Legal Tech Podcast Episodes
What MSPs Need to Know about the Kaseya Ransomware Attack
An interview with Rob Scott about the legal, political, and business impact of the Kaseya ransomware attack.
- Breach requirements for MSPs
- Role of insurance
- The sequence of steps taken by MSPs post-breach
- Dealing with vendor contract limitations
- Is this a gross negligence situation?
MSP Zone guest: Rob Scott
Additional Technology Law Podcasts
Managed Services Insurance: Everything You Need to Know
Insurance for your MSP practice has never been more important. What types of insurance should you get? What insurance will protect you versus your ...
Is it Smart to Private Label Your Services as an MSP?
Private labeling (or white labeling) solutions as an MSP is not a new concept. It has been in practice for many years. And yet, with all the change...
Are Managed Services Clients on a Collision Course with Vendors?
Recent cyberattacks involving vendor technologies could be creating more risk for managed services customers. Are these attacks setting clients on ...
Vendor Supply Chain Data Breaches - What Should You Do?
What obligations do MSPs have when they learn of a data breach within one of their supply chain vendors? Does such a breach automatically mean the ...
Current Best Practices in Managed Service Contracts
Managed services agreements are crucial for MSPs and clients. Everything from the duration of the agreement, to pricing, limitation of liability, a...
Managed Services Has Bright Future, Regardless of Political Outcomes
When many people are uncertain about the outcome of the recent political elections, there is some certainty in the world. Specifically, there is so...
Safe Cyber Hygiene Through Managed Services Contracts
How do you achieve safe cyber hygiene with your managed services customers. How about your contracts? Managed services contracts are one of sev...
Understanding the Difference Between Security and Privacy Incidents
Not every cyber attack involves a data breach. Some network breaches do not involve the loss of personally identifiable data. Understanding the dis...