RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Microsoft Office And Google Docs Sync For Offline Use
Recently, Google announced a small but significant change to Google Docs. Now, if you have enabled offline access for files you have stored on your Google Drive, the system will auto-sync any ...
Secret Twitter Accounts Are Not What You Think
Do you have a Twitter account? Have you been patting yourself on the back while assuming that your identity was a secret, allowing you to ply the waters of Twitter in anonymity? ...
Malware Is Targeting Small Office And Home Office Routers
Researchers at Lumen's Black Lotus Labs recently spotted evidence of a highly sophisticated and tightly targeted campaign aimed at SOHO (small office/home office) routers across both Europe and North America. Based on ...
New Version Releases For iOS Devices
Apple has recently announced a new string of updates for their OS family including iOS, iPadOS 15.6, macOS 12.5, watchOS 8.7 and tvOS 15.6. Bear in mind that the next version of ...
How To Easily Create An Efficient Workspace
The more efficient you are, the more effective you are. That's true whether you're working from the office or from home. Fortunately, most office environments lend themselves to being efficient, so there's ...
Hackers Are Stealing Facebook Accounts With Malicious Messenger Bots
Researchers at Trustwave have shed light on a recently discovered phishing campaign revolving around Facebook Messenger bots. If you don't spend much time on social media, chatbots are programs designed to impersonate ...
Fake Copyright Infringement Emails Used To Spread Malware
Hackers found a new way to slip malware past your defenses. Researchers around the world have spotted a curious new campaign designed to scare victims by sending them emails warning of copyright ...
Conflict Resolution In The Workplace
Conflict in the workplace is sadly inevitable. Put a group of people in a room together for eight hours or longer every day, week after week. No matter how well they get ...
Android And iOS Network Protection Added With Microsoft Defender
Recently, Microsoft added a new feature for Microsoft Defender for Endpoint (MDE) which has fans of the product cheering. Once the new "Mobile Network Protection" feature is enabled on the iOS and ...
The Windows 11 Apps That Use Your Microphone And Camera
Are you a member of the Windows 11 Insiders group? If so, then you already know that you get a sneak peek at all the cool new features the engineers at Microsoft ...
Conduct More Effective Meetings With These Simple Tips
Do the meetings you hold tend run off the rails? Do you find that they frequently run far longer than you intended and that very little actually comes out of them? If ...
WordPress NinjaForms Plugin Was Force Updated Due To Vulnerability
Do you run a WordPress site? Do you also use the popular forms design and management plugin called NinjaForms? If you answered yes to both of those questions, be aware that NinjaForms ...


