RESEARCH
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Safeguard Your Valuable Data with Regular Backups
If a disaster were to strike your business today—like a cyber attack or a major storm—how long would it take for you to get back up and running? If you don’t invest in regular data backups, recovery will likely take ...
Cloud Architecture Exposed by Cybersecurity Skills Shortage
Is your establishment truly safe from cyber threats? Many businesses are discovering their cloud architecture security measures aren’t as robust as they thought. With hackers becoming more sophisticated, the need for cybersecurity specialists has never increased. Sadly, though, demand keeps ...
Cloud Computing: Revolutionizing Business Operations
Whether starting a business or growing your long-standing one, it’s difficult to tell how much data storage and hardware systems you need to keep everything functioning optimally. While paying for too much can reduce your profit margin, not having enough ...
From Break-Fix to Compliance: How to Transition Your MSP Model Without Losing Clients
If you’re still running a break-fix MSP, I’ve got news for you: the clock is ticking. Sure, you’re fixing servers, resetting passwords, and putting out fires, but here’s the deal: break-fix is broken. It’s reactive, unpredictable, and worst of all, ...
Apple Expands Business Connect Tools
Thanks to recent enhancements in the tech giant’s Business Connect tools, businesses can now provide Apple users with more information. From more details in Apple Maps to features that enhance customer engagement, this latest expansion helps companies establish stronger brands ...
Globe Life Faces Hacker Extortion in Cyber Attack
Suppose you have an insurance policy with American Income Life Insurance Company, a subsidiary of insurance giant Globe Life. In that case, you may soon receive a notification of a data breach that exposed the personal information of at least ...
Modern Buyer Engagement Strategies
Knowing what your customers need and want is the foundation of all winning marketing campaigns. Without a solid understanding of their pain points and preferences, it's virtually impossible to successfully engage buyers and turn prospects into customers. To remain competitive, ...
AI’s Growing Role in Modern Software Development
By definition, software development must remain on the cutting edge of technology — and in today's world, that means embracing artificial intelligence. While current tools are decidedly imperfect and have some significant limitations, they're evolving daily, and AI’s role in ...
Data Backup Tools Are Letting Businesses Down
Suppose you ask any IT professional about the critical elements of disaster recovery planning. In that case, data backups will undoubtedly top the list. Whether there’s a natural disaster or a cyber attack, a full backup of your business’s data ...
Beware: Fake Google Meet Invites Hide Malware
Suppose we didn’t have enough reasons to dread meetings. In that case, a recent rise in virtual scams using fake Google Meet invitations might be the final nail in the coffin. In this new type of phishing, hackers send out ...
QR Codes Exploited to Bypass MFA Protections
Quick response, or QR codes, are ubiquitous. Businesses use them for everything from contactless access to restaurant menus and user manuals to providing payment and shopping links, making it easy for customers to access digital resources on their mobile devices. ...
ADT Network Breach: Customer Data Remains Secure
Did the recent ADT network breach leave you feeling less secure? Knowing the causes of this incident could help you narrow down the best proactive steps to safeguard your establishment. Breaking Down the Case ADT is a trusted name in ...


