{"id":25604,"date":"2025-08-01T09:00:52","date_gmt":"2025-08-01T13:00:52","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=25604"},"modified":"2025-09-29T02:14:14","modified_gmt":"2025-09-29T06:14:14","slug":"browser-security-for-msps","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/","title":{"rendered":"You\u2019re not losing security at the firewall. You\u2019re losing it in the browser."},"content":{"rendered":"<p><em>Guest writer <a href=\"https:\/\/www.sherweb.com\/blog\/tag\/author-roddy-bergeron\/\">Roddy Bergeron<\/a>, Cybersecurity Technical Fellow, explores why most MSPs are losing security where it matters most: in the browser. Learn how strengthening browser security for MSPs can stop phishing attacks, protect client credentials, and prepare your cyber defenses for the next wave of threats.<\/em><\/p>\n<h2>Where breaches really begin<\/h2>\n<p>Cybersecurity doesn\u2019t fail because a firewall misses traffic or an endpoint agent lags a signature update. Breaches happen quietly, in the milliseconds after a user clicks a link, long before traditional tools even register a threat. That moment doesn\u2019t happen on your network. It doesn\u2019t start with malware on a device. It happens in the browser session no one thought to secure.<\/p>\n<p>Modern attacks don\u2019t need to brute force their way past defenses anymore. Phishing pages harvest credentials in real time. Malicious scripts execute directly in SaaS applications. Hijacked tokens give attackers valid sessions without triggering alarms. These are not edge problems. They\u2019re not endpoint problems. They\u2019re browser problems and most MSPs are still pretending their layered stacks can handle them.<\/p>\n<p>The truth is simple: <strong>if your <a href=\"https:\/\/www.sherweb.com\/security\/\">security program<\/a> can\u2019t act inside the browser session, you\u2019re not secure, you\u2019re exposed.<\/strong><\/p>\n<h2>The blind spot MSPs don\u2019t want to see<\/h2>\n<p>Every major threat report tells the same story. Browser-based phishing is climbing at triple-digit rates. Nearly every identity attack now starts in-session, long before it\u2019s visible to your SOC. AI-driven phishing pages appear and vanish faster than DNS filters can react.<\/p>\n<p>Attackers figured this out years ago. They moved into browsers because that\u2019s where users actually work. SaaS applications, client portals, collaboration tools, admin consoles, the list goes on. In 2025, web application attacks account for <a href=\"https:\/\/thehackernews.com\/2025\/07\/how-browser-became-main-cyber.html?utm_source=chatgpt.com\">26% of all breaches<\/a>, ranking as the second most prevalent method of compromise. And Stolen credentials are involved in 88% of web application breaches, according to <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">Verizon\u2019s 2025 DBIR<\/a>.<\/p>\n<p>Meanwhile, security programs stayed focused on defending edges and endpoints that attackers barely touch anymore. This is why breaches keep repeating themselves. The tools didn\u2019t fail. The security system never reached the environment where modern attacks actually happen.<\/p>\n<h2>Browsers aren\u2019t windows. They\u2019re endpoints.<\/h2>\n<p>MSPs still treat browsers like passive portals to the web, glass panes looking outward. That thinking is outdated. The browser is the endpoint now.<\/p>\n<p>Every critical action your clients take\u2014approving MFA prompts, accessing SaaS apps, entering credentials, handling sensitive data\u2014happens inside a browser session. And that\u2019s exactly where attackers move first.<\/p>\n<p>But here\u2019s the real problem: almost no one is hardening that space.<br \/>\nWe\u2019ve poured money into hardening networks and devices, but the moment a user launches Chrome or Edge, they\u2019re stepping into an unarmored environment. Scripts run unchecked. Phishing pages harvest logins in real time. Session tokens are lifted before your EDR even twitches.<\/p>\n<p>Securing the browser isn\u2019t about stacking more agents. It\u2019s about building defenses that <strong>act where the threat lives<\/strong>, inside the session itself.<\/p>\n<ul>\n<li><strong>Isolation:<\/strong> Risky pages shouldn\u2019t get to execute code in the first place.<\/li>\n<li><strong>Credential control:<\/strong> Users shouldn\u2019t be able to hand over passwords or tokens to fake sites.<\/li>\n<li><strong>Threat intelligence:<\/strong> Domains and scripts should be inspected in real time, not hours later in an alert queue.<\/li>\n<\/ul>\n<p>Hardening <a href=\"https:\/\/www.sherweb.com\/blog\/security\/defensx-zero-trust-secure-web-browser-for-msps\/\">the browser<\/a> isn\u2019t a \u201cnice to have.\u201d It\u2019s the difference between running a proactive security program and constantly cleaning up breaches that were preventable.<\/p>\n<h2>Are your layers doing anything inside the browser?