your domain name controls an organization's corporate website and email exchange records. And suppose an attacker were to get control of it. In that case, they could recreate your email addresses, and password reset their way to control all the accounts owned by an organization.  A few of the recent incidents we've responded to involve attacks where the attacker obtains