RESEARCH
Your AI Assistant Just Got Hijacked And You Didn’t Even Notice

If a hacker walked into your office and started whispering instructions to your best engineer — would you let it happen? Of course not. But that’s exactly what’s happening… quietly… invisibly… right now. Your AI just got hijacked. And it’s still smiling, taking notes, and answering ...
Cyber Compliance
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Why You Might Want to Reconsider Your WISP for Every Single Client

Why This Isn’t Just About Checking a Compliance Box If you’re running an MSP, you’ve probably heard about Written Information Security Plans (WISPs). Maybe you’ve even created one—for certain clients, in certain industries, under certain regulations. But here’s the question: ...
Cyber Liability
AI Is Already Inside Your Walls. You Just Haven’t Looked Hard Enough.

Think your clients are the ones playing fast and loose with AI? Guess again. Your techs are doing it—right now—on your network. Not because they’re reckless. Because they’re efficient. They’re pasting configs into ChatGPT. Running SOPs through Gemini. Copying proposals ...
You’re Using Your Smartest Engineer Wrong (And So Are Your Clients)

What if I told you that you’re misusing the most powerful engineer on your team? No, not Josh. Not the guy with the beard who still thinks ZFS is the answer to everything. I’m talking about AI. And right now? ...
What a New Lawsuit Can Teach Us About Cyber Liability and Documentation

When a cyber insurance provider sues vendors after a ransomware incident, it’s not just about fault—it’s about proof. In Ace American Insurance Co. v. Congruity 360 and Trustwave, we see how courts allocate responsibility—and why the side with the best ...
Insurance & MSP Liability
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
If You Don’t Own the Security Stack, You’ll Be Replaced

There’s a quiet shift happening in the cyber insurance world—and if you’re not talking to your clients about it, someone else is. That someone is their insurance provider. And they’re not just selling policies anymore. They’re selling cybersecurity solutions too. ...
More Articles
“Why Bother?”: A Technician’s Perspective on Security Tools, Ownership, and What Happens Next
Look, I’ll be straight with you. Most of us aren’t ignoring that new security tool because we’re lazy or don’t care. We’re ignoring it because deep down, we already know what it’s going to say. And if we open that ...
Would You Hand Your Intern the Keys to Your Datacenter? Why You Need to Rethink AI—Before It’s Too Late
AI is the latest shiny object in tech, and your team is probably already using it. But here's the uncomfortable truth: too many people are treating AI like it’s their smartest engineer—when in reality, it’s the intern who just showed ...
This Type of Blame Will Destroy Your MSP Unless You Do This First
It starts the same way every time. Something breaks. A phishing email slips through. An account gets compromised. Ransomware locks up a server. The client panics. Then the questions begin. What happened? How bad is it? And then the one ...
Phishing: The Big, Hairy Problem Nobody Has Solved (Until Now)
Let’s talk about the elephant in the room. Phishing is still the single biggest way attackers get in. IBM just put out their latest report for 2025, and for the first time phishing has officially overtaken stolen credentials as the ...
Your Marketing Sounds Like It Was Written by a Robot—Because It Was
Let’s be honest. You’re slammed with tickets, chasing down weird user issues, and trying not to lose your mind over Janet’s printer—again. So when someone suggests using AI to handle your marketing, it sounds like a miracle. Here’s the problem: ...
The Ice Cream That Cost Him a Client (And Made Him Thousands)
I was having an ice cream cone with the owner of an MSP recently. Yes—ice cream. I’m a fan. Anyway, we’re talking shop, and he drops this bomb on me: “Bruce, your team ran a pen test on one of ...
WARNING: Why Your Clients’ AI Habits Could Become YOUR Legal Nightmare
If you think AI tools like ChatGPT are harmless for your clients, think again. Last week, Sam Altman—the CEO of OpenAI—publicly warned that conversations with ChatGPT are not covered under legal privilege. People using ChatGPT as a “therapist” or “confidant” ...
Stop Handing Hackers the Keys: Why CVSS 8.2 Credential Leaks Just Made Legacy Scanning Obsolete
When two high-risk CVEs (CVE-2025-32353 and CVE-2025-32354) hit last week, the message was loud and clear: the way most MSPs perform security assessments is no longer just outdated—it’s risky. These vulnerabilities revealed that some widely used scanning tools store administrative ...
Tribal Knowledge Will Sink Your MSP: Why “Sorta Documented” Is a Lawsuit Waiting to Happen
There is a silent killer inside most MSPs. It is not ransomware. It is not an unpatched firewall. It is not even a missed backup. It is tribal knowledge. Walk into any MSP and you will see the same thing. ...
Business Risks in 2025: When Tools Fail, What’s Next
Meta Description (≈155 characters): Every tool your business relies on can fail. In 2025, risk assessments and planning for disruptions are essential to protect revenue and reputation. In business, tools are everywhere. They are the systems, services, and partnerships we ...
Is Your Business Ready to Defend Its Cybersecurity Program?
You probably think your business is covered when it comes to cybersecurity. You’ve got IT support. You have tools in place. You’re investing in the right software. But if a regulator, auditor, insurer—or worse, a lawyer—asked you tomorrow to prove ...
Your PSA Won’t Save You From a Breach
I had dinner the other night with one of our partners. Great guy. Smart. Ambitious. Doing all the right things to grow his MSP… except one. He’s rebuilding his PSA. And his RMM. At the same time. Which sounds productive—until ...


