You have IT questions, we have IT answers.
Discover leading Managed IT Service Providers across USA, Canada & the United Kingdom.
- 100s of leading MSPs
- Find a MSP near you
- Latest IT news for SMBs
Should You Resist Rapport Building from IT Providers?
Recently, I was dropping off donuts at a local business in San Antonio, and the receptionist/office manager told me that nobody there liked donuts. This struck me as a strange response, as it was hard to imagine that there wasn’t at least someone in the office who might enjoy a treat from Dunkin’ Donuts. After thinking about her response for a few seconds, it dawned on me that the situation was probably about trying to resist my rapport-building attempt. The Distrust of Salespeople The truth is that many people strongly dislike or distrust salespeople in general and often put up their guard to
Recently, I was dropping off donuts at a local business in San Antonio, and the receptionist/office manager told me that nobody there liked donuts. This struck me as a strange response, as it was hard to imagine that there wasn’t at least someone in the office who might enjoy a treat from Dunkin’ Donuts. After thinking about her response for a few seconds, it dawned on me that the situation was probably about trying to resist my rapport-building attempt. The Distrust of Salespeople The truth is that many people strongly dislike or distrust salespeople in general and often put up their guard to resist rapport-building attempts, so they won’t feel obligated to reciprocate. Just the other day, another business emailed me saying they were going to return the gift I had dropped off. I realized that this was probably the exact same issue. In fact, it might not just be resisting rapport building; some might even see dropping off gifts as an attempt to buy their business or as a bribe. Changing Perceptions You might be wondering what happened with the office manager who refused the donuts. After realizing that she might feel I was trying to bribe her and resist my attempt to build rapport, I decided to let her know that I had spoken with the partners, and they had told me their specific needs and the problems the firm was facing. They were in a pickle, caught between an IT rock and a hard place. I told her I thought I might have an alternative solution that could save the day. Suddenly, her demeanor changed, and I could tell she didn’t see me as a sleazy ‘salesman’ anymore. I had shown that I actually cared about the company more than just wanting to sell some IT stuff. After this happened, she gladly accepted the donuts and admitted they liked them.
Read full post on morristechnologysolutions.comMSPdb™ News
Secure Email Practices Every Attorney Must Use
Secure email practices matter because email holds client communications, legal documents, case strategy, and other confidential information. For law firms, a weak email setup can create serious risk fast. If email is not secured properly, attackers have a direct path to sensitive data and firm operations. At MDL Technology, we help law firms protect email
Secure email practices matter because email holds client communications, legal documents, case strategy, and other confidential information. For law firms, a weak email setup can create serious risk fast. If email is not secured properly, attackers have a direct path to sensitive data and firm operations. At MDL Technology, we help law firms protect email
Read full post on mdltechnology.com
LawPRO Insurance and AI Errors: A Disclosure Obligations Playbook for Ontario Lawyers (2026)
LawPRO Insurance and AI Errors: A Disclosure Obligations Playbook for Ontario Lawyers (2026) Written by Mike Pearlstein, CISSP, CEO of Fusion Computing Limited. Helping Canadian businesses build and manage secure IT infrastructure since 2012 across Toronto, Hamilton, and Metro Vancouver. Note: the partner, the associate, and the timing below are composites drawn from three Ontario
LawPRO Insurance and AI Errors: A Disclosure Obligations Playbook for Ontario Lawyers (2026) Written by Mike Pearlstein, CISSP, CEO of Fusion Computing Limited. Helping Canadian businesses build and manage secure IT infrastructure since 2012 across Toronto, Hamilton, and Metro Vancouver. Note: the partner, the associate, and the timing below are composites drawn from three Ontario
Read full post on fusioncomputing.ca
What Is Endpoint Security? Why It Matters for Your Business in 2026
What is endpoint security? Endpoint security is the practice of protecting end-user devices from cyber threats, unauthorized access, and malicious activity. Every device your employees use to connect to your business is a potential entry point for an attacker. Laptops, smartphones, servers, tablets, and IoT devices are doors into your business systems, your data, and your operations. The right
What is endpoint security? Endpoint security is the practice of protecting end-user devices from cyber threats, unauthorized access, and malicious activity. Every device your employees use to connect to your business is a potential entry point for an attacker. Laptops, smartphones, servers, tablets, and IoT devices are doors into your business systems, your data, and your operations. The right
