RESEARCH
Your Guide to Implementing CMMC: What Defense Contractors Must Know Now

Introduction Beginning November 10, 2025, the Department of War (née Department of Defense) will formally require that new solicitations and contracts include compliance with the Cybersecurity Maturity Model Certification (CMMC). For firms in the defense industrial base, that means compliance ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
Why Every CEO Needs a Cyber Incident Response Playbook

Why This Problem Lands on Your Desk When a cyber incident hits your company, the first call usually goes to IT. But very quickly, the responsibility shifts to you and your leadership team. Regulators, insurers, customers, and even the media ...
The Cybersecurity Gap That’s Costing You Everything—and No One's Telling You About It

You’ve made the investments. Your team has security tools in place. You’ve got someone managing IT. You’ve had the compliance audit. On paper, everything looks fine. But there’s a problem. A big one. No one on your team can clearly ...
More Articles
Report Finds One Third Of Suspicious Emails Are Threats
Employee cyber security training is paying off according to a report recently released by IT security company F-Secure. Researchers from F-Secure analyzed more than 200,000 emails that had been flagged as suspicious ...
Hackers Behind REvil Ransomware Are Back Online
Not long after successfully attacking Kaseya the band of cyber criminals behind the REvil ransomware strain went dark. Their "Happy Blog" mysteriously went offline. It is not known if the group went ...
Why You Should Use Just In Time Documentation
One of the biggest problems many MSPs I talk to have when first figuring out how to address changes to ...
Hackers Are Using Windows 11 Curiosity To Load Malware
Millions of people around the world are understandably curious about Windows 11. It's easy to understand why. A new OS offered by the company that makes the most widely OS used on ...
Fortinet VPN User Passwords May Have Been Leaked Online
Hackers recently released a list of nearly half a million Fortinet VPN usernames and passwords onto the Dark Web. The group behind the attack claims that all the credentials were scraped from ...
A Number Of Netgear Routers Get Security Fixes
Dozens of Netgear routers are vulnerable to a very old security flaw. The DNS rebinding flaws that these routers have date back to models the company put out as early as 2007. ...
Microsoft Windows 11 Finally Has A Release Date
Are you excited at the prospect of Windows 11? If so then you will be pleased to know that Microsoft's latest OS now has an official release date. That date you're looking ...
Free Repairs Offered For iPhone 12 Users With Sound Issues
The bad news is some of Apple's iPhone 12's have sound issues. If you own an iPhone 12 then you are probably already aware of this. The good news is that Apple ...
Microsoft Teams Adds A Number Of New Features
Do you use Microsoft Teams? If you do then you're going to love the August update. It offers a number of new high value features that will improve the quality of your ...
Why You Need Break Glass Accounts
With all the attacks going on recently, every single MSP owner I’ve spoken to has been on edge about making sure their networks are ...
iPhone Users Getting Secure IDs And Digital Drivers Licenses
Have you ever wished you had a digital ID like a driver's license? Apple is working to make that a reality. The company is currently in talks with officials from eight different ...
Instagram Will Require Age Verification Soon
More and more social media platforms are taking steps to improve protections for younger folk. Instagram is the latest company to take steps in that direction with the recent announcement that the ...