RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Recent Growth of Fake LinkedIn Accounts
According to a KrebsOnSecurity article, the recent growth of phony LinkedIn accounts is causing an identity crisis for the business networking site and organizations that rely on it to hire and evaluate ...
Implementing SSO in Your Business
When you're a business owner, you always look for ways to streamline processes and improve efficiency. A single sign-on (SSO) system is a great way to simplify authentication. It allows users to ...
SaaS Phishing Attacks Are Increasing
It's getting easier than ever to conduct effective phishing campaigns thanks to the rise in popularity of SaaS platforms. A recently published report released by Palo Alto Networks' Unit 42 revealed that ...
VoIP Features Enhance Customer Experience
There are many reasons why staff may be required to put customers on hold. However, Voice-over Internet Protocol (VoIP) technology can be utilized to ensure that callers do not feel abandoned ...
The Rise of Encryption in Businesses
As our world becomes increasingly digitized, businesses are finding themselves at a greater risk of cyberattacks. One way companies can protect their data is by encrypting it. Encryption transforms readable data into ...
Hundreds of U.S. News Outlets Affected by Malware
A cyber-security threat actor known as SocGholish has compromised a JavaScript code used by an unnamed media content provider. The malware is being used to spread the FakeUpdates malware to major media ...
New Microsoft Report Details Latest Cybersecurity Threats
According to Microsoft's latest announcement, businesses should assess security measures to defend against evolving cyber-security threats. Microsoft released its Digital Defense Report (MDDR) for 2022. Microsoft released alarming statistics about the cyber ...
Zoom Unveils New Productivity Tools
While holding its Zoomtopia event on November 8, 2022, the video conferencing giant announced the release of two brand-new productivity tools for Zoom users. In addition to the communication and collaboration tools ...
Attacks on Business VPNs are Increasing
Virtual private networks (VPNs) are used to give users remote access to resources on corporate networks. However, several factors have revealed incompatibilities between VPNs and Zero-Trust security systems. Businesses are worried that ...
Dropbox Suffers Major Breach in Phishing Attack
It's no secret that cyber attacks are on the rise, and that no company is immune to them. Dropbox, a cloud storage company, was the lastest victim when their GitHub account was ...
SIM Swap Attack Targets Verizon Customers
Recently, Verizon experienced a minor but significant data breach. Between October 6, 2022, and October 10, 2022, an unknown malicious actor gained access to Verizon's prepaid wireless accounts, compromising approximately 250 individuals. ...
Benefits of Having a Dual Monitor Setup for Your Business
In recent years, the use of advanced technology in the office has increased in popularity among businesses to improve their efficiency, productivity, and effectiveness. Whether running a small or large company, ...