Read full post on f12.net
How Physical Security and Cybersecurity Converge in Enterprise Security
Walk through any facility today, and many might still believe there’s a divide between physical security and cybersecurity teams at first glance: guards, video surveillance, and access controls like RFID keycard door locks on one side, with the IT team taking care of firewalls, antivirus software, and data encryption on the other. However, a deeper
Walk through any facility today, and many might still believe there’s a divide between physical security and cybersecurity teams at first glance: guards, video surveillance, and access controls like RFID keycard door locks on one side, with the IT team taking care of firewalls, antivirus software, and data encryption on the other. However, a deeper
Read full post on primesecured.com
How to Become a Paperless Office: A 7-Step Guide to Digital Transformation
You’ve seen the filing cabinet in the corner that nobody opens. You’ve watched an invoice get printed, signed, scanned back in and emailed three times, by three people. You know there’s a better way to run your business. But every “digital transformation” article online reads as if it were written for a Fortune 500 company…
You’ve seen the filing cabinet in the corner that nobody opens. You’ve watched an invoice get printed, signed, scanned back in and emailed three times, by three people. You know there’s a better way to run your business. But every “digital transformation” article online reads as if it were written for a Fortune 500 company…
Read full post on skyterratech.com
Managed IT Services for Calgary Businesses: Your Questions Answered
Managed IT Services for Calgary Businesses | PCe Solutions Managed IT Services for Calgary Businesses: Your Questions Answered By Peter Perez | 8-minute read | Calgary, Alberta PCe Solutions delivers proactive managed IT services to Calgary businesses — 24/7 monitoring, local response, and deep expertise across Alberta’s energy, financial, healthcare, and engineering sectors Calgary’s business...
Managed IT Services for Calgary Businesses | PCe Solutions Managed IT Services for Calgary Businesses: Your Questions Answered By Peter Perez | 8-minute read | Calgary, Alberta PCe Solutions delivers proactive managed IT services to Calgary businesses — 24/7 monitoring, local response, and deep expertise across Alberta’s energy, financial, healthcare, and engineering sectors Calgary’s business...
Read full post on pcesolutions.ca
7 IT Challenges Construction Companies Face, and How Managed IT Solves Them
Construction work is satisfying. Not only is it essential to our economy, but you also transform blueprints into real structures that shape our communities. However, even the most rewarding jobs come with their own set of challenges. Construction companies manage teams across multiple remote sites, rely on heavy-duty equipment, and coordinate complex schedules. But what
Construction work is satisfying. Not only is it essential to our economy, but you also transform blueprints into real structures that shape our communities. However, even the most rewarding jobs come with their own set of challenges. Construction companies manage teams across multiple remote sites, rely on heavy-duty equipment, and coordinate complex schedules. But what
Read full post on onboardit.com
Securing loT Devices Against Cyber Attacks
Understanding IoT Device Security Management IoT (Internet of Things) device security management has become a core concern as organizations expand their attack surface with connected devices. Many of these systems operate with full stack computing capabilities, making them as dangerous as any computer. They are deployed with limited visibility, inconsistent or non-existent patching cycles,
Understanding IoT Device Security Management IoT (Internet of Things) device security management has become a core concern as organizations expand their attack surface with connected devices. Many of these systems operate with full stack computing capabilities, making them as dangerous as any computer. They are deployed with limited visibility, inconsistent or non-existent patching cycles,
Read full post on alvaka.net
Why Microsoft Azure is the Backbone of Modern Businesses
Modern businesses are no longer competing only on products or pricing. Today, companies compete on…
Modern businesses are no longer competing only on products or pricing. Today, companies compete on…
Read full post on blog.synergyit.ca
The IT RFP questions your vendors are hoping you won’t ask
Upgrade your IT RFP. Ask the tough questions about MSP response time, offshore staffing, CMMC compliance, and AI policy to avoid costly surprises.
Upgrade your IT RFP. Ask the tough questions about MSP response time, offshore staffing, CMMC compliance, and AI policy to avoid costly surprises.
Read full post on encomputers.com