RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Google Forcing Accounts To Use Two Factor Authentication
Google recently announced that they're planning to auto-enroll some 150 million user accounts into two factor authentication (2FA). The company prefers the term two-step verification (2SV). The company had this to say ...
New Firefox Browser Feature Appears To Be Adware
With the release of Firefox 92 back in September Mozilla made a change that may well doom the browser. If you use Firefox you have probably already noticed it. When you start ...
Hackers Can Take Control Of Some Electronic Diabetic Devices
Medical equipment provider Medtronic has issued an urgent recall order for insulin pump controllers belonging to their "MiniMed Paradigm" family. The company cited serious cyber security risks as the reason for the ...
New Dangerous Android Malware Is Infecting Millions
Researchers from Zimperium zLabs have detected a nasty, dangerous, global malware campaign that has managed to infect more than 10 million Android devices from around the world in more than 70 different ...
Sneaky Malware Stealing Sensitive Gamer Information On Gaming Sites
Are you a gamer? Do you have an account on Steam, EA Origin, or the Epic Games Store? If so there's an emerging threat you should be aware of. A new strain ...
Hackers Find Security Vulnerability With Apple Pay
Do you have an iPhone? Do you make use of the Apple Pay service? If so there is a security issue you need to be aware of. Researchers have discovered a means ...
Google Is The Most Popular Search Result On Bing
It's good to be the King and in the world of search Google is the undisputed King. That fact has made the tech giant something of a target however. Google has been ...
With Upcoming Release, You Can Sync Excel And Quickbooks
Are you a QuickBooks user? If so you're going to be thrilled by the company's recent announcement that Excel integration is coming soon. You read that correctly. Soon you will be able ...
DDOS Attackers Are Targeting VoIP Providers
Hackers around the world are flexing their muscles. For reasons that aren't yet clear they have been launching distributed denial of service (DDOS) attacks against Voice over Internet Protocol (VoIP) providers and ...
Zero Day Bug Found In MacOS
A new Zero Day vulnerability in macOS has been discovered. The flaw impacts all macOS versions up to the latest release Big Sur. The bug was found by Park Minchan an independent ...
Youtube Video Downloads May Be Coming To Computers
If you use the YouTube app on your phone and you're a premium subscriber you've currently got the ability to download videos from the service. As of this date however those are ...
Recent Study Shows Alarming Insights On People And Passwords
A new study recently published by the digital identity firm Beyond Identity contains a number of surprises relating to passwords and password security. This is information that IT professionals and small or ...


