RESEARCH
Did Your AI Assistant Go Rogue With Your Data?

When you first rolled out M365 you pictured streamlined workflows, faster decisions, fewer papercuts. You didn’t sign up for a public AI model quietly siphoning off your internal agreements, pricing decks, customer roots and shoots for the training set of ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
Why Every CEO Needs a Cyber Incident Response Playbook

Why This Problem Lands on Your Desk When a cyber incident hits your company, the first call usually goes to IT. But very quickly, the responsibility shifts to you and your leadership team. Regulators, insurers, customers, and even the media ...
The Cybersecurity Gap That’s Costing You Everything—and No One's Telling You About It

You’ve made the investments. Your team has security tools in place. You’ve got someone managing IT. You’ve had the compliance audit. On paper, everything looks fine. But there’s a problem. A big one. No one on your team can clearly ...
More Articles
Do Your Clients Understand Why The Need To Invest In Security?
I know you take security seriously. Otherwise, you wouldn’t be reading this. One of the BIGGEST issues pretty much every MSP brings ...
FCC Approves Plans For WiFi 6 To Open Wireless Spectrum
The Federal Communications Commission (FCC) gets a lot of bad press. Sometimes there are good reasons for that but much of the time there are not really any good reasons. As the ...
Skype Adds Zoom Feature And Additional Modern Updates
Are you a Skype user? If so be aware that Microsoft (the company that owns Skype) just added a handy new feature you may want to start taking advantage of right away. ...
T-Mobile Reports Scam Calls Have Increased 116 Percent Since 2020
If you're like most cellphone users, you absolutely love the automatic call blocking feature that most companies offer as part of their standard service. A call comes in from a "suspicious" number ...
New Remote Access Trojan Virus Hides In Windows Registry
There's a new malware strain you should make sure your IT staff is aware of. Called the Dark Watchman, it is a well-designed and highly capable RAT (Remote Access Trojan) paired with ...
Hackers Are Using Big Brand Surveys To Scam Victims
Surveys have long been a playground of hackers and scammers. That's true at any time of the year but it's especially true around the Holidays when such scams seem to attract even ...
New Ransomware Named AvosLocker Uses Multiple Tricks In Attacks
There's a new strain of ransomware to be concerned about in the form of AvosLocker. This is from security firm Sophos who warns that the new strain of human-operated ransomware is one ...
Are You Planning For A Third-Party Audit?
The magnifying glass is (or will) be pointed at you. As an MSP, you are looked at as the protector of data. As the ...
Update Your All In One SEO Plugin For Security Patch
Do you own and operate a WordPress website? Do you also use the "All in One" SEO plugin? If you answered yes to both of those questions, then be aware that you'll ...
Reasons The Log4j Java Library Security Issue Is Concerning
Haven't heard of Log4j before right now? If not, you're certainly not alone but unfortunately it's something you're likely to hear more about in the weeks ahead. It may wind up being ...
Some Lenovo Laptops Have Admin Level Security Vulnerability
Do you own a Lenovo Yoga or ThinkPad laptop? If so be advised that a pair of critical security flaws have recently been found that could allow an attacker Admin level access ...
This Android Banking Malware Is Back
We haven't heard much about Anubis in recent months. Anubis is the nasty Android-based banking Trojan that has made headlines on more than one occasion. If history is any guide at all ...


