Welcome to our new website!

Managed Security Operation Center

Learn to Run Your I.T. Business

Live Show and Chat every Sunday at 7:30pm EST

Hosted by:
Paco Lebron from ProdigyTeks
https://www.prodigyteks.com/
John Dubinsky from Maven Group
https://www.mavengroup.net/
Billy Austin from Rocket Cyber
https://www.rocketcyber.com/

MSP Unplugged
http://mspunplugged.com/

Support This Show
Patreon
https://www.patreon.com/MSPUnplugged
Buy Me A Coffee
https://www.buymeacoffee.com/MSPUnplugged
Paypal
https://www.paypal.com/paypalme2/mspunplugged

Main Topic: Managed SOC Platform
Built for MSPs delivering cyber security to SMBs
ENDPOINT | NETWORK | CLOUD

Links:
Call to Action:
Our friends over at Syncro are hosting a giveaway for a few weeks. Those who sign up for a free trial of Syncro and attend a product tour will receive a nifty Syncro mug! Visit the URL to book your demo today: https://bit.ly/mugpl

Paco Tips
Smart Calling on Sales
In this new day and age you need to re-adjust your sales process and comfort. My good friend blah blah blah
https://www.youtube.com/watch?v=TcuCSdMdllI

John Tips
Microsoft Windows File Recovery (Windows 20-04 only)
https://www.microsoft.com/en-us/p/windows-file-recovery/9n26s50ln705?activetab=pivot:overviewtab
Accidentally deleted an important file? Wiped clean your hard drive? Unsure of what to do with corrupted data? Windows File Recovery can help recover your personal data.
** Do not ignore the Store for Microsoft tools that might help. - Windows Scan, Microsoft Whiteboard, Wireless Display, etc.

whatsmyip.org
https://www.whatsmyip.org/
WhatsMyIP.org started in April of 2001 when I bought this domain name on a whim. This site was originally hosted on an Apple Mac Quadra 700, connected to a residential internet connection, and the IP Addresses were retrieved via AppleScript. We've come a very long way. If you want to see how long, check us out on Archive.org!
** Port Scanners, WhoIs & DNS, Website Rankings, Password Generator, MAC Address Lookup, etc., etc., etc.

VOIP Tips (rant)
If you are going to be a VOIP provider you ARE going to be a network engineer.
• If your vendor cannot provide you recommendations on the following - FIND A NEW VENDOR.
• Your vendor vetting is EXTREMELY important. Your vendor will easily be 70% of a successful installation. 95% of VOIP sales vendors will ask nothing about the current infrastructure or supply necessary requirements. Understand that your customers really have no idea what VOIP is, they simply want phone service.
• There is nothing VOIP cannot do versus an on-site PBX with the correct vendor and configuration.
• You need to have commercial grade equipment for a successful installation that supports the settings requirements of VOIP (RTP and SIP traffic (QoS) and firewalls that are SIP/VoIP friendly).
• Know and understand UDP. You will need to configure or accommodate this for BLF (Busy Lamp Field).
• Know and understand QOS (quality of service) so you can prioritize traffic.
• Large VOIP installations are going to most likely need a separate VLAN for voice.
• Correctly configure your firewall to bypass trusted VOIP traffic without inspection

Billy Tip
Have insight and visibility into customer account authentications.

Guest: Billy Austin - President & Co-founder at RocketCyber
LinkedIn - https://www.linkedin.com/in/billyaustin/ (Billy’s Profile)
RocketCyber - https://www.rocketcyber.com/
FAQ’s - https://www.rocketcyber.com/faqs
BLOG - https://www.rocketcyber.com/blog
Videos - https://www.rocketcyber.com/how-to-videos

RocketCyber's threat detection apps provide solutions for many cybersecurity use cases. Each use case facilitates cyber monitoring opportunities for the managed service provider. Login to your account to turn on preferred RocketApps, no separate installation required.

Each App is purposely built to detect malicious/suspicious activity spanning endpoint, network, and cloud attack pillars. When threats are detected, RocketCyber provides the MSP operator reporting, a triage view, and the ability to generate tickets to your PSA.

Cybersecurity Framework (NIST)
https://www.nist.gov/cyberframework

Pax8 NIST Cybersecurity Framework:
https://explore.pax8.com/nist-framework?

Windows Defender - https://www.microsoft.com/en-us/wdsi/threats?SilentAuth=1
Cylance - https://www.cylance.com/en-us/index.html
Webroot - https://www.webroot.com/us/en
Sentinel One - https://www.sentinelone.com/

Untangle Firewall - https://www.untangle.com/untangle-ng-firewall/

What is a firewall Syslog - firewall log monitoring acting as a syslog collector. Messages are parsed, analyzed, and enriched with threat intel for potential threat indicators. When a threat or security event is detected, message details show up in the console.
What is a Syslog - https://www.pcwdld.com/what-is-syslog-including-servers-and-ports

DISCLAIMER: This description contains affiliate links, which means that if you click on one of the product links, we’ll receive a small commission.