RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Latest Data Breach Hits Guess Clothing Company
American fashion retailer Guess recently became the latest in a seemingly unending parade of big-name companies to suffer a data breach. The company's breach notification letter was mailed to all customers whose ...
Internet Browser Firefox Will Soon Get SmartBlock Feature
There's good news for anyone who uses the Firefox web browser. Beginning with the release of Firefox 87 which was released in March of this year (2021) Mozilla has introduced a new ...
Gmail Adding Email Authenticator Feature Called BIMI
Change is coming to Gmail. Recently as a courtesy of a new agreement between Google and the AuthIndicators Working Group you'll soon begin seeing BIMIs (Brand Indicators for Message Identification). The brains ...
BazarBackdoor Uses Compressed Files To Deliver Malware
Security researchers have spotted a new phishing campaign in the wild that you'll want to make a note of. In this case the hackers are attempting to deliver a malware strain known ...
Morgan Stanley Banking Latest To Get Hit By Data Breach
Hacks continue to evolve as the hackers themselves get increasingly sophisticated. One of the most recent victims is investment banking giant Morgan Stanley. Their network was breached after the attackers stole personal ...
Microsoft Issues Patches For PrintNightmare Bug
If you're one of the legions of Windows users, you may be aware that the OS currently has some printer issues. In fact, they're so severe that the bug has been dubbed ...
Ransomware Attackers May Target Industrial Machines Soon
Government officials and some internet security researchers have been saying for quite some time now that the nation's (and the world's) core infrastructure is at risk. Some examples include the flow of ...
Google Calendar Adds Virtual Meeting For Hybrid Office Workers
The pandemic is slowly fading from the headlines and releasing its grip on the world as the dominant factor in daily life. Now, businesses of all shapes and sizes are beginning to ...
Fake Apps Stealing Info With Current Cryptocurrency Boom
In case you haven't been paying attention, the Cryptocurrency markets have been booming in recent months. All of the major currencies have now pulled back from their all time highs, but BitCoin ...
Chromebooks Get First Optimized Browser Alternative
In the world of internet browsers, most people only think of the Big Three: Chrome, Safari, and Microsoft Edge. Occasionally, Firefox gets an honorable mention, but there are a whole raft of ...
This Malware Could Be Using Your PC To Make Money
If you haven't heard of a malware strain called Crackonosh, be aware that it might be abusing your system, and specifically, Windows Safe Mode, to make money for its controllers. In fact, ...
Some Netgear Devices May Have Vulnerabilities According To Microsoft
Do you use a Netgear DGN router, either at home or in your office? If so, be aware that Microsoft has discovered a number of security flaws that impact those devices, if ...


