Ransomware isn’t the only risk — why true cyber resilience starts with who you trust
Guest writer Roddy Bergeron, Cybersecurity Technical Fellow, explores how Managed Service Providers (MSPs) can strengthen their vendor risk management strategies and build true cyber resilience. Learn how to protect your clients and your trust before the next threat tests your supply chain. Every MSP knows ransomware isn’t going anywhere. It’s evolved from a rare catastrophe […]
Strategy vs. Execution: The real test of a security program
This blog, authored by Sherweb’s Cybersecurity Technical Fellow Roddy Bergeron, breaks down why most managed service providers (MSPs) fall short on security execution and what it really takes to turn strategy into resilience. Everyone has a plan until they get punched in the face. That famous boxing adage rings especially true in cybersecurity. It’s easy […]
The 4 pillars of MSP cybersecurity maturity: Is your strategy strong enough?
This blog, authored by Sherweb’s Cybersecurity Technical Fellow Roddy Bergeron, explores how a structured cybersecurity program can elevate MSP security maturity, enhance client trust and drive long-term business resilience. Cybersecurity is an arms race, and right now, most MSPs are losing. Not because they aren’t trying, not because they don’t care, but because too many […]
The anatomy of a cyberattack: Breaking down zero-day threats
This blog, authored by Sherweb’s Cybersecurity Technical Fellow Roddy Bergeron, dissects zero-day threats and their real-world impact on businesses, providing IT providers with practical strategies for detection, mitigation and incident response when facing these invisible adversaries. The most dangerous predators don’t announce their presence. They strike without warning, leaving chaos in their wake. In cybersecurity, […]
How SASE strengthens edge device security
This blog, authored by Sherweb’s Cybersecurity Technical Fellow Roddy Bergeron, explores how SASE enhances edge device security strategies to help IT providers mitigate risks and future-proof their networks. Edge device attacks are no longer a hypothetical threat; they’re an active battleground for cybercriminals. VPN gateways, firewalls, and routers—once trusted access points—are now prime targets. If […]
