What I wish MSPs knew about cyber insurance applications

What I wish MSPs knew about cyber insurance applications

The content for this week’s post was taken with permission from Joseph Brunsman, a broker at Chesapeake Professional Liability Brokers in Anapolis, MD.  Joe combines his experience as a former IT, with a Master’s in Cybersecurity Law for an in-depth and very...
Case Study – Threat detection for SMB

Case Study – Threat detection for SMB

Small businesses are often under the misconception that they are too small for a hacker to attack.  While it is true that they may be too small to be specifically targeted by a hacker in Russia or China, the automation of malware attacks puts them a just as much risk...
Ransomware gangs are targeting executives

Ransomware gangs are targeting executives

We’ve seen an evolution of ransomware, beginning with malware inserted into malicious advertising on websites by hackers who knew how to code.  In the next stage, the Dark Web marketplace allowed people with no coding skills to purchase pre-packaged ransomware...
NIST Drafts New Risk-Based Guide to Information Exchange Security

NIST Drafts New Risk-Based Guide to Information Exchange Security

Organizations frequently share information through various information exchange channels based on mission and business needs. In order to protect the confidentiality, integrity, and availability of exchanged information commensurate with risk, the information being...
Should MSPs take a stronger stance on security?

Should MSPs take a stronger stance on security?

Your customers depend on you to guide them through the world of technology.  You support their day-to-day needs and recommend new technologies to increase productivity or save money.  It makes perfect sense that they would also rely on your to advise them on how to...
What’s the real story with CMMC?

What’s the real story with CMMC?

There is a lot of uncertainty and misinformation around new Cybersecurity Maturity Model Certification (CMMC), especially for the downstream suppliers who do not directly contact a contracting officer. Small and medium-sized defense contractors should be far more...