Resources
Stop Trying to Boil the Cybersecurity Ocean

Let’s not pretend. Cybersecurity sounds exhausting. You’ve got a business to run, people to manage, goals to hit, and now someone’s telling you that you need 40 new policies, a risk framework, and maybe a cybersecurity bootcamp just to stay ...
Cyber Trends
The Windows 11 Time Bomb Your MSP Forgot to Mention

Let me tell you a story. It starts like most horror stories do—with a false sense of security. I sat down recently with the CEO of a well-run, 250-person company. Smart guy. Good business. Solid MSP. We talked shop: headcount, ...
Microsoft Just Extorted You. Here’s What to Do About It.

You don’t have to upgrade to Windows 11. That’s the good news. The bad news? If you don’t, your business is about to enter a slow, painful spiral into cyber vulnerability and operational chaos. Right now, people are calling Microsoft’s ...
Well, That Didn’t Last Long: Why Your Cyber Strategy Can’t Be Based on Headlines

Not even a full week. That’s how long we had between a glimmer of good news and a fresh slap of reality. Just a few days ago, security analysts were celebrating. Ransomware payments, they said, were down. A win! Maybe ...
Business Resilience
Part 2: Coffee or a Crisis: The CEO’s Choice in Cybersecurity

Last time we looked at why tabletop exercises matter and how they can reveal the cracks business leaders don’t notice until ...
The Silent IT Risk That Can Wreck Your Company Value: Tribal Knowledge

When CEOs and CFOs think about cybersecurity risk, they think about hackers, ransomware, and data breaches. What they do not think about is the way their own IT teams operate—and how that internal process can make or break the company ...
Could Your Business Survive a Cyberattack? (Most Can’t—and Won’t)

The US bombed Iranian nuclear facilities last week. The result? A “spectacular military success,” sure—followed immediately by the Department of Homeland Security warning that Iran’s state-backed hackers (and a gaggle of bored ...
Security Best Practices
Stop Trying to Boil the Cybersecurity Ocean

Let’s not pretend. Cybersecurity sounds exhausting. You’ve got a business to run, people to manage, goals to hit, and now someone’s telling you that you need 40 new policies, a risk framework, and maybe a cybersecurity bootcamp just to stay ...
The Cybersecurity Test You Think You're Passing (You're Not)

We were just running a security assessment for a 150-person company last week. Nice organization. Professional. Fancy logos on their trucks. Well-funded. And in about 11 minutes, we were inside their network. Here’s how it started: We sent an email. ...
Why Every CEO Needs a Cyber Incident Response Playbook

Why This Problem Lands on Your Desk When a cyber incident hits your company, the first call usually goes to IT. But very quickly, the responsibility shifts to you and your leadership team. Regulators, insurers, customers, and even the media ...
More Articles
The IRS Test: Why Your Cyber Program Needs More Than Just Good Intentions
Think about your cybersecurity the same way you’d think about your books. Everyone says they “take security seriously.” But when the auditors show up—or worse, the breach happens—intentions don’t matter. Proof does. Here’s how I break it down for MSPs ...
When the Fire Hits, You Better Have a Map
You lock your office. You set the alarm. Maybe you even have a camera watching the front door. You’re not careless—you take reasonable steps to protect your business. But here’s the part no one tells you: when the fire starts—when ...
Victoria’s Secret Just Pulled the Plug on Its Website. Here’s Why That Should Worry You.
Last week, Victoria’s Secret—the billion-dollar lingerie brand—shut down its U.S. website and paused some store services. They called it a “security incident.” No one knows yet what happened behind the scenes, but one thing is clear: it was serious enough ...
How a Waiver (Yes, Like Skydiving) Could Protect Your Business in Court
You wouldn’t go skydiving without signing a waiver. Why? Because when something goes wrong mid-air, you don’t want to debate liability on the way down. Here’s the problem: most businesses are making high-risk IT decisions without any form of documentation. ...
They Didn’t Break In. They Just Called.
She thought it was her bank. They were polite. Professional. Helpful. They said her account had been compromised. They just needed to “verify a few things.” They even helped her set up Zelle to “protect her funds.” Two weeks later, ...
The One Employee Who’s Never Taken Your Security Training (and Never Will)
Let me introduce you to the new team member quietly absorbing everything about your business. They don’t sleep. They don’t forget. They don’t ask questions. And they’ve never—not once—completed your security training. Meet: Your Employee’s AI Assistant. AI Doesn’t Just ...
Your Data Is Missing, Your Clients Are Calling, and You Have No Plan
You have data. Some of it keeps hackers up at night. The rest just keeps your business running. Either way, it all matters when the breach hits—and if you don’t know where it lives, how to prioritize it, or how ...
Think Your IT Team Has You Covered? Let’s Find Out.
Are your IT people taking the right steps to protect your business? Here’s a simple test. One question. No tech degree required: When’s the last time you reviewed an Incident Response Plan they wrote for you? If your answer is ...
The Breach Is Bad. The Response Is Worse.
You’ve been breached. Your inbox is offline. Your phones are ringing. Your team is scrambling. Clients are calling. The board wants answers. And you? You’re staring at the ceiling, trying to remember who’s supposed to talk to the press. This ...
Is Your IT Guy About to Lose You Your Business? Your Career? Your House?
If you’re a CEO, CFO, or business owner, your IT guy might be the weakest link in your liability chain. Yeah, I said it. This is the person who couldn’t get your email to sync on your phone last week. ...
Joy’s $300K Ice Cream Disaster: Why CEOs Should Fear Sugar Cones and Section 5
Last week, I had an ice cream cone. The old-school sugar kind. Delicious, nostalgic—and apparently a hacker favorite. Because back in February 2023, the folks at Joy, the ice cream cone company, got breached. That’s right—cone makers. And not just ...
You Trained the Interns. But Who Trained the Guy With the Keys?
You’ve probably sat through user awareness training at some point. “Don’t click links from Nigerian princes.” “Don’t send wire transfers to people you’ve never met.” You’ve checked that box. You’ve probably made your employees do it too. Maybe even once ...


