jarrod gibson

Jarrod Gibson, Director of Managed Services, Apex Technology

This is the third entry in a series of Technology Spotlight articles created with the help of our MSP partners. The series’ purpose is to educate our customers and partners about topics that they might find helpful.

The subject here is the benefits of working with managed services providers (MSPs), many of whom we count as valued partners. We asked our friend and partner Jarrod Gibson of Apex Technology to share his insights on this topic, which Loop founder/president James McKinney also discussed with us recently.

What is the typical size of your customer?

We handle businesses from 10-12 employees to those up to 100. Our average client has about 40 employees, but our model scales to any size, up to 100, 150 or even more. The market is changing, and businesses that have internal IT use managed services partners like Apex to partner with internal staff.

What problems do you see with businesses that work with MSPs?

The biggest issue we see is a general sense among businesses that all IT partners and managed services providers are created equally. Let’s say they’ve worked with the for 10 years – they feel comfortable with them, and trust them. Unfortunately, the structure of the agreement does not always align the IT vendor with the customer.

These customers are under break-fix, reactive IT support agreements. They call the IT vendor who comes out to fix a problem, and the parties don’t engage again until there’s another problem.

What we do is a completely managed services agreement by which we provide a business with all of the security tools, products, support and services the customer needs at a fixed monthly cost. That incentivizes us to make sure they don’t have problems. It’s better for us to make sure they have all the necessary security measures and best practices in place to prevent breaches or data loss.

Four of the six clients we’ve onboarded over the last several months have been under some form of cybersecurity attack, but only two of them knew it.

One example of that is e-mail phishing, where someone spoofs an e-mail address and sends an e-mail to the office manager asking for money to be wired.

We’ve also onboarded customers whose firewalls are wide open to the world, with hackers from China and Russia pounding on their servers.

These things often get overlooked, largely due to the types of agreeme