{"id":23271,"date":"2018-01-04T14:09:06","date_gmt":"2018-01-04T21:09:06","guid":{"rendered":"https://www.webroot.com/blog/?p=23271"},"modified":"2018-04-30T12:08:09","modified_gmt":"2018-04-30T18:08:09","slug":"top-3-questions-smbs-should-ask-potential-service-providers","status":"publish","type":"post","link":"https://www.webroot.com/blog/2018\/01\/04\/top-3-questions-smbs-should-ask-potential-service-providers\/","title":{"rendered":"Top 3 Questions SMBs Should Ask Potential Service Providers"},"content":{"rendered":"<p>[et_pb_section bb_built=&#8221;1&#8243;][et_pb_row][et_pb_column type=&#8221;4_4&#8243;][et_pb_text]<\/p>\n<p>It can be daunting to step into the often unfamiliar world of security, where you can at times be inundated with technical jargon (and where you face real consequences for making the wrong decision). Employing `<\/p>\n<p>In a study performed by Ponemon Institute, 34% of respondents reported using a managed service provider (MSP) or managed security service provider (MSSP) to handle their cybersecurity, citing their lack of personnel, budget, and confidence with security technologies as driving factors. But how do you find a trustworthy partner to manage your IT matters?<\/p>\n<p>Here are the top 3 questions any business should ask a potential security provider before signing a contract:<\/p>\n\n\t\t<style type='text\/css'>\n\t\tdiv#sp-wp-carousel-pro-id-69d39cb8ab45a.wcp-gallery-section .slick-prev, \n\t\tdiv#sp-wp-carousel-pro-id-69d39cb8ab45a.wcp-gallery-section .slick-next{\n\t\t\tmargin-top: -40px;\n\t\t\tcolor: #888888;\n\t\t}\n\t\tdiv#sp-wp-carousel-pro-id-69d39cb8ab45a.wcp-gallery-section .slick-prev:hover, \n\t\tdiv#sp-wp-carousel-pro-id-69d39cb8ab45a.wcp-gallery-section .slick-next:hover{\n\t\t\tcolor: #5dc8d0;\n\t\t}\n\t\tdiv#sp-wp-carousel-pro-id-69d39cb8ab45a.wcp-gallery-section ul.slick-dots li button{\n\t\t\tbackground-color: #cccccc;\n\t\t}\n\t\tdiv#sp-wp-carousel-pro-id-69d39cb8ab45a.wcp-gallery-section ul.slick-dots li.slick-active button{\n\t\t\tbackground-color: #5dc8d0;\n\t\t}\n\t\tdiv#sp-wp-carousel-pro-id-69d39cb8ab45a.wcp-gallery-section .single_wcp_item{\n\t\t\tmargin: 0 10px;\n\t\t}\n\t\tdiv#sp-wp-carousel-pro-id-69d39cb8ab45a.wcp-gallery-section .single_wcp_item img{\n\t\t\t-webkit-transition: ease all 0.3s;\n\t\t\t-moz-transition: ease all 0.3s;\n\t\t\t-ms-transition: ease all 0.3s;\n\t\t\t-o-transition: ease all 0.3s;\n\t\t\ttransition: ease all 0.3s;\n\t\t}\n\t\tdiv#sp-wp-carousel-pro-id-69d39cb8ab45a.wcp-gallery-section .single_wcp_item .wcp_s_item_caption .wcp_s_item_overlay{\n\t\t\tbackground: none repeat scroll 0 0 #000000;\n\t\t}<\/style><script type='text\/javascript'>\n\t\tjQuery(document).ready(function() {\n\t\t    jQuery('#sp-wp-carousel-pro-id-69d39cb8ab45a').slick({\n\t\t\t        infinite: true,\n\t\t\t        slidesToShow: 1,\n\t\t\t        slidesToScroll: 1,\n\t\t\t        prevArrow: \"<div class='slick-prev'><i class='fa fa-angle-left'><\/i><\/div>\",\n\t                nextArrow: \"<div class='slick-next'><i class='fa fa-angle-right'><\/i><\/div>\",\n\t\t\t        dots: true,\n\t\t\t        arrows: true,\n\t\t\t        pauseOnHover: true,\n\t\t\t        autoplay: true,\n\t\t\t        autoplaySpeed: 20000,\n\t\t\t        speed: 300,\n\t\t\t        adaptiveHeight: false,\n\t\t\t        draggable: true,\n\t\t\t        rtl: false,\n\t\t\t        cssEase: 'ease',\n\t\t\t        fade: true,\n\t\t            responsive: [\n\t\t\t\t\t\t    {\n\t\t\t\t\t\t      breakpoint: 1199,\n\t\t\t\t\t\t      settings: {\n\t\t\t\t\t\t        slidesToShow: 3\n\t\t\t\t\t\t      }\n\t\t\t\t\t\t    },\n\t\t\t\t\t\t    {\n\t\t\t\t\t\t      breakpoint: 979,\n\t\t\t\t\t\t      settings: {\n\t\t\t\t\t\t        slidesToShow: 3\n\t\t\t\t\t\t      }\n\t\t\t\t\t\t    },\n\t\t\t\t\t\t    {\n\t\t\t\t\t\t      breakpoint: 767,\n\t\t\t\t\t\t      settings: {\n\t\t\t\t\t\t        slidesToShow: 2\n\t\t\t\t\t\t      }\n\t\t\t\t\t\t    },\n\t\t\t\t\t\t    {\n\t\t\t\t\t\t      breakpoint: 479,\n\t\t\t\t\t\t      settings: {\n\t\t\t\t\t\t        slidesToShow: 1\n\t\t\t\t\t\t      }\n\t\t\t\t\t\t    }\n\t\t\t\t\t\t  ]\n\t\t        });\n\t\t var carouselss = ('#sp-wp-carousel-pro-id-69d39cb8ab45a');\n\t\t\tjQuery(carouselss).magnificPopup({\n\t\t\t\ttype: 'image',\n\t\t\t\tcloseOnContentClick: false,\n\t            closeBtnInside: false,\n\t            mainClass: 'mfp-with-zoom mfp-img-mobile',\n\t            gallery: {\n\t                enabled: true\n\t            },\n\t            delegate: 'div:not(slick-cloned) a.wcp-light-box',\n\t            zoom: {\n\t                enabled: true,\n\t                duration: 300, \/\/ don't foget to change the duration also in CSS\n\t                opener: function(element) {\n\t                    return element.find('img');\n\t                }\n\t            },\n\t\t\t});\n\t\t});\n\t\t<\/script>\n\t\t\n\t\t<div id='sp-wp-carousel-pro-id-69d39cb8ab45a' class='wcp-gallery-section' style='padding:0 15px;'><div class=\"single_wcp_item\"><img src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2018\/01\/SMB-Carousel-images_1.jpg\" alt=\"\" class=\"wcp-carousel-image\" \/><h3 class=\"wcp-carousel-title\" style=\"color: #333333\"><h5> <\/h5><\/h3><p class=\"wcp-carousel-caption\" style=\"color: #333333\"><p align=\"left\"><em>Okay, this one that you\u2019ll probably research before reaching out. Look at how long the company has been in business and who their current clients are. Are you confident they can anticipate the unique technology needs of your business?