The MSP security community I wish I had 10 years ago
“Am I the only one who has no idea if this is a big deal?” That’s the question you can’t ask out loud. Not to your clients, who expect you to be the expert. Not to your team, who looks to you for answers. And definitely not on LinkedIn, where everyone’s a thought leader with all the answers. But it’s the question that runs through […]
Top 5 security priorities for MSPs in 2026
It’s officially 2026 and it’s the season of reinvention, new goals and #NewYearNewMe posts on social media. For MSPs though, it’s a time to refocus our efforts on security and risk management for our clients. The threat landscape has evolved rapidly, and the tools and tactics that worked last year may not be enough to protect against today’s attacks. With that in mind, here are the […]
Identity-first security: The new perimeter for MSPs
Identity-first security is a modern approach that treats identity as the new perimeter for cybersecurity. With users, devices and applications accessing resources from anywhere, the traditional network perimeter no longer suffices. Instead, every access decision is based on verifying the identity, device health, user behavior and contextual risk factors, and continuously enforcing policies throughout the session. This approach is critical for […]
Huntress for MSPs: Enterprise-grade managed security without the overhead
As cyber threats grow more complex, from ransomware to supply chain compromises, automated security tools alone can no longer keep up. MSPs are often caught between rising client expectations for enterprise-grade protection and the reality of limited budgets and staffing. Most MSPs don’t have the resources to staff a 24/7 security operations center (SOC), and […]
Stronger together: Sherweb expands its security portfolio with Afi, NordStellar and Trend Vision One
Security isn’t about finding the perfect tool. It’s about building layers that work together. As AI continues to evolve, cybercriminals are already using it to power ransomware attacks, compromise credentials and impersonate brands. These threats create entry points before threats even reach your clients’ networks, which means that MSPs need more than endpoint protection or […]
