Keep your MSP Secure with LogMeIn Central

Cyber criminals are targeting MSPs more and more due to the number of accounts they have access to on their networks.  MSPs need to be consistently vigilant with their security practices and ensure that they are partnering with software vendors that also prioritize security.

LogMeIn prioritizes the security of our software solutions to guarantee that we’re providing best-in-class security to keep your business and users secure (and to provide you peace of mind).

Here are a few ways we work to keep you secure:

Data Encryption

LogMeIn uses 256-bit SSL encryption on data that is passed from the host through the internet. This ensures that your data is protected while being transmitted outside of your network.

Multi-Factor Authentication

LogMeIn recommends all users introduce multi-factor authentication to add an additional layer of protection to their account. In Central, customers can choose to receive codes via the LastPass authentication app, text message, or email. To learn more about adding multi-factor authentication to your account, visit

Intrusion Detection Technology

In LogMeIn Central, we have multiple intrusion detection filters to safeguard your account.  First, we employ a TLS Filter to ensure that data is not changed in transit. Second, we employ our own filters to protect against malicious behavior. These filters include an IP address filter, Denial of Service filter, and Authentication filter. These filters are built to flag any malicious behavior and reject the connection attempt.

Software Updates

The LogMeIn host, based on user preferences, can semi-automatically or automatically update itself on the user’s computer.  These software updates are digitally signed with a private key that protects customers in the result of one of the LogMeIn data centers being compromised.

When it comes to your business’ security, do not compromise with a vendor that doesn’t take it seriously.

To learn more about our security practices, read our security whitepaper.


Love Bites: Ransomware Mimics Love Letter

You’ve probably heard the expression “love hurts” in the context of a heartbreak, but how about a ransomware attack?

This Valentine’s Day, we’ve heard reports that internet criminals are taking advantage of human emotions with romantically-inspired ransomware attacks. With Valentine Day inspired subject lines – ‘My letter just for you’ or ‘Wrote my thoughts down about you’ – these phishing emails are pulling at the heartstrings. Once the email is opened, victims see a love-letter named attachment that, if downloaded, will immediately install ransomware onto the victim’s computer. This will encrypt the victim’s computer until they pay the determined ransom.

These holiday-specific ransomware attacks are nothing new to consumers, but are increasingly targeting small businesses.

To keep your small business network secure from this type of targeted attacks, experts recommend creating a strong patch management policy. Patches are released when a provider discovers a vulnerability in their system that needs fixing, but organizations are not yet effective at installing these patches when these vulnerabilities are discovered. A 2018 Ponemon Institute report showed that 34% of cyber-attack victims were already aware of a vulnerability prior to being attacked. Small businesses need to have proper patch management in place to address a vulnerability prior to its exploitation by cyber-criminals.

As cyber-criminals become more specific and targeted (and even a little romantic), IT teams need to become more preventative and secure. Patch management is a key step to preventing targeted ransomware attacks and to staying one-step ahead of cyber-criminals.

To learn more about what a cyber-attack costs a small business, check out our infographic here:


Top-Rated IT Management Apps for Remote Asset Monitoring

The workforce has changed, and having the ability to work from anywhere has become the new norm. However, this increase in flexibility has led to an increase in theft or loss of IT assets, so ensuring IT professionals stay ahead of these threats is more important than ever before.

GetApp, a Gartner company,  put together the top-rated IT management apps for remote asset monitoring that allows IT professionals to stay ahead of these threats and have more control over their technology assets.

According to user reviews, LogMeIn Central was rated 4.5 out of 5.0, followed by ConnectWise Automate (4.2) and Kaseya VSA (4.0). Pulseway was rated 4.8, and Jamf Pro was rated 4.7 out of 5.0.

Utilizing IT management tools ensures IT professionals keep their companies and employees operational and secure. These solutions offer remote monitoring and control capabilities to help IT professionals track, manage, and protect all technology assets – from anywhere.

LogMeIn Central users particularly liked the following:

  • Reviewers are happy with the wide array of customization options and features provided by LogMeIn Central.
  • Users say that LogMeIn Central’s mobile access capabilities are reliable and make it easy to connect.
  • According to users, LogMeIn Central offers reliable features and is easy-to-use, even if you have to manage 200+ systems remotely.

