Insights

Notes from the field

Plainspoken writing on compliance, security, and IT for growing companies.

By topic

By industry

April 20, 2026

Medical practice IT, HIPAA safeguards in 60 to 90 days

A practical 60 to 90 day plan for medical practices to bring HIPAA Security Rule safeguards to a defensible baseline, from risk analysis to access controls to incident response.

HIPAA medical practice covered entity

April 20, 2026

Application allowlisting for the small-business reality

A practical view of application allowlisting at the mid-market — what it protects against, why most mid-market firms don't need it yet and when the calculation actually flips.

allowlisting endpoint security WDAC

April 20, 2026

Endpoint privilege management without breaking your users

A practical approach to removing local admin rights from workstations at mid-market firms, with just-in-time elevation, approval workflows and rollout sequencing that users will actually tolerate.

privilege management endpoint security local admin

April 20, 2026

The IT transition from 25 users to 75 users

A practical playbook for the IT and cybersecurity transitions a small business has to navigate as it grows from 25 users to 75, with what breaks and what to build at each milestone.

scaling managed IT SMB

April 20, 2026

Cybersecurity and enterprise valuation, how much it actually matters

A practical view of how cybersecurity posture affects transaction outcomes, deal multipliers and retrade risk at mid-market PE exits, with honest ranges for the magnitude of impact.

private equity valuation enterprise value

April 20, 2026

Security marketing vs. security evidence

Why enterprise buyers, auditors and cyber insurance underwriters discount marketing language in security questionnaires, and what audit-grade evidence actually looks like.

security evidence questionnaire audit

April 20, 2026

Post-incident review, what to document, what to change

A practical format for the post-incident review that produces operational improvements instead of blame, scar-tissue over-correction or a forgotten document nobody reads again.

incident response post-mortem operations

April 20, 2026

How to build a cybersecurity program document your customers accept

The contents, structure and maintenance cadence for a cybersecurity program document that holds up to customer audits, cyber insurance renewals and SOC 2 readiness assessments.

cybersecurity program audit evidence

April 20, 2026

Microsoft 365 security baselines, the 10 settings that matter most

The 10 Microsoft 365 security configuration changes that reduce risk most at the mid-market level, with honest notes on which require E5 and which work on E3 or Business Premium.

Microsoft 365 Entra ID security configuration

April 20, 2026

SIEM at the mid-market, when it's worth it, when it's overkill

A practical read on SIEM for mid-market firms — what the technology actually does, when the cost is justified and the three alternatives most firms should evaluate first.

SIEM security operations MDR

April 20, 2026

Incident response when you don't have an in-house team

How small and mid-market firms actually respond to cybersecurity incidents without a dedicated security team, from MDR coverage to IR-firm retainers to executive decision-making during the first 4 hours.

incident response MDR IR retainer

April 20, 2026

Breaking free from break-fix, what changes with managed IT

A practical look at what changes when a small business moves from break-fix IT to a managed services engagement, from cost predictability to security posture to the 3 AM call.

managed IT MSP SMB

April 20, 2026

Vendor risk management at 40 employees, without a GRC tool

A practical vendor-risk program for small and mid-market firms that cannot justify a GRC platform, built around a maintained spreadsheet, a tiered review cadence and a clear escalation path.

vendor risk VRM compliance

April 20, 2026

Network segmentation, when a flat network becomes a liability

A practical view of network segmentation for small and mid-market firms, what it actually means at this scale, what it protects against and how to phase the implementation without disrupting operations.

network segmentation architecture operations

April 20, 2026

Your first ransomware tabletop, a sample script

A working sample script for a mid-market firm's first ransomware tabletop exercise, including agenda, scenario, injects, decision points and the artifacts it should produce.

tabletop incident response ransomware

April 20, 2026

Cybersecurity for community banks and credit unions, the examiner's list

What FDIC, OCC, NCUA and state examiners actually look at when they review a community bank or credit union's cybersecurity posture, and what a credible program looks like at the mid-market asset level.

community bank credit union FFIEC

April 20, 2026

CIS Controls v8, the practical prioritization most MSPs skip

A working guide to the CIS Controls v8 Implementation Groups, why most MSPs ignore the prioritization and how a mid-market firm should actually sequence the 153 safeguards.

CIS Controls compliance prioritization

April 20, 2026

MDR vs SOC-as-a-service vs running it yourself

A practical decision framework for mid-market firms choosing between managed detection and response, SOC-as-a-service and building an in-house SOC.

MDR SOC security operations

April 20, 2026

Law firm data protection, matter segregation and encryption practices

The practical data protection obligations a modern law firm carries, from client confidentiality and matter segregation to encryption, access controls and the new wave of enterprise-client security requirements.

law firm confidentiality data protection

April 20, 2026

Insurance agency IT, what your carrier expects from YOU

The cybersecurity and IT expectations insurance carriers, E&O underwriters and state regulators increasingly place on independent insurance agencies, and how an agency should actually comply.

insurance agency E&O cybersecurity

April 20, 2026

Carve-out IT, separating systems from a Fortune 1000 parent

The practical IT and cybersecurity workload of a PE carve-out from a Fortune 1000 parent, from TSA planning to standalone environment build to post-close operation.

private equity carve-out M&A

April 20, 2026

What a ransomware incident actually costs

The real cost categories of a modern ransomware incident, why the ransom is usually the smallest line item and how mid-market CFOs should frame the exposure.

ransomware incident cost CFO

April 20, 2026

IT for senior-care operators, HIPAA, multi-site and the state inspection

The practical IT and cybersecurity workload a multi-site senior-care operator carries, from HIPAA safeguards to the state inspection readiness the corporate office rarely thinks about.

senior care HIPAA multi-site

April 20, 2026

What actually lowers your cyber insurance premium

The specific control changes, evidence artifacts and broker moves that actually lower cyber insurance premium at renewal, and what does not.

cyber insurance premium renewal

April 19, 2026

Tested restores, how to verify your backup strategy is real

A working runbook for backup restore testing, what each cadence should cover and why a backup that has never been restored is not a backup.

backup restore testing resilience

April 19, 2026

OT cybersecurity for mid-market manufacturers

Why operational technology needs a cybersecurity program distinct from corporate IT, what the IEC 62443 framework expects and how a mid-market manufacturer should sequence the work.

manufacturing OT IEC 62443

April 19, 2026

HIPAA for business associates, what's in a BAA and what's not

What a Business Associate Agreement actually commits a vendor to, where the common misreadings surface and how a BA should build the program the BAA promises.

HIPAA compliance business associate

April 19, 2026

MFA, EDR and offline backups, the cyber insurance triage list

The three controls that carry the most weight in modern cyber insurance underwriting, why they became the triage list and how to confirm yours are actually operating.

cyber insurance controls triage

April 19, 2026

Zero Trust for small and mid-market: what to do first

A practical Zero Trust sequence for companies of 50 to 500 employees, honest about what is achievable without an enterprise identity team and what is not.

Zero Trust identity architecture

April 19, 2026

SOC 2 readiness vs. audit and why your MSP doesn't do audits

Why SOC 2 readiness and the SOC 2 audit are distinct engagements, why one firm cannot do both and how to sequence the two without burning budget or credibility.

SOC 2 compliance readiness

April 19, 2026

3-2-1-1-0: the new backup baseline

The updated 3-2-1-1-0 backup rule, what each digit actually requires and why the classic 3-2-1 guidance is no longer enough for modern ransomware threat models.

backup ransomware resilience

April 19, 2026

Your cyber insurance renewal questionnaire is getting harder, a walkthrough

A walkthrough of the modern cyber insurance renewal process, why the questionnaire has doubled in length since 2022 and what the underwriter is actually measuring behind each section.

cyber insurance renewal underwriting

April 19, 2026

The 25 questions you'll fail on your next cyber insurance renewal

The 25 cyber insurance renewal questions most mid-market firms answer weakly, what each one is really measuring and how to close the gap before your carrier notices.

cyber insurance renewal controls

April 19, 2026

The 100-day cybersecurity plan for a newly acquired portfolio company

A practical 100-day cybersecurity playbook for PE operating partners and portfolio-company CFOs, covering the assess, stabilize and execute phases of post-close.

private equity 100-day plan portfolio operations

April 19, 2026

Your first enterprise customer security questionnaire, what to expect

A practical walkthrough of the enterprise customer security questionnaire, what the buyer is actually measuring and how to respond without burning the deal.

security questionnaire enterprise sales vendor risk

April 19, 2026

SOC 2 Type I vs Type II: what your enterprise customer actually wants

A practical breakdown of SOC 2 Type I and Type II reports, what each one proves, and how to decide which to pursue for your first enterprise customer review.

SOC 2 compliance enterprise sales

April 19, 2026

Cybersecurity diligence for a PE sale: what buyers actually check

A practical field guide to the cybersecurity evidence buyers, operating partners and lenders review during a lower-middle-market PE transaction.

private equity cybersecurity diligence M&A

April 19, 2026

Phishing-resistant MFA: FIDO2, passkeys and what's coming next

SMS codes and push notifications are no longer enough MFA for serious cyber insurance or customer review programs. The move to FIDO2 security keys and passkeys is underway, here's how it works and what to deploy.

MFA identity FIDO2

April 19, 2026

Ransomware-hardened backup: what 'immutable' actually means

Your backup strategy is only as good as your last documented successful restore. A practical explanation of immutability, the 3-2-1-1-0 rule and what ransomware-hardened actually requires.

backup ransomware disaster recovery

April 19, 2026

NIST 800-171: the 110 controls and which ones eat the budget

A practical breakdown of the NIST 800-171 control families, which controls take the most effort for small and mid-market organizations and how to sequence the 90-120 day compliance arc.

NIST 800-171 compliance cybersecurity frameworks

April 19, 2026

EDR vs antivirus: what actually changed and what still matters

Your cyber insurance carrier is asking about EDR because traditional antivirus stopped being enough around 2017. Here's the practical difference and what to deploy.

EDR endpoint security cyber insurance

April 19, 2026

NIST CSF 2.0 in plain English: what changed and why it matters

NIST CSF 2.0 added Govern as a sixth function and reorganized how small and mid-market organizations should think about cybersecurity. A practitioner's translation.

NIST CSF 2.0 compliance cybersecurity frameworks

April 19, 2026

Password managers for small business: why, which and how to roll one out

A 25-person firm can deploy a business password manager in under two weeks and eliminate the worst category of credential risk. Here's the plan.

password managers identity cyber insurance