RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Another Text Bug Could Crash Your iPhone
The more things change, the more they stay the same. When Apple released iOS 11 a few years back, the company had a serious issue revolving around text messages and foreign language ...
Trickbot Leads The Pack In COVID-19 Malware
Recently, security companies all over the world have seen a surge in spam, hacking, and scam campaigns that are taking advantage of the fear and confusion surrounding the global pandemic. They're using ...
Some Smart WiFi Linksys Routers May Need A Password Reset
If you have a home network, odds are good that you use a Linksys router. In fact, it's a brand that a great many small and medium sized businesses rely on as ...
Agent Tesla Malware Steals WiFi Passwords From Infected Users
A few new variants of the Agent Tesla info-stealer malware have been spotted in the wild and should be on your radar if they're not already. The new variants are more dangerous ...
Gmail Blocks Millions Of COVID-19 Phishing Emails Daily
Google's popular Gmail service has been busy. In a typical day, the company's email system blocks more than a hundred million phishing emails. During the last week alone, the company reports that ...
Hackers Stopped With Help of Microsoft Digital Crimes Unit
Microsoft's Digital Crimes Unit (DCU) recently played an instrumental role in taking down a botnet made up of more than 400,000 devices. A botnet is a tool that hackers use to invade ...
Apple Announced A New Low-Priced iPhone
Rumors have been swirling for months about Apple and the possibility that they'll release a successor to their iPhone SE. Recently, the company put a pin in all the speculation and unveiled ...
Beware Of Phishing Emails Appearing As From The Federal Government
The Digital Security firm Inky reports that they've discovered a new, disturbing phishing campaign you should be aware of. The company has spotted a disturbing number of scam emails purporting to be ...
New Windows 10 Disk Cleanup Feature Coming Soon
If you're a veteran Windows user, you've almost certainly made frequent use of the "Disk Cleanup" feature, which has been a standard part of the OS for what feels like forever. Recently ...
Hackers Targeting WooCommerce Users To Steal Credit Card Information
WooCommerce is a WordPress-based, free plugin that makes it incredibly easy to sell just about anything online. With more than five million installations, it's clearly a favorite on the web. Unfortunately, its ...
Spread Of COVID-19 Data Available From Google And Apple
Big tech firms are lining up to help us get a better handle on the data concerning this pandemic. Data includes who has Covid-19 and how fast and far the virus is ...
Ransomware Targets Company Working On A COVID-19 Vaccine
It's common knowledge that hackers are highly opportunistic and certainly not above targeting children, the sick and the dying if there's money to be made. Even so, attacking a drug company currently ...