Explore the article to view what users liked and disliked about each solution here:



LogMeIn Central Rated Top Endpoint Management Software in G2 Crowd

By verified product users on G2 Crowd, LogMeIn Central has been awarded the highest rated & easiest to use endpoint management software solution!

On top of those rankings, LogMeIn Central was also given top rankings for having the highest ROI, the smoothest implementation, & being the most usable.

G2 Crowd rankings are based on an algorithm that incorporates real-user satisfaction scores from review data. Thank you to all our users for the positive ratings!

To learn more, visit:



Central as a Platform is Live

Today, we’re excited to announce a new packaging structure is live for Central, giving our customers more freedom and flexibility to get exactly what they need out of our product. This new structure allows us to position Central as a platform and further expand as a more robust endpoint management solution with the ability to build on future modules based on our customers’ needs.

At Central, we know IT professionals wear a lot of hats, so we’re focused on ensuring our customers get the functionality they need to increase productivity, automate routine IT tasks, and optimize their resource allocation. Central’s new modules allow incoming new customers to prioritize what matters most and get the functionality they need out of their endpoint management solution.

Incoming new customers have the option to purchase our new Base package which has robust functionality and add-on one, two, or all three core functionality modules (Security, Automation, Insight) based on their needs and priorities.

To learn more, please visit: 



We are getting reports from LogMeIn customers about suspicious emails that are designed to look like they are coming from LogMeIn — they have all the hallmarks of phishing attempts.

The reports are meant to look like a LogMeIn email. The email subject line is: You have earned 6 months of free subscription!”

We want to make it clear that these emails did NOT come from LogMeIn and people should NOT click on the links in these emails.

While we are working with our partners to remove these malicious websites, as part of our commitment to security, we want to make sure our users and the public are aware of this specific email, and provide an easy way for people to identify the tell-tale signs of phishing attacks.

If you have clicked a link in this email, we recommend changing your password and enabling two-factor authentication on your account as well as your users’ accounts.

Email subject line: You have earned 6 months of free subscription
Intended behavior/action: Tries to get you to open the embedded link which then downloads a malicious file.


Watch our latest Central Master Class

Last week, we hosted our third Central Master Class on the LogMeIn Client App & One2Many Task Management. These Master Classes are quarterly webinars that are designed to go in-depth into two features of Central to ensure that you are using Central to the best of its abilities.

In this Master Class, we covered: 

  • The most efficient way to install software and distribute files across multiple computers 
  • Our top tips for running scripts and automating manual tasks  
  • How to quickly connect to your remote computers without a web browser

To watch this Master Class as well as previous Master Classes, visit: 


Double Threat: How Your Endpoints & Passwords Put You at Risk

From passwords resets to corporate network threats, today’s IT teams are increasingly burdened with time-consuming tasks that keep them from more strategic work. With this in mind, we created an informative infographic to demonstrate how your passwords and endpoints might be putting you at risk – and then show you how to address these problems.



Reliability is Crucial for Remote Monitoring and Endpoint Management

We know that IT professionals simply don’t have time for down-time, so ensuring all software solutions are running and work as they should is absolutely critical. LogMeIn Central recently surveyed IT professionals to learn what they consider to be most important in a Remote Monitoring and Endpoint Management solution, and the results were exactly as expected! We confirmed that reliability (works every time) and responsiveness (low latency) are most important, and our customers rate having a very good to excellent experience with us. LogMeIn Central consistently achieves better than 99.99% system up-time, so we’re proud to continue to offer the best-in-class unattended remote access in the market and ensure our software simply works, always.


LogMeIn Central Named a Top Endpoint Security Vendor

By a third-party reviewer, LogMeIn Central has been named one of the top 6 endpoint security vendors to watch in 2019.  This reviewing site focuses on Endpoint Security & Protection Platforms and posts about best practices when evaluating or maintaining an endpoint solution.

The reviewer writes:

“LogMeIn provides a comprehensive endpoint management and security solution indicative of the blurring lines between identity security and the traditional endpoint perimeter. The LogMeIn Central solution security portfolio includes anti-virus, patch management, proactive alerts, software inventory, and computer health monitoring, thereby providing a comprehensive package for enterprises struggling with perimeter security gaps or visibility issues.”

To learn more, visit: