RCP Tech Library

See our Free Webcasts.

Free Guides from rcpmag.com’s editors

Free White Papers from our Sponsors

  • How Leading MSPs Deliver an Outstanding First Impression During the Onboarding Process

    Onboarding sets the tone for customer relationships. Learn how to onboard new customers like a pro. In this definitive guide, onboarding experts from the managed services industry—including Liongard’s COO Vincent Tran and Director of Partner Success Kendrics Hawkins—share advice...

  • MSP Marketing and Sales Best Practices

    This ebook provides an overview of best practices MSPs can follow to enhance and scale their marketing and sales processes in order to generate more signed proposals and revenue from marketing initiatives.

  • How Leading MSPs Deliver an Outstanding First Impression During the Onboarding Process

    Learn how to onboard new customers like an expert in this guide. Onboarding experts in the managed services industry share advice on how MSPs can develop processes, deliver excellent customer service, leverage automation and more.

  • MSP Marketing and Sales Best Practices

    This ebook provides an overview of best practices MSPs can follow to enhance and scale their marketing and sales processes. Learn more in this ebook.

  • How Secure is Your Cloud Data?

    While the public health crisis will eventually fade, flexible remote work arrangements are likely here to stay. Remote workers may continue to be as productive as before, or better, but only if their cloud data and applications are safe from the common causes of data loss.

  • COVID-19 Clicks - How Phishing Capitalized on a Global Crises Infographic

    We surveyed 7,000 office workers in the US, UK, Australia/New Zealand, Germany, France, Italy and Japan on their understanding of phishing, their email and click habits, and how their online lives have changed since the beginning of the COVID-19 pandemic. Here’s an overview of the findings from around the globe.

  • The Radicati Group - Endpoint Security - Market Quadrant 2020

    An Analysis of the Market for Endpoint Security Revealing Top Players, Trail Blazers, Specialists and Mature Players.

  • Hacker Personas - The Infiltrator

    The hacker persona known as “The Infiltrator” slips through cracks you may not know about. We often leave back doors open for cyberthieves to walk through and take what they want. This type of hacker, who exploits our systems’ hidden cracks, is known as “The Infiltrator,” and his favorite exploit is the DDoS attack. One way to secure the back door is though DNS over HTTPS, or DoH.

  • Hacker Personas - The Opportunist

    This type of hacker, who uses charitable causes and hardships to disguise criminal activity, is known as “The Opportunist.” The more you know about them, the better prepared you’ll be to spot their tricks and protect your business.

  • Hacker Personas - The Impersonator

    Cybercriminals are using more sophisticated attacks that trick targets into thinking fraudulent emails are from legitimate personal or business contacts. This type of hacker persona is known as “The Impersonator,” and he has a few highly manipulative tricks up his sleeve like: business email compromise (BEC), domain and website spoofing, and deep fakes and AI-driven attacks. Want to learn more about the tricks impersonators use to steal data from unsuspecting targets?

  • Small and Midsize Businesses: Rip the Target Off Your Backs

    SMBs have limited time and IT resources, and a lot on their plates – especially when it comes to cybersecurity. Unfortunately, SMBs have become the biggest target for ransomware attacks, and they need to face the harsh truth that ransomware can wreak havoc with data, budget and reputation. This paper will debunk the most common myths surrounding ransomware, and present ways to help prevent ransomware attacks, protect data and ensure an adequate recovery procedure.

  • COVID-19 Clicks - How Phishing Capitalized on a Global Crises

    As a cybercriminal tactic, phishing has been around for a long time. So why is such an old method of internet trickery still so common? The answer is simple: because it’s still wildly successful. So why are people still clicking?

  • Case Study: Bordonaro MSP offers fast and reliable migrations

    Germany-based MSP offers reliable migration from Hyper-V servers to Azure Stack Hub with super-fast cutover using Carbonite® Migrate.

  • Security Tips for Protecting your Backup Servers

    Businesses today are evaluating and implementing a multi-layered approach to securing and protecting company data. This paper will focus on additional measures and techniques to specifically protect the backup environment, as well as the Carbonite multi-layer approach for securing your data, part of our cyber resilience philosophy.

  • Special Report: QCT Set to Help Sls as an OEM Partner using Microsoft Azure Stack HCI

    QCT is reaching out to help systems integrators (SIs) take advantage of a new opportunity around Microsoft Azure Stack HCI. Azure Stack HCI is hybrid by nature and flexible, and it will help SIs provide more value to win in the market.

  • Conversational Ransomware Defense and Survival

    Ransomware is one of the year’s fastest growing criminal enterprises. Download a complimentary copy of the Ransomware Defense and Survival E-book from Otava and Veeam® to uncover best practices for mitigating cyberattacks to your organization.

  • The Radicati Group - Endpoint Security - Market Quadrant 2020

    An Analysis of the Market for Endpoint Security Revealing Top Players, Trail Blazers, Specialists and Mature Players.