{"id":13060,"date":"2026-04-07T09:34:40","date_gmt":"2026-04-07T08:34:40","guid":{"rendered":"https:\/\/mspglobal.com\/blog\/?p=13060"},"modified":"2026-04-02T16:38:19","modified_gmt":"2026-04-02T15:38:19","slug":"weakest-link-cybersecurity-msp-global-hackah-jack","status":"publish","type":"post","link":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/","title":{"rendered":"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)"},"content":{"rendered":"\n<p>At MSP GLOBAL 2025, one of the most memorable sessions didn\u2019t come wrapped in a slick slide deck or a neatly packaged framework. It came as a story\u2014unfiltered, occasionally uncomfortable, and grounded in hard experience.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/in\/jessetuttle\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Jesse <a href=\"https:\/\/www.linkedin.com\/in\/jessetuttle\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><\/a>Tuttle<\/a>\u2014known to many as \u201cHackah Jack\u201d\u2014shared the stage with his daughter <a href=\"https:\/\/www.linkedin.com\/in\/reesebess\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Reese<\/a>, and together they offered something the MSP world doesn\u2019t hear often enough: what cybersecurity actually looks like from the attacker\u2019s side.<\/p>\n\n\n\n<p>Jesse\u2019s background alone would have filled the room. A well-known\u2014and, depending on who you ask, notorious\u2014figure, he\u2019s been on both sides of the law, moving from world-class cybercriminal to working with federal authorities and now helping organizations understand how attackers really think.<\/p>\n\n\n\n<p>Reese brings a different kind of credibility\u2014a next-generation threat researcher shaped by growing up inside that world, translating instinct into insight.<\/p>\n\n\n\n<p>What followed wasn\u2019t a technical walkthrough or a product pitch. It was a reality check, which was pre-figured in <a href=\"https:\/\/mspglobal.com\/blog\/inside-the-mind-of-a-hacker-understanding-cybercriminal-psychology-with-jesse-tuttle\/\" target=\"_blank\" rel=\"noreferrer noopener\">the pre-event interview<\/a> he was kind enough to give us.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"The Weakest Link: Jesse Tuttle (&#039;Hackah Jack&#039;) Tells You About Your Next Breach - MSP GLOBAL 2025\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/7GGIVG7Z4A4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading cfs-article-heading has-x-large-font-size\" id=\"h-five-practical-lessons-for-msps\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Five practical lessons for MSPs<\/h2>\n\n\n\n<h3 class=\"wp-block-heading cfs-article-inner-heading has-medium-font-size\" id=\"h-compliance-is-where-security-starts-not-where-it-ends\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Compliance is where security starts\u2014not where it ends<\/h3>\n\n\n\n<p>There\u2019s a persistent myth that once compliance is \u201cdone,\u201d security is in a good place. Jesse tore that apart quickly. Compliance, he argued, is just the baseline\u2014the point where you begin, not where you stop.<\/p>\n\n\n\n<p>Frameworks like <a href=\"https:\/\/www.cisecurity.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CIS<\/a> or <a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">NIST<\/a> are valuable, but only in the way scaffolding is valuable. They give you structure, a shape to build around. They don\u2019t make the building secure on their own. And yet, it\u2019s still common to see compliance treated as a deliverable\u2014a moment in time rather than an ongoing discipline.<\/p>\n\n\n\n<p>The problem is that attackers don\u2019t operate against frameworks. They operate in the real world. They look at how systems are actually configured, how people actually behave, and where the small gaps have been left behind after the audit is complete.<\/p>\n\n\n\n<p>For MSPs, the real opportunity lies in what happens after the boxes are ticked\u2014taking that baseline and shaping it into something that reflects the client\u2019s actual risk profile, not just a generic standard.<\/p>\n\n\n\n<h3 class=\"wp-block-heading cfs-article-inner-heading has-medium-font-size\" id=\"h-the-attacker-mindset-starts-with-curiosity\" style=\"font-style:normal;font-weight:600;line-height:1.3\">The attacker mindset starts with curiosity<\/h3>\n\n\n\n<p>What makes Jesse\u2019s story particularly valuable for MSPs is that it doesn\u2019t begin with criminal intent. It begins with curiosity. A simple question about why software behaved differently led to reverse engineering, which in turn revealed a vulnerability, which eventually opened the door to something much bigger.<\/p>\n\n\n\n<p>That progression matters because it highlights a gap in how many MSP teams are trained. Most are taught to follow processes, maintain systems, and resolve issues efficiently. All necessary. But attackers don\u2019t think in processes. They think in possibilities.<\/p>\n\n\n\n<p>They ask different questions. What happens if this fails? What wasn\u2019t considered? Where is the edge case?<\/p>\n\n\n\n<p>That mindset is where breaches are born.