Kevin Williams

All posts by Kevin Williams

Kevin Williams is a journalist based in Ohio. Williams has written for a variety of publications including the Washington Post, New York Times, USA Today, Wall Street Journal, National Geographic and others. He first wrote about the online world in its nascent stages for the now defunct “Online Access” Magazine in the mid-90s.

LLMs
Unmasking the next wave: LLMs and evolving cyberthreats

Unmasking the next wave: LLMs and evolving cyberthreats

This week, we bring you additional interviews with experts on the cybersecurity dangers posed by large language models (LLMs) such as Claude, DeepSeek, and ChatGPT. With the rapid rise in the use of these services comes an increasing set of...

/ June 24, 2025
LLMs
Unraveling the cybersecurity risks of LLMs

Unraveling the cybersecurity risks of LLMs

As language learning models (LLMs) become more prevalent, the cyber dangers posed by DeepSeek, ChatGPT, Claude, and others are just beginning to be understood. Jacob Anderson, owner of Beyond Ordinary, states that cyber personnel are overworked and continue to have...

/ June 17, 2025
phishing
An MSP’s guide to keeping up with phishing

An MSP’s guide to keeping up with phishing

Phishing has long been a primary tool in the hacker’s arsenal, but like military weapons, their tactics evolve. A phishing attempt in 2025 looks different from those in 2015, 2020, or even last year. Therefore, managed service providers (MSPs) must...

/ June 10, 2025
AI MSPs
AI and MSPs: Navigating the new cybersecurity frontier

AI and MSPs: Navigating the new cybersecurity frontier

Managed service providers (MSPs) have seen their portfolios expand significantly over the past decade, from primarily handling the nuts and bolts of systems to becoming frontline defenders in an increasingly complex digital threat landscape. However, there is a growing component...

/ June 3, 2025
The MSP’s guide to creating a zero trust atmosphere

The MSP’s guide to creating a zero trust atmosphere

Zero trust in the workplace is typically a bad thing, fostering a culture of distrust and snitching. However, for managed service providers (MSPs), it is a good thing, at least when it comes to cybersecurity. Experts in the field say...

/ May 27, 2025
Cyber insurance
Cyber insurance: A must for MSPs

Cyber insurance: A must for MSPs

If you don’t carry cyber insurance yet, you may want to reconsider. Statistics show that if you are an MSP owner, you probably already have it, with 91.7 percent of managed service providers (MSPs) carry cyber insurance specifically for their operations,...

/ May 20, 2025
CIRP
An MSP’s guide to building cybersecurity incident response plan

An MSP’s guide to building cybersecurity incident response plan

Last week, we spoke with industry experts about why every organization needs a solid cybersecurity incident response plan (CIRP). This week, we’re taking it a step further—breaking down the essential steps Managed Service Providers (MSPs) should follow to build a...

/ May 13, 2025
cybersecurity incident response plan:
Cybersecurity incident response plan: An essential MSP practice

Cybersecurity incident response plan: An essential MSP practice

Managed service providers (MSPs) are often tasked with providing cybersecurity for their clients. But what happens when a cyberattack happens? Usually, decisions need to be made rapidly and actions taken within minutes. That’s why having incident response plans is critical....

/ May 6, 2025
security audit
Security audits play a vital role in defense

Security audits play a vital role in defense

Security audits are a crucial component of an organization’s cybersecurity strategy. However, despite their importance, they are not as commonly conducted as you might think. Shift from a reactive to a proactive mindset According to a study, only 52 percent...

/ April 29, 2025
2025 trends
Cybersecurity 2025 trends: Key emerging threats

Cybersecurity 2025 trends: Key emerging threats

Welcome to part two of our deep dive into 2025’s cybersecurity landscape. As highlighted in part one of this blog, generative artificial intelligence (GenAI) and supply chain vulnerabilities are at the forefront of cyberthreats. We consulted with other industry experts...

/ April 22, 2025