top of page



Why MSPs Should Pay Attention to Microsoft 365 Device Code Phishing
A recently reported Microsoft 365 attack highlights a growing challenge for managed service providers: identity threats are no longer limited to stolen passwords or MFA failures . Attackers are now abusing device code authentication — a legitimate Microsoft OAuth flow — to gain access to Microsoft 365 accounts without capturing credentials or triggering traditional phishing defenses. For MSPs managing multiple tenants, this is more than a security headline. It’s an operation

Mandi @ MSPwerks
2 min read


Unlocking the Power of OAuth Governance for Managed Service Providers
OAuth Governance as a Managed Service helps MSPs turn app permissions, webhook monitoring, and evidence reporting into recurring revenue. It extends your managed security stack beyond MFA and patching—giving clients continuous visibility into which apps and integrations can access their data, and proof that those access rights are reviewed. Why OAuth Governance Is the Next Layer in Managed Security Every connected business tool—CRM, HR, automation—relies on OAuth permissions

Mandi @ MSPwerks
4 min read


Cybersecurity SOPs: 6 Tips to Strengthening MSPs' Defense Against Threats
In today's digital landscape, cybersecurity threats are becoming more sophisticated and prevalent than ever before. As Managed Service Providers (MSPs) strive to protect their clients' sensitive data and maintain business continuity, having a robust cybersecurity strategy is paramount. One effective way to bolster your MSP's defense against these threats is by implementing well-defined Standard Operating Procedures (SOPs). In this blog post, we'll delve into the significance

Mandi @ MSPwerks
2 min read


Centralized NIST Framework Templates for MSP's
Learn how centralized NIST framework templates are ideal for MSPs to educate clients and mitigate security concerns

Brandi @ MSPwerks
2 min read
bottom of page
