RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Zero Trust Cybersecurity: Keeping Your Data Safe
Hackers are looking for new ways to gain access to company networks, and the most common trick they use today isn’t a trick at all. A growing number of so-called hackers aren’t trying to break in but are waltzing through ...
Conquering Spreadsheet Barriers in Business Planning
For decades, spreadsheets and spreadsheet software like Excel have been the backbone of business planning. From tracking expenses and making projections to performing complex calculations, spreadsheet software helps guide organizational decision-making, report generation, and more. However, recent research reveals that ...
MSPs Under Attack: The New Wave of Cybersecurity Lawsuits and How to Protect Your Business
Are you familiar with the term “ambulance chaser”? It dates back to 1897, and references attorneys who actively chased victims as a method of gaining clients. For a term that was created long before computers existed, it has evolved into ...
3D Printing: Disrupting Traditional Manufacturing and Supply Chain Models
Owning a business means relying on the supply chain, which begins with procuring raw materials before a manufacturing company assembles them into a completed product. From there, the supplier distributes the materials, after which you add them to your inventory. ...
Protect Your Business From Invoice Fraud
Operating a business means receiving and paying many invoices. While your accounts payable department likely has defined processes to ensure that transactions go smoothly, a recent increase in invoice fraud should have you on high alert. Recent reports indicate that ...
Huge Spending Spree in the Cloud Market
It’s a great time to be a cloud computing operator as spending in the cloud market grows. Enterprises spend nearly $80 billion per quarter on cloud infrastructure, with no signs of slowing down. Researchers project that the global market will ...
Google PIN Enables Cross-Platform Chrome Password Sync
Are you tired of juggling Chrome passwords across your company’s devices? Google PIN simplifies the process and strengthens your cybersecurity to boot. You and your crew can focus on daily operations without worrying about password management. More Passwordless Options Traditional ...
TikTok Links Exploited To Hijack Microsoft Accounts
TikTok might be the hottest social media platform in the world. Still, it’s spreading more than dance videos and questionable recipes. Hackers have found a way to use the site for their phishing campaigns, hiding malicious links in user bios ...
Google Expands Gemini AI to Millions of Workspace Users
Suppose your company is eager to leverage the power of Google’s Gemini AI. In that case, the tech giant’s recent announcement will likely be music to your ears. Soon, you’ll enjoy the enhanced productivity of AI-powered assistance thanks to Gemini ...
Microsoft’s AI Tool Targets Factual Errors in AI Text
Do you know the world record for crossing the English Channel on foot? Or the last time someone carried the Golden Gate Bridge across Egypt? These are, without a doubt, ridiculous questions. Still, when users asked chatbots for the answers, ...
Microsoft Warns US Healthcare of New Ransomware Threat
Is your establishment prepared for the latest cybersecurity challenge? Microsoft has raised the alarm over a new ransomware threat from Vice Society (Vanilla Tempest) targeting the healthcare industry. This isn’t just a tech problem; it’s a business survival issue. Protecting ...
Smarter Business Decisions Start with Powerful Analytics Tools
You shouldn’t leave important business decisions up to chance. That’s why learning to use analytics tools is essential to help you make smarter business decisions. By using analytics tools, you’re taking the guesswork out of the decision-making process. You can ...


