RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
New iOS 15.4 Update Addresses AirTag Stalking Issue
Apple AirTags are handy. They're an incredibly convenient way to help keep track of your stuff. If you lose something that has been tagged you can easily locate it using the "Find ...
Skype Gets New 911 Calling Feature In The U.S.
Recently, Skype announced a change to its 911 calling feature. Previously the feature was only useable in the UK, Finland, Denmark, and Australia. Now, the company has unlocked it for the United ...
Zoom Bug With Some Macs Leaves Microphone On After Meetings
If you're a Mac user and you also use Zoom be sure to check to see what version of Zoom you're running. Recently a bug in the Mac version of the software ...
Windows 11 Is Now Able To Run Some Android Apps
Recently, Microsoft announced that they were adding support for Android Apps to Windows 11. The company first began testing that new functionality back in October of last year (2021). Now, the public ...
Update This WordPress Plugin Immediately To Prevent Security Risks
Do you have a WordPress site? Do you use the PHP Everywhere plugin? If so, you're not alone. More than 30,000 site owners have installed it. It's an excellent plugin that dramatically ...
Puma Sportswear Recently Impacted By A Data Breach
We have recently learned that Puma Sportswear was impacted by a data breach in the waning days of 2021. It's important to note that Puma's networks were not attacked directly. The attack ...
Microsoft Teams Gets Optimizations To Use Less Resources
Do you use Microsoft Teams and do you have an older PC that struggles with Teams video meetings? If so there's good news. Microsoft has recently upgraded Teams and halved the power ...
Medusa Android Banking Trojan Steals Sensitive User Information
There are two new forms of malware spreading rapidly among people with Android devices according to researchers at ThreatFabric. This latest campaign involves the FluBot malware (also known as Cabassous) and the ...
Malware Disguised As Windows 11 Upgrade Targets Windows 10 Users
According to researchers at HP, there's a new threat to worry about. Hackers have recently begun disguising malware as Windows 11 upgrades and are using them to target Windows 10 users who ...
The San Francisco 49ers Recently Hit With Ransomware Attack
Hackers will attack absolutely anybody. No one is safe and nothing is sacred. Not even football is safe. The most recent high-profile attack was made against the San Francisco 49ers according to ...
iPhone Sales Edging Out Android In The US
It's no secret that supply chain issues have impacted a variety of different industries. Apple has been somewhat less impacted than others. Leveraging this and their massive infrastructure and marketing budget, they ...
Hackers Are Using NFT Excitement To Trick Users
Researchers from Fortinet are warning of a new threat to be on the lookout for. Right now, NFTs are all the rage. Everyone is talking about them, and many are excited about ...


