RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Old Digital Scams, New Tricks: Stay Informed to Stay Safe
Since the Internet became an integral part of daily lives, scammers have attempted to use all sorts of networks to steal from unsuspecting victims. There aren’t any members of Royal families in need of assistance or foreign lottery winnings waiting ...
Hackers Will Hack – Will You Just Be Another Victim?
Most MSPs worry about missing an alert. Maybe the SOC will overlook something critical. Or perhaps a firewall will be misconfigured. Any one of these could let an attacker into the network. And when that happens, guess what? You’re the ...
Your Office May Be Full of Tracking Tech
Do you ever feel like someone is watching you? If you were an employee working in an office, you could trust your instincts. Many businesses are implementing tracking tech – employee tracking tools that monitor indicators like employee office use ...
Public Wi-Fi Risks: Protect Your Data Now
Your employees and customers have all visited stores and cafes or navigated public transportation systems offering patrons free Wi-Fi. Most people have happily connected to these networks, hoping for a faster connection or a quick update from work. Even so, ...
From TikTok to Trouble: Why Any Ambiguity in the Cyber Landscape is a Disaster Waiting to Happen
Is it working? Is it banned? Is it even legal anymore? Recent headlines about TikTok being banned (or not as the case may be) highlight serious debates over privacy, compliance, and governance, but they also highlight a deeper issue that ...
Enterprise Agility Starts with Empowering Your People
If you think back just five years, the world was completely different. Thanks to factors like the global pandemic and the rise of AI, businesses are facing disruption and change on an unprecedented scale. Unfortunately, most companies don’t feel like ...
Have You Had The Talk with Your Clients?
What You Need to Know About Risk Acceptance Ever had a client say “NO”? It’s frustrating, and it can even sting a little bit. However, that’s nothing compared to the ticking time bomb you’re sitting on if you don’t document ...
Automatic Framing Arrives for All Google Meet Users
If there’s one thing that almost everyone can agree upon, looking good on video calls for work can often feel more difficult than necessary. The latest Google Workspace updates may not be able to tame your bedhead or fix your ...
Preparing Organizations for AI: Strategies for Success
To anyone outside the technology field, the idea of artificial intelligence likely worries them about their jobs. After all, nothing's changed enterprise operations quite as much in recent years, and there's confusion and anxiety about how technology is reshaping how ...
Document Everything: Could Your Cybersecurity Survive Without Its Black Box?
Would you happily board a plane if you knew the crew skipped safety checks? Every pilot, mechanic, and crew member relies on detailed checklists to confirm every step has been completed properly. These checklists ensure that nothing is overlooked, and ...
Defending Against AI-Driven Phishing: Business Protection Strategies
Business leaders have an alarming new security risk to address: AI-driven phishing threats. Surveys reveal that over half of business leaders have been targets of email phishing attempts in the last two years. These attacks are an urgent concern because ...
NVIDIA Launches Omniverse Digital Twin Software
Simulations and modeling are critical elements of the aerospace, energy, and manufacturing design process. Traditionally, they add weeks or months to a project timeline. Still, with the release of the NVIDIA Omniverse Blueprint digital twin software, designers may be able ...


