BSM Lunch & Learn Webinars

  1. Covering Your A$$: Next-Gen Threat Landscape
    8/25/2016

    Today's advanced malware is increasingly difficult to remove and even harder to detect in the first place. In this presentation, we examine the modern threat landscape and discuss the shortcomings of traditional antivirus, as well as how organizations can stay ahead of the malware curve. Malware authors aren't too concerned about what traditional security is capable of blocking, since they've formed reliable tactics to circumvent that protection. Either by leveraging social engineering or advanced evasive tactics, modern malware spells an uphill battle for traditional defenses.

  2. Downtime, Deletions & Security Breaches: Why Your Customers' SaaS Data Could Be At Risk
    6/23/2016

    There are misconceptions about the safety of data stored in cloud-based applications such as Office 365, Salesforce and Google Apps. As a Managed Service Provider, it is imperative that you ensure any of your clients who use these applications that their critical cloud business data stays as safe as it would be on-prem.

  3. Crypto Ransomware: Fighting A Real Problem With Real Solutions
    6/16/2016

    Crypto ransomware has come a long way over the past 2½ years and no single solution can stop it 100% of the time. But the right recovery and mitigation strategies can help MSPs keep businesses a step ahead of this virulent threat and ensure their clients are effectively protected.

  4. Webroot 2016 Threat Briefing Webinar
    5/5/2016

    2015 was another record year for cybercrime, during which more malware and malicious IPs, websites, and mobile apps were discovered than in any previous year. It will come as no surprise that the cybercrime ecosystem continues to thrive, given new innovations and little in the way of risk for those who choose to participate. At Webroot, we believe it is possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they employ for their attacks.

  5. Why More SMBs Are Outsourcing IT To MSPs
    3/31/2016

    It’s clear that the nature of cyber threats has changed dramatically throughout the past five years. We surveyed IT decision makers of SMBs in the UK, US and Australia on how well they felt their organizations were prepared to stop cyberattacks. Their answers may surprise you!

  6. Profitable Partnering For ISVs — 4 Expert Perspectives
    3/24/2016

    If you were not able to attend the ISV IQ Live! conference on February 24 in Santa Ana, CA, you missed out on a day of outstanding education on partnering, raising capital, and marketing. Business Solutions invited a panel of channel thought leaders who spoke at the event to participate in this webinar so more of our ISV subscribers can learn about partnering best practices.

  7. Why Security Isn’t Enough To Stop Ransomware
    2/25/2016

    The best IT Security will only help stop infections from ransomware like CryptoLocker and CryptoWall, but if your vendor is promising 100% prevention then you should be very wary. Webroot SecureAnywhere has some of the most advanced defenses against ransomware but still a few of our 50,000+ business customers were infected in 2015.

  8. Gerber To VARs: “Create A New Version Of Your Company”
    2/22/2016

    Renowned small business author Michael Gerber opened his Feb. 18 webinar telling solutions providers in no uncertain terms, “You can’t fix your broken business.”

  9. 7 Essential Habits Of Successful MSPs
    2/12/2016

    While the majority of MSPs grow their businesses by 10% each year, others manage to grow by 20% or more. So what separates the two? Check out this on-demand webinar and learn foolproof strategies for optimizing and growing your business in a market of constant change.

  10. E-Myth’s Gerber Asks IT Solutions Providers, “What’s Missing From This Picture?”
    1/15/2016

    Michael Gerber, author of the business best-seller The E-Myth Revisited and other books on the topic of small business and entrepreneurship, challenges you to look at your IT solutions provider business and ask, “What’s missing from this picture?”