Tag: cybersecurity
The compliance trap: checking boxes isn’t the same as being secure
When businesses pass a SOC 2 audit, complete a HIPAA assessment, or earn a Cyber Essentials certification, there’s often a sense of relief—the work is done. In reality, that moment is where risk often begins. “Compliance frameworks establish a baseline,”...
How MSPs close the cloud migration security gap
When a client migrates to Microsoft 365 or Google Workspace, the instinct is to declare victory once emails are flowing, files are accessible, and users are productive again. The project feels complete. Except it isn’t, because security didn’t make the...
Tech Time Warp: First prosecution under the Computer Fraud and Abuse Act
Does the punishment fit the crime? Let’s dive into this week’s Tech Time Warp to find out. Insiders from the nascent cybersecurity industry debated this question after the May 4, 1990, sentencing of Robert Tappan Morris, the first individual prosecuted...
Cyber insurance is changing the rules and MSPs must adapt
For years, cyber insurance was sold to small and mid-sized businesses as a backstop that would take the sting out of a hack. In the beginning, that is what happened. But the landscape is changing fast. More than 40 percent...
Deepfakes in 2026: How MSPs can stay ahead of AI‑driven fraud
Deepfake fraud losses in North America alone exceeded $200 million in the first quarter of 2025, according to Keepnet Labs. Meanwhile, the Deloitte Center for Financial Services projects that generative AI‑enabled fraud in the U.S. will grow from $12.3 billion...
Beyond recovery: The new resilience mindset
A global survey of 1,000 business and IT decision‑makers and senior developers shows that while organizations feel more resilient than they were a year ago, many still struggle with the cost of recovery and remediation when a real IT incident...
Evolving supply chain attacks create a critical opportunity for MSPs
Supply chain attacks continue to pose a serious threat across the cybersecurity ecosystem—and like most threats, they’re evolving quickly. A supply chain attack in 2026 looks very different from one in 2021. Recent data from Risk Management Platform IO reveals...
The new face of phishing: Why traditional defenses are failing your customers in 2026
As we navigate the start of 2026, the cybersecurity landscape has reached a critical inflection point. For managed services providers (MSPs), the challenge is no longer just identifying “the bad guys;” it’s identifying the “perfectly simulated guys.” In 2025, phishing...
Welcome to ‘Ranswomare 2.0’
Ransomware attacks have evolved from simple encryption schemes into sophisticated extortion operations that render traditional defenses obsolete. In recent years, data exfiltration has occurred in 87 percent of ransomware incidents, according to the 2024 Verizon Data Breach Investigations Report, while...
