RCP Tech Library

See our Free Webcasts.

Free Guides from rcpmag.com’s editors

Free White Papers from our Sponsors

  • E-book: 5 Ways to Improve the Security of Your Business

    We’ve put together five key ways that you can use to improve the security of your business and to protect your data.

  • Check List: The Ultimate 2021 Budgeting Checklist for IT Pros

    To help you create an annual IT budget more easily, we’ve put together a checklist that specifically to your IT needs but, on implementation, also helps you maximize the benefits of your IT investments.

  • Check List: Top 10 Tips for Improving IT Security

    Securing your devices can be challenging, especially when your employees are working remotely. All endpoints, both on- and off-network, must be patched and secured on an ongoing basis. Download this checklist to build a robust cybersecurity strategy.

  • 8 Essential Features You Need in Your Next Healthcare Collaboration Solution

    In healthcare operations, every meeting has the potential to impact the well-being of patients, making the right collaboration solution essential. This ebook describes the eight crucial features your next collaboration tool must have.

  • 8 Essential Features to Look for in Your Next Classroom Collaboration Solution

    Digital technology has completely revolutionized the learning experience. A critical element of digital learning is unified communications and collaboration (UCC) solution. This ebook lays out the eight crucial features a classroom UCC platform must have.

  • 8 Essential Features to Look for in Your Next Business Collaboration Solution

    A company that can improve collaboration between employees, clients, and leaders will have a natural advantage over more siloed competitors. This ebook describes eight features that should be a part of your next collaboration solution.

  • A Superhero's Guide to Office 365 Backup & Recovery

    Explore the top use cases for Office 365 backup, including accidental deletion, compromised redundancy, the drawbacks of legacy backups in this eBook.

  • How Leading MSPs Deliver an Outstanding First Impression During the Onboarding Process

    Onboarding sets the tone for customer relationships. Learn how to onboard new customers like a pro. In this definitive guide, onboarding experts from the managed services industry—including Liongard’s COO Vincent Tran and Director of Partner Success Kendrics Hawkins—share advice...

  • MSP Marketing and Sales Best Practices

    This ebook provides an overview of best practices MSPs can follow to enhance and scale their marketing and sales processes in order to generate more signed proposals and revenue from marketing initiatives.

  • How Leading MSPs Deliver an Outstanding First Impression During the Onboarding Process

    Learn how to onboard new customers like an expert in this guide. Onboarding experts in the managed services industry share advice on how MSPs can develop processes, deliver excellent customer service, leverage automation and more.

  • MSP Marketing and Sales Best Practices

    This ebook provides an overview of best practices MSPs can follow to enhance and scale their marketing and sales processes. Learn more in this ebook.

  • How Secure is Your Cloud Data?

    While the public health crisis will eventually fade, flexible remote work arrangements are likely here to stay. Remote workers may continue to be as productive as before, or better, but only if their cloud data and applications are safe from the common causes of data loss.

  • COVID-19 Clicks - How Phishing Capitalized on a Global Crises Infographic

    We surveyed 7,000 office workers in the US, UK, Australia/New Zealand, Germany, France, Italy and Japan on their understanding of phishing, their email and click habits, and how their online lives have changed since the beginning of the COVID-19 pandemic. Here’s an overview of the findings from around the globe.

  • The Radicati Group - Endpoint Security - Market Quadrant 2020

    An Analysis of the Market for Endpoint Security Revealing Top Players, Trail Blazers, Specialists and Mature Players.

  • Hacker Personas - The Infiltrator

    The hacker persona known as “The Infiltrator” slips through cracks you may not know about. We often leave back doors open for cyberthieves to walk through and take what they want. This type of hacker, who exploits our systems’ hidden cracks, is known as “The Infiltrator,” and his favorite exploit is the DDoS attack. One way to secure the back door is though DNS over HTTPS, or DoH.

  • Hacker Personas - The Opportunist

    This type of hacker, who uses charitable causes and hardships to disguise criminal activity, is known as “The Opportunist.” The more you know about them, the better prepared you’ll be to spot their tricks and protect your business.

  • Hacker Personas - The Impersonator

    Cybercriminals are using more sophisticated attacks that trick targets into thinking fraudulent emails are from legitimate personal or business contacts. This type of hacker persona is known as “The Impersonator,” and he has a few highly manipulative tricks up his sleeve like: business email compromise (BEC), domain and website spoofing, and deep fakes and AI-driven attacks. Want to learn more about the tricks impersonators use to steal data from unsuspecting targets?