RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
Voicemail Phishing Attacks Called Vishing Are On The Rise
While "vishing" is by no means a new threat, it's not something that has ever happened with sufficient frequency to get most people's attention. So, if you haven't heard the term before, ...
Simple Tips For Securing Smart Device Data
Data security isn't something that's at the forefront of most people's minds, but it probably should be. These days, we use far more than just our trusty laptops and desktops to do ...
One Of The Largest US Banks Discloses Data Breach
Do you have an account with Michigan-based Flagstar Bank? As one of the largest banks in the United States, it's quite possible that you do. If so, be aware that the company ...
Microsoft Believes AI Can Help Prevent Ransomware In The Future
Recently, Microsoft published a fascinating blog post. In the blog post, they said they were experimenting with "novel approaches" when it comes to harnessing the power of AI to spot threats on ...
You May Need To Replace Old Cisco VPN Routers
Do you own one or more of the following products made by Cisco? The RV110W Wireless-N VPN Firewall The RV130 VPN Router The RV130W Wireless-N Multifunction VPN Router The RV215W Wireless-N VPN ...
Some Requested Features May Be Coming To Microsoft Teams
Do you use Microsoft Teams? If so, you'll be thrilled to know that the Redmond Giant is continuing to pour resources into improving the software with a specific focus on audio and ...
It May Be Time To Update Your Business Logo
Corporate branding can be worth its weight in gold and certain images are absolutely iconic. The Golden Arches, the Nike "swoosh," and Apple's Apple all come to mind. Logo images give companies ...
Researchers Find New CPU Security Vulnerability
Remember the Heartbleed scare we had a couple years back? It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent ...
Ransomware Hackers Have Set Their Sights On Exchange Servers
Microsoft Exchange servers are once more in the crosshairs of hackers around the world. Most recently, hacking groups have been specifically targeting them to deploy BlackCat ransomware. As is common among ransomware ...
The Surprising Ways Mobile Technology Impacts Our Lives
If you grew up in the days before the internet, it's absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember ...
Edge Will Replace Internet Explorer After It Is Gone
It may seem as though Internet Explorer is the browser that will not die, but according to Microsoft, it is now a step closer to breathing its last virtual breath. Microsoft has ...
New Panchan Botnet Targets Linux Servers
If you're involved with IT Security at any level and if your network includes Linux servers, keep a watchful eye out for the new Panchan botnet. It first appeared in the wilds ...


