RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Increasing Online Love Scams Are Costing Victims Big Money
Since the start of the Covid-19 pandemic online dating sites have seen a tremendous surge in memberships. People are seeking romance online since in person dating was sharply curtailed by lock downs. ...
Apple Has Released iOS 15 With New Features
Apple recently released iOS 15 and iPadOS 15 for its phone/pad products. The latest update brings a number of new features to Apple users. Here's a quick overview: Improvements to Do Not ...
Don’t Fall For This Cryptocurrency Giveaway Scam
You know you've hit the Big Time when you get a scam named after you. That's exactly what has happened to Elon Musk. The latest scam that's making the rounds is called ...
Android Users Will Get Additional Gmail Features
If you access your Gmail account via your PC it currently has features that simply don't exist on the Android Gmail app. Specifically with regards to its email search options. These make ...
New Malware Is Targeting Linux And WordPress Users
A new strain of malware which has been dubbed 'Capoae' has been spotted in the wild. It was written in Go and this strain targets Linux systems and WordPress installations. It was ...
Update Apple Devices Soon For Important Security Patch
Apple released a very important security update today. The update fixes a pair of zero-day vulnerabilities that have been spotted in use in the wild to attack both Macs and iPhones. One ...
This Malware Can Turn Off Windows Defender
Some malware strains are built with robust protections in order to avoid detection. Zloader goes a step further and actually disables Microsoft Defender AV (formerly known as Windows Defender). That's significant because ...
Ransomware Attackers Look For Unpatched Systems To Exploit
Not long ago Microsoft patched a critical MSHTML remote code execution security flaw being tracked as CVE-2021-40444. Beginning on August 18th of this year (2021) the company spotted hackers exploiting this flaw ...
Popular HP Gaming Laptops And Desktops Have Security Vulnerability
Do you own an HP Omen, Envy, or Pavilion gaming laptop or desktop? You're certainly not alone if you do. It's a wildly popular and incredibly versatile model that has sold millions ...
Microsoft Accounts Will Allow Passwordless Methods For Users
Microsoft will be rolling out a new passwordless login scheme in the weeks ahead and that should make just about everyone happy. Passwords and having to remember endless multitudes of them are ...
Installing Windows 11 On Unsupported Devices May Have Security Risks
Microsoft raised hackles worldwide when they placed stringent hardware requirements on their recently announced Windows 11 OS. Many chipsets that are more than capable of running the new software aren't on the ...
Report Finds One Third Of Suspicious Emails Are Threats
Employee cyber security training is paying off according to a report recently released by IT security company F-Secure. Researchers from F-Secure analyzed more than 200,000 emails that had been flagged as suspicious ...


