
CIRCIA compliance: What MSPs need to know now
The full implementation of the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) is rapidly approaching, bringing with it a new package of rules and regulations that managed service providers (MSPs) must follow, at least those serving critical infrastructure clients....

Municipal cybersecurity: MSPs navigate the front lines of digital defense
American cities are under siege in cyberspace, and the managed service providers (MSPs) they depend on are their best hope for defense. Last week, St. Paul, Minnesota, declared a state of emergency after a “deliberate, coordinated digital attack” forced the...

Closing the cybersecurity gap: Can AI reduce the human risk factor?
If you’ve ever heard the expression ‘sometimes it’s best to get out of your own way,’ it might as well have been coined for cybersecurity. According to IBM, 95 percent of data breaches involve human error, while just 8 percent of...

CISA alerts: Why they belong on every MSP’s watchlist
Last week, we looked at how cybercriminals ramp up their activity during the summer months. As pool parties and vacation plans start, so do escalating cybersecurity alerts from both CISA and the Canadian Centre for Cyber Security. With organizations running...

Vacation season is open season for cybercriminals: Here’s why
For school children, summer means lazy days of swimming pools, splash pads, melting ice cream cones, and camp. For cybersecurity professionals, it means being on guard 24/7, because cybercriminals don’t take a summer break. The summertime impact Cyberattacks now occur...

Is it time for MSPs to dive into the home cybersecurity market?
The question of whether managed service providers (MSPs) should enter the home cybersecurity market has been debated for years. While some MSPs have ventured into this area, it has not yet gained widespread traction—though that may soon change. The home...

Navigating endpoint security: The role of MSPs
According to Verizon’s 2025 Data Breach Investigations Report, more than two-thirds of breaches involve endpoints. Some eye-catching endpoint security statistics include: About 88 percent of breaches reported involving endpoints involved the use of stolen credentials. Thirty percent of compromised systems...

Unmasking the next wave: LLMs and evolving cyberthreats
This week, we bring you additional interviews with experts on the cybersecurity dangers posed by large language models (LLMs) such as Claude, DeepSeek, and ChatGPT. With the rapid rise in the use of these services comes an increasing set of...

Unraveling the cybersecurity risks of LLMs
As language learning models (LLMs) become more prevalent, the cyber dangers posed by DeepSeek, ChatGPT, Claude, and others are just beginning to be understood. Jacob Anderson, owner of Beyond Ordinary, states that cyber personnel are overworked and continue to have...

An MSP’s guide to keeping up with phishing
Phishing has long been a primary tool in the hacker’s arsenal, but like military weapons, their tactics evolve. A phishing attempt in 2025 looks different from those in 2015, 2020, or even last year. Therefore, managed service providers (MSPs) must...