Raw Thoughts

MFA is a Compulsory Item

MFA is a Compulsory Item

I might generate a bit of a stir, but this must be said! You cannot be defensible if you are not meaningfully implementing multi-factor authentication. If I'm being honest, having this conversation is getting so old. We've been having it for years yet, somehow,...

read more
How I’d Approach NCE

How I’d Approach NCE

Microsoft’s New Commerce Experience comes with substantial changes to the way we’re used to doing business with Microsoft. From price increases to extra price increases for monthly terms, it can really complicate your business model as an MSP. In this article, I’ll touch on how I would approach NCE and what changes I would have made to my model.

read more
Review: FEITIAN Security Keys

Review: FEITIAN Security Keys

FEITIAN recently reached out to me on LinkedIn and asked if I’d be willing to take a look at their security keys. As you may know, I’m a major proponent of FIDO/U2F, and I’ve been a Yubikey user since it was just YOTP. That said, I was curious to check out FEITIAN’s...

read more
No Framework Can Mean No Defensibility

No Framework Can Mean No Defensibility

Frameworks are extremely important in the modern security landscape. With the level of complexity of today’s average environment, even in the SMB arena, shooting from the hip is hardly an option anymore. In fact, I’d almost challenge that the way the SMB sector has approached security for well over a decade has just been plain wrong, let’s dive in.

read more
Business Email Compromise is Still Alive and Well!

Business Email Compromise is Still Alive and Well!

Ransomware, zero-days, and other "sexier" attacks have dominated the news lately. But an article I read on The Record served as an important reminder that business email compromise (BEC) attacks are still very much alive and well. BEC's are one of the simplest attacks...

read more