RESEARCH
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Beware of QR Code Phishing Scams
The popularity of the QR code has grown rapidly. These Tetris-like black and white boxes are appearing on merchandise, advertising, and even in television programs. While QR codes provide a lot of ...
Cloud Computing: Transforming Business Infrastructure
It should come as no surprise that cloud computing is fast becoming the dominant form of data storage for companies that want to keep insights or data safe and save some money ...
Beware of DDoS Attacks
One type of cybercrime that’s becoming a more significant problem in today’s digital age is distributed denial of service (DDoS) attacks. What makes these attacks so dangerous, and how can you stay ...
Every Client is Different. Every Client Is the Same
A central challenge for any growing MSP is how to efficiently scale your service delivery. Scaling efficiently is difficult because of two conflicting principles: Every client is unique and should be served ...
Malicious Ads Are Being Used to Infect Victims with Malware
Cybersecurity researchers at Malwarebytes have recently highlighted a worrying trend where ransomware attacks are facilitated through malicious advertisements for commonly used software. By exploiting the credibility of popular applications, these cyber-threats disguise ...
Microsoft Fixes Excel Data Bug
Countless businesses use Microsoft Excel to track and sort data, but a long-running bug has been a source of frustration among users. It is no longer an issue, thanks to a new ...
How Secure Access Can Help Your Remote Workers
Companies have seen the benefits of remote work and how it can facilitate employees' well-being while supporting business operations. While remote work has its perks, companies must consider a significant concern: cyber ...
Benefits of Biometric Authentication
In our digital world, we have multiple devices and accounts to our name. This increases the risk of breaches and gives malicious actors access to sensitive information and account credentials. Biometric authentication ...
The Essential Role of Robust Security in Website Management
As a business owner, you're likely aware of the crucial role your website plays in your company's success. It's not just a digital storefront; it's a critical touchpoint for customer interaction ...
Enhancing Security in Windows 11: The Strategic Shift from NTLM to Kerberos
In the evolving cybersecurity landscape, staying updated with the latest protective measures is crucial for any business. Microsoft is transitioning from the New Technology LAN Manager (NTLM) to Kerberos, and here's what ...
Watch Out for Google Chrome Update Malware
As a modern business owner, you're well aware of all the ways technology benefits your business while also putting it at risk. If you use Google Chrome as your browser of choice, ...
Navigating Cybersecurity: Beyond Fear-Mongering to Credible Risk Communication
It’s not about fear. It’s not about doomsday. It’s about credible, evidence-based dialogue. The discourse around cybersecurity often veers into the territory of fear-based selling. It's an understandable, albeit flawed, approach ...