<\/h2>\n<p>MSPs talk about layered security and zero trust like they\u2019re bulletproof. Firewalls, EDR, DNS filtering, MFA\u2026it looks solid on a slide. But layered tools and edge-based trust models all have the same blind spot: they stop working the moment users step inside a browser session.<\/p>\n<p>Here\u2019s what actually happens:<\/p>\n<ul>\n<li>Firewalls can\u2019t see into encrypted browser traffic.<\/li>\n<li>Endpoint tools react only after malicious scripts execute.<\/li>\n<li>DNS filters miss phishing kits that launch thousands of fresh pages every day.<\/li>\n<li>MFA stops attackers at login but does nothing when sessions or tokens are hijacked afterward.<\/li>\n<\/ul>\n<p>Attackers know this. They exploit sessions your stack fully trusts, moving laterally while your security layers wait for a human to react.<\/p>\n<p>A truly resilient security system doesn\u2019t pause there. It continuously validates identity and risk inside the browser session itself, stopping credential theft, blocking malicious scripts and revoking tokens in real time.<\/p>\n<p>Until MSPs move protection into that active session, layered defenses and zero trust will remain just marketing slogans attackers can walk right past.<\/p>\n<h2>Why the gap persists<\/h2>\n<p>It\u2019s not that MSPs don\u2019t care. It\u2019s that closing this gap means rethinking how security works and this industry isn\u2019t known for adopting hard changes early.<\/p>\n<p>Securing browsers isn\u2019t as simple as deploying another point solution. It means automating containment, so phishing sessions isolate themselves instantly, without waiting for humans to click \u201cquarantine.\u201d It means monitoring session behavior in real time instead of waiting for downstream alerts. It means integrating session intelligence across the entire stack, so every layer reacts as one, without delays, without blind spots, without silos.<\/p>\n<p>That\u2019s not a feature you can buy, it\u2019s a change in how your security system operates. Most MSPs haven\u2019t made that shift yet. And until they do, they\u2019ll keep discovering breaches in the same place: a browser session nobody secured.<\/p>\n<h2>Act before the next breach<\/h2>\n<p>Most MSPs only change direction after a breach forces their hand. By then, the damage is done and client trust is gone, cyber insurance premiums climb, remediation costs erase months of margin.<\/p>\n<p>You don\u2019t have to wait for that moment.<\/p>\n<h2>The future of security starts in the browser<\/h2>\n<p>Hardening browsers might sound like patching a blind spot. It\u2019s not.<\/p>\n<p>The web has become the workplace. SaaS replaced the desktop. Identity replaced the perimeter. Every critical client action now flows through browser sessions attackers know how to exploit.<\/p>\n<p>MSPs who take this step today aren\u2019t just blocking phishing pages or credential theft. They\u2019re proving to clients, insurers, and regulators that their security program is built to stay ahead of threats.<\/p>\n<p>And this is only the beginning. As cloud adoption deepens and AI-driven attacks evolve, the browser won\u2019t just be where breaches start\u2014it will be where <strong>entire security programs are run.<\/strong><\/p>\n<p>Closing this gap isn\u2019t just prevention. It\u2019s the first move in leading the next decade of security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guest writer Roddy Bergeron, Cybersecurity Technical Fellow, explores why most MSPs are losing se","protected":false},"author":188,"featured_media":25605,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[919,1121,1128,1131,1132],"class_list":["post-25604","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity","tag-author-roddy-bergeron","tag-vendor-risk-management","tag-browser-security-for-msps","tag-msp-security-strategy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why browser security for MSPs can\u2019t wait | Sherweb<\/title>\n<meta name=\"description\" content=\"Did you know most breaches bypass firewalls? See why browser security for MSPs is key to stopping phishing and protecting client credentials.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why browser security for MSPs can\u2019t wait | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Did you know most breaches bypass firewalls? See why browser security for MSPs is key to stopping phishing and protecting client credentials.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-01T13:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-29T06:14:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/DefensX-launch-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roddy Bergeron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roddy Bergeron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/\"},\"author\":{\"name\":\"Roddy Bergeron\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"headline\":\"You\u2019re not losing security at the firewall. You\u2019re losing it in the browser.