RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Microsoft Outlook Video Update: Simplifying Video Sharing for Business Owners
Microsoft Outlook's latest update solves one of the most common email challenges businesses face: video attachments. Here's what you should know about the update and how it may affect your business. The ...
Protecting Your Business from Cyber Threats: The Importance of Cybersecurity Training
As the digital world grows, businesses face more cybersecurity threats. Unfortunately, these can cause significant financial losses and credibility damage. That's why companies need to focus on cybersecurity training as threat actors ...
The Growing Trend of Telegram as a Marketplace for Phishing Tools and Services
Cybercrime is becoming increasingly common as businesses continue to rely on technology to conduct their operations. Cybercriminals are constantly looking for new ways to exploit businesses and individuals. One of the methods ...
Pointing Out Problems Can Backfire What You Should Do
Trust is very important, and sometimes very challenging. As a service provider you are walking a thin line. When you point out problems on your client’s network, will they think you aren’t ...
Why Small Businesses Need a Website
You might wonder if maintaining a website is worthwhile. You can still operate your business without one, right? Wrong. A website is now essential in the modern digital world and is no ...
Securing Your Online Collaboration: The Future of Workspace Protection
Keeping Our Online Workspaces Safe With New Security Tools Keeping online workspaces safe is the top priority as more people work from home. A vital part of this is to secure your ...
The Role of Cloud Computing in Business Growth
As a business owner, you want to increase efficiency, cut costs, and beat the competition. Looking for something that can do all these? Enter cloud computing, which has revolutionized how businesses of ...
Transforming Your Business with a CRM System
Have you ever wondered how successful businesses maintain strong connections with their customers? One way is to have a good customer relationship management (CRM) system. Simply put, a CRM system can help ...
The Importance of Secure Passwords in the Age of AI
Businesses always look for ways to protect their sensitive data. But have you considered the growing threat of AI cracking your passwords? Recent studies show that AI can crack many passwords in ...
Business Continuity Planning: How to Prepare Your IT Systems for Disasters
As a business owner, you know that unexpected events can happen anytime. Natural disasters, cyberattacks, and even human mistakes can all harm your IT systems. This damage can lead to downtime and ...
3 Reasons Your Security Stack Isn’t Protecting Your Clients
I know you take your clients’ security seriously. People rely on you, and you make sure to have the right tools in your arsenal. But sometimes, it’s not about the tools. I ...
AlienFox Malware: The Swiss Army Knife of Cloud Attacks
Researchers at SentinelLabs have uncovered a new, modular malware toolkit called "AlienFox." Cybercriminals use AlienFox to breach email and web hosting services. It compromises misconfigured hosts on cloud platforms and takes sensitive ...


