Click to toggle navigation menu.

Category: Thinking

Large bank vault protecting crowned jewels

MSP Security: 5 RMM Hardening Steps That Cut Risk

Being a successful MSP isn’t just about solving technical problems—it’s about building trust. And nothing destroys that trust faster than a data breach that exposes your clients. Insurance carriers call it aggregation risk. Why? Because as an MSP, you are the gateway to every one of your clients’ networks. A slip-up on your end doesn’t […]

Why MSPs Should Care About Clients’ Cyber Liability Insurance

Clients’ cyber insurance isn’t “someone else’s problem.” It directly affects your risk, your scope, and whether you get paid when incidents happen. Help clients meet insurer‑required controls (MFA, EDR, immutable/offline backups, secure remote access, patch SLAs, training, IR planning), document the truth on applications, and keep a small evidence pack ready. You’ll prevent claim denials, reduce surprises, and open […]

Empowering Non-Profits to Safeguard Their Mission and Finances

At SeedPod Cyber, we believe in the power of collaboration to help organizations that make a difference. Recently, one of our Managed Service Provider (MSP) partners reached out to us for a policy review on behalf of their client—a non-profit Community Center dedicated to supporting low-income families. Identifying the Risk: Coinsurance Clauses During our review, […]

cyber criminal graphic

MGM & Caesars: Human-Factor Attacks and Lessons Learned

In September 2023, social-engineering crews hit MGM Resorts and Caesars Entertainment. Caesars reportedly paid a ransom around $15M, while MGM booked more than $100M in business impact. The entry point wasn’t a zero-day; it was identity tricks and help-desk manipulation. AP News Same playbook, new headlines (2024–2025) Bottom line: attackers don’t need your zero-days if they can […]

The implications for MSPs and MSSPs in CISA’s April 2023 Guidance: “Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default”

In the constantly evolving cybersecurity arms race landscape, it’s becoming increasingly clear that security has to be embedded into products and services from the outset, not just patched on or dealt with downstream when security vulnerabilities are found and exploited. The United States Cybersecurity and Infrastructure Security Agency (CISA) on April 13, 2023, released the […]

The dangers of ransomware attacks on NGOs and nonprofits – and how mitigation including cyber insurance can offer protection

In recent years, ransomware attacks have become a major threat to organizations of all types, including nonprofits. In fact, for cybercriminals, nonprofits make for especially vulnerable and enticing targets right now due to the true most common cybersecurity vulnerabilities, which are broader than any specific technical vulnerability, and include:  The truth is that most organizations, […]

LastPass Breach Lessons: Two User Outcomes—and What To Do Today

Even strong security programs can’t make risk disappear—but they can make incidents survivable. The 2022 LastPass breach is still a great teaching moment because it produced two dramatically different outcomes for users depending on basic habits. Context: What happened at LastPass (short timeline) Aug 2022 – LastPass detected a breach of parts of its development environment. Nov 2022 – […]

Systemic Cyber Risk & Insurance: Practical Guidance

Speaking to the Financial Times on December 26, 2022, Mario Greco, CEO of Zurich Insurance, warned that, just like natural catastrophes, cyber attacks will become uninsurable due to the multiplying and amplifying disruption from successful cyber attacks.  The warning is dire and justified, but all too easy for businesses to misinterpret – to their peril.  […]

Abstract network map with national flags indicating state-linked cyber operations.

Nation-State Cyber Exclusions in 2025: What Buyers Need to Know

What changed since 2023? Bottom line: today’s exclusions are more explicit than the pre-2023 “war/hostile acts” boilerplate—but there isn’t a single universal clause. The specific model/version you have matters. WTW What these clauses usually try to do (plain English) Modern exclusions aim to carve out large-scale, state-linked cyber operations akin to warlike activity. Typical levers you’ll see: Different models […]

Is the Biggest Cybersecurity Threat Inside Your Office? 

The answer is yes. Here’s why – and specific steps to mitigate the threats.
The truth is that, despite dramatic plot-lines in movies and news stories, the most common cybersecurity threat isn’t from shadowy, skilled hackers, but from all-too-human mistakes and weakness within your organization. 

How to Defend an MSP Against Cyberattacks

CISA (The Cybersecurity and Infrastructure Security Agency) is warning organizations that Russia’s invasion of Ukraine could include malicious cyber activity against the U.S. and stated that “evolving intelligence indicates that the Russian Government is exploring options for potential cyberattacks.”

SaaS Applications: the Hidden Threat in Plain Sight

SaaS made business faster, cheaper, and more collaborative—but it also shifted risk into places that traditional perimeter tools can’t see. Most compromises don’t start with exotic zero-days; they start with misconfiguration, excessive permissions, malicious OAuth consent, or a weak help-desk workflow. This rewrite explains why SaaS risk persists and what to do about it now. […]

What NetDiligence, Verizon DBIR, and Cyentia Tell Us About Cyber Risk and Cyber Insurance

The short version• The claims data (NetDiligence) says losses are concentrated in ransomware and business email compromise, with small and midsize firms filing the vast majority of claims.• The breach data (Verizon DBIR) shows third-party involvement and vulnerability exploitation rising fast, with ransomware appearing in nearly half of breaches—but median ransoms trending down as more […]

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.