\",\"datePublished\":\"2025-08-01T13:00:52+00:00\",\"dateModified\":\"2025-09-29T06:14:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/\"},\"wordCount\":1084,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/DefensX-launch-1200x480-1.jpg\",\"keywords\":[\"Cybersecurity\",\"Author: Roddy Bergeron\",\"Vendor Risk Management\",\"browser security for MSPs\",\"MSP Security Strategy\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/\",\"name\":\"Why browser security for MSPs can\u2019t wait | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/DefensX-launch-1200x480-1.jpg\",\"datePublished\":\"2025-08-01T13:00:52+00:00\",\"dateModified\":\"2025-09-29T06:14:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"description\":\"Did you know most breaches bypass firewalls? See why browser security for MSPs is key to stopping phishing and protecting client credentials.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/DefensX-launch-1200x480-1.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/DefensX-launch-1200x480-1.jpg\",\"width\":2400,\"height\":920,\"caption\":\"browser security for MSPs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/browser-security-for-msps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"You\u2019re not losing security at the firewall. You\u2019re losing it in the browser.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\",\"name\":\"Roddy Bergeron\",\"description\":\"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\\\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/roddy-bergeron-cissp-ccsp-csap-33432573\\\/\"],\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/roddy-bergeron\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why browser security for MSPs can\u2019t wait | Sherweb","description":"Did you know most breaches bypass firewalls? See why browser security for MSPs is key to stopping phishing and protecting client credentials.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/","og_locale":"en_US","og_type":"article","og_title":"Why browser security for MSPs can\u2019t wait | Sherweb","og_description":"Did you know most breaches bypass firewalls? See why browser security for MSPs is key to stopping phishing and protecting client credentials.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2025-08-01T13:00:52+00:00","article_modified_time":"2025-09-29T06:14:14+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/DefensX-launch-1200x480-1.jpg","type":"image\/jpeg"}],"author":"Roddy Bergeron","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"Roddy Bergeron","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/"},"author":{"name":"Roddy Bergeron","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"headline":"You\u2019re not losing security at the firewall. You\u2019re losing it in the browser.","datePublished":"2025-08-01T13:00:52+00:00","dateModified":"2025-09-29T06:14:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/"},"wordCount":1084,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/DefensX-launch-1200x480-1.jpg","keywords":["Cybersecurity","Author: Roddy Bergeron","Vendor Risk Management","browser security for MSPs","MSP Security Strategy"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/","url":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/","name":"Why browser security for MSPs can\u2019t wait | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/DefensX-launch-1200x480-1.jpg","datePublished":"2025-08-01T13:00:52+00:00","dateModified":"2025-09-29T06:14:14+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"description":"Did you know most breaches bypass firewalls? See why browser security for MSPs is key to stopping phishing and protecting client credentials.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/#primaryimage","url":"\/blog\/wp-content\/uploads\/DefensX-launch-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/DefensX-launch-1200x480-1.jpg","width":2400,"height":920,"caption":"browser security for MSPs"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/browser-security-for-msps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"You\u2019re not losing security at the firewall. You\u2019re losing it in the browser."}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795","name":"Roddy Bergeron","description":"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.","sameAs":["https:\/\/www.linkedin.com\/in\/roddy-bergeron-cissp-ccsp-csap-33432573\/"],"url":"https:\/\/www.sherweb.com\/blog\/author\/roddy-bergeron\/"}]}},"tag_names":["Cybersecurity","Author: Roddy Bergeron","Vendor Risk Management","browser security for MSPs","MSP Security Strategy"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=25604"}],"version-history":[{"count":2,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25604\/revisions"}],"predecessor-version":[{"id":25616,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25604\/revisions\/25616"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/25605"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=25604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=25604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=25604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}