RESEARCH
Negligence, Gross Negligence, and the Clauses That Decide Your Fate

Most MSP disputes aren’t about who’s perfect. They’re about who looks reasonable on paper. When claims from a client, an insurer, ...
Cyber Compliance
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Why You Might Want to Reconsider Your WISP for Every Single Client

Why This Isn’t Just About Checking a Compliance Box If you’re running an MSP, you’ve probably heard about Written Information Security Plans (WISPs). Maybe you’ve even created one—for certain clients, in certain industries, under certain regulations. But here’s the question: ...
The Dangerous Compliance Shortcut That Could Put Your MSP on the Hook for Negligence

Imagine sitting across from your best client. They tell you they’ve found a company that can build out their entire HIPAA compliance program in under three days. No heavy lifting. Fully automated. ...
Cyber Liability
You’re Using Your Smartest Engineer Wrong (And So Are Your Clients)

What if I told you that you’re misusing the most powerful engineer on your team? No, not Josh. Not the guy with the beard who still thinks ZFS is the answer to everything. I’m talking about AI. And right now? ...
What a New Lawsuit Can Teach Us About Cyber Liability and Documentation

When a cyber insurance provider sues vendors after a ransomware incident, it’s not just about fault—it’s about proof. In Ace American Insurance Co. v. Congruity 360 and Trustwave, we see how courts allocate responsibility—and why the side with the best ...
Why Plaintiff Attorneys Are Watching Your Breaches—And Why You Can’t Hide

Managed Service Providers (MSPs) sit at the heart of their clients’ IT and cybersecurity. But when it comes to data breaches, MSPs often underestimate who’s paying attention. It’s not just regulators and customers—it’s also plaintiff attorneys eager to file class-action ...
Insurance & MSP Liability
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
If You Don’t Own the Security Stack, You’ll Be Replaced

There’s a quiet shift happening in the cyber insurance world—and if you’re not talking to your clients about it, someone else is. That someone is their insurance provider. And they’re not just selling policies anymore. They’re selling cybersecurity solutions too. ...
More Articles
Hackers Bypass Google Chrome’s Infostealer Malware Block
No one wants hackers, especially business owners, to access their most precious data. Google aimed to help with an update to its Chrome web browser—Chrome 127—in July 2024, which included an info stealer malware block. Available to all 3.5 billion ...
The Impact of Cybersecurity Advances on Business Continuity Planning
Whatever type of business you have, there are always threats to your ability to operate. Cyber threats are among the most prevalent and potentially devastating issues every company must address. Recovering from a cyber attack takes time and money, and ...
Why Your Compliance Tools Might Be Setting You Up for Failure
No one gets up in the morning and says, “What can I do today to fail on an epic level?” But what if you’re actually doing things that set you up for failure? Things like relying on compliance tools that ...
Introducing Zoom Docs
Zoom is an integral part of the modern business environment. Although it remains a videoconferencing tool at its core, the company is moving toward offering more office software by introducing Zoom Docs to the platform’s Workspace all-in-one collaboration center. Launched ...
How Quantum Computing Could Revolutionize Financial Modeling and Risk Assessment
Suppose you work as a risk manager, bank owner, or derivatives trader in a financial institution. In that case, you’re likely looking to improve your decision-making skills and financial outcomes. Unfortunately, classical computers and traditional computational methods are slow and ...
Cybersecurity Innovations and Their Critical Role in Protecting Business Assets
Your business is only as efficient as its technology, as safe and protected as its security measures, and as reputable as its actions. When keeping all these factors in line, you need the right cybersecurity practices to ensure your equipment, ...
Microsoft Is Cracking Down On Its Security
Microsoft 365 is a leading platform for businesses worldwide. Investing.com says roughly 80% of Fortune 500 companies use it. The chances are your business uses it, too. However, whether your team is small or large, you’ve likely heard of and ...
Cisco Patches Critical Flaws
Suppose your company uses Cisco’s Smart Licensing Utility or Identify Services Engine. In that case, you must know two critical security patches and one medium security update. Without these key software updates, criminals can log in to or take over ...
Edge Computing: Reducing Latency and Enhancing Business Performance
Companies are constantly undergoing numerous online processes simultaneously, from uploading and downloading content to answering customer concerns across multiple platforms. However, the more processes, systems, and devices you add to your business, the more latency you may notice, holding your ...
Cybersecurity Lawsuits Are Coming—And They’re Coming for You
Let’s get one thing straight: the game has changed. Cybersecurity lawsuits aren’t just some distant threat happening to someone else. They’re real, they’re happening right now, and they’re not just gunning for your business—they’re coming for you. That’s right. These ...
This Windows Bug Has Been Exploited for Years
The biggest fear of any business owner is accidentally handing over sensitive data or program access to online hackers. This threatens the business’s reputation, employees, and customers. Unfortunately, anything from system crashes to vulnerabilities can cause this, and a longstanding ...
Cybercriminals Target Educational Institutions as Year Begins
The 2024-2025 school year is underway, and parents are sending their kids back to school with fresh notebooks, pencils, and lunch boxes. But there’s one school supply that many parents didn’t think of: cybersecurity awareness. It might sound far-fetched, but ...