<\/em><\/p>\n<\/p><\/div><div class=\"single_wcp_item\"><img src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2018\/01\/SMB-Carousel-images_2.jpg\" alt=\"\" class=\"wcp-carousel-image\" \/><h3 class=\"wcp-carousel-title\" style=\"color: #333333\"><h5> <\/h5><\/h3><p class=\"wcp-carousel-caption\" style=\"color: #333333\"><p align=\"left\"><em>You\u2019ll want to work with MSPs who understand your business and are able to make technology decisions based on your unique needs. Make sure they have a solid track record with other businesses your size. If your industry has particular compliance concerns or makes heavy use of specialized programs, make sure they have experience with other customers in your industry.<\/em><\/p>\n <\/p><\/div><div class=\"single_wcp_item\"><img src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2018\/01\/SMB-Carousel-images_3.jpg\" alt=\"\" class=\"wcp-carousel-image\" \/><h3 class=\"wcp-carousel-title\" style=\"color: #333333\"><h5> <\/h5><\/h3><p class=\"wcp-carousel-caption\" style=\"color: #333333\"><p align=\"left\"><em>Make sure they round out these services with key security offerings. To make sure they have basic IT security controls in place, ask them about industry buzzwords like asset inventory, patch management, access management, continuous monitoring, vulnerability scanning, antivirus, and firewall management. The specifics of their answers aren\u2019t as important as a confident, well-considered plan.<\/em><\/p><\/p><\/div><div class=\"single_wcp_item\"><img src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2018\/01\/SMB-Carousel-images_3-1.jpg\" alt=\"\" class=\"wcp-carousel-image\" \/><h3 class=\"wcp-carousel-title\" style=\"color: #333333\"><h5> <\/h5><\/h3><p class=\"wcp-carousel-caption\" style=\"color: #333333\"><p align=\"left\"><em>Security-minded MSPs will make sure your software and your web surfing habits don\u2019t provide cybercriminals with backdoor access to your systems. They will make sure your network is secure, and they will install antivirus on all of your computers. Bonus points if they are forward-thinking enough to include Security Awareness Training. Make sure you understand the services they offer, and ask if these services have extra costs.<\/em><\/p><\/p><\/div><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>While these are not <em>all<\/em> of the questions you should consider asking a potential service provider, they can help get the conversation started and ensure you only work with service providers who meet your unique needsservice providers who meet your unique nee.<\/p>\n<ol>\n<li>Ponemon Institute. (2016, June). Retrieved from Ponemon Research: <a href=\"https:\/\/signup.keepersecurity.com\/state-of-smb-cybersecurity-report\/\">https:\/\/signup.keepersecurity.com\/state-of-smb-cybersecurity-report\/<\/a><\/li>\n<li>Ponemon Institute Cost of Data Breach Study: (2017 June) <a href=\"https:\/\/www.ibm.com\/security\/data-breach\">https:\/\/www.ibm.com\/security\/data-breach<\/a><\/li>\n<\/ol>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section bb_built=&#8221;1&#8243;][et_pb_row][et_pb_column type=&#8221;4_4&#8243;][et_pb_text] It can be daunting to step into the often unfamiliar world of security, where you can at times be inundated with technical jargon (and where you face real consequences for making the wrong decision). Employing ` In a study performed by Ponemon Institute, 34% of respondents reported using a managed service provider [&hellip;]<\/p>\n","protected":false},"author":94,"featured_media":23273,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3943,21727,8723,21703,10703,17411,21707,21701,21697,15571,21699,4973,4063,3479,3947,9025,5025,19581,6397,6469],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23271"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=23271"}],"version-history":[{"count":32,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23271\/revisions"}],"predecessor-version":[{"id":24377,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23271\/revisions\/24377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/23273"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=23271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=23271"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=23271"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=23271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}