<\/p>\n\n\n\n<p>The takeaway isn\u2019t that every MSP needs to become an offensive security specialist, but that curiosity needs to be encouraged, not suppressed. The teams that actively look for weaknesses\u2014that challenge assumptions and test boundaries\u2014are far better positioned to defend against someone who is doing exactly that from the outside.<\/p>\n\n\n\n<h3 class=\"wp-block-heading cfs-article-inner-heading has-medium-font-size\" id=\"h-opportunity-not-importance-drives-attacks\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Opportunity, not importance, drives attacks<\/h3>\n\n\n\n<p>One of the more surprising threads running through Jesse\u2019s story is the practicality of his decision-making. Targets weren\u2019t always chosen because they were high-value. They were chosen because they were accessible, useful, or simply easier to exploit than other options.<\/p>\n\n\n\n<p>That runs counter to a belief that still lingers among many MSP clients\u2014that being small or relatively unknown offers some level of protection. It doesn\u2019t. Attackers are not filtering targets by revenue or headcount. They\u2019re looking for openings.<\/p>\n\n\n\n<p>If a system is exposed, if a configuration is weak, if credentials are available, that\u2019s enough.<\/p>\n\n\n\n<p>For MSPs, this shifts the conversation. Security isn\u2019t about making a client \u201cimportant enough\u201d to defend. It\u2019s about understanding how exposed they are and reducing that exposure wherever possible. Because from an attacker\u2019s perspective, convenience often outweighs value.<\/p>\n\n\n\n<h3 class=\"wp-block-heading cfs-article-inner-heading has-medium-font-size\" id=\"h-layered-security-only-works-if-you-accept-that-something-will-fail\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Layered security only works if you accept that something will fail<\/h3>\n\n\n\n<p>Reese brought useful insight to the discussion with a simple analogy: security as a layered defense system. The perimeter tries to stop threats early, users act as another line of defense, and endpoint protection is there to catch what inevitably slips through.<\/p>\n\n\n\n<p>Something will always slip through.<\/p>\n\n\n\n<p>That\u2019s the part that\u2019s often acknowledged but not fully accepted in practice. Too many environments are still designed as if one or two controls will be enough, as if the right combination of tools can eliminate risk entirely. In reality, every layer has weaknesses. People make mistakes. Filters miss things. Attackers adapt.<\/p>\n\n\n\n<p>Layered security isn\u2019t about building something perfect. It\u2019s about building something resilient.<\/p>\n\n\n\n<p>For MSPs, that means designing environments where failure is expected and accounted for. Where each control supports the others, and where the absence of any one layer doesn\u2019t immediately lead to compromise. It also means recognizing that users are not just part of the solution, but part of the attack surface\u2014something that needs to be managed with as much care as any piece of technology.<\/p>\n\n\n\n<h3 class=\"wp-block-heading cfs-article-inner-heading has-medium-font-size\" id=\"h-you-re-already-dealing-with-compromised-data-act-like-it\" style=\"font-style:normal;font-weight:600;line-height:1.3\">You\u2019re already dealing with compromised data\u2014act like it<\/h3>\n\n\n\n<p>Perhaps the most sobering moment came during the Q&amp;A, when the conversation turned to data exposure. Jesse\u2019s view was blunt: if you exist, your data is already out there in some form.<\/p>\n\n\n\n<p>That may sound extreme, but it reflects the reality of years of breaches, leaks, and aggregation. Credentials circulate. Personal data is traded. Access is bought and sold.<\/p>\n\n\n\n<p>Once you accept that, the focus shifts.<\/p>\n\n\n\n<p>Security can\u2019t just be about keeping everything out, because some of it is already in circulation. Instead, it becomes about visibility and response\u2014understanding what\u2019s happening inside an environment, identifying unusual behavior quickly, and limiting the impact when something goes wrong.<\/p>\n\n\n\n<p>For MSPs, this is where maturity shows. Not in claiming that breaches won\u2019t happen, but in being prepared for when they do.<\/p>\n\n\n\n<h2 class=\"wp-block-heading cfs-article-heading has-x-large-font-size\" id=\"h-why-this-matters-for-msps\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Why this matters for MSPs<\/h2>\n\n\n\n<p>It\u2019s easy for the MSP world to become comfortable. Familiar tools, familiar frameworks, familiar conversations. Necessary, but not always sufficient.<\/p>\n\n\n\n<p>What Jesse and Reese brought to the stage was a different perspective\u2014one that cuts through that comfort. Attackers don\u2019t think in terms of best practice or compliance frameworks. They think in terms of gaps, opportunities, and outcomes.<\/p>\n\n\n\n<p>And unless that perspective is part of how you approach security, something is missing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading cfs-article-heading has-x-large-font-size\" id=\"h-join-the-conversation-in-2026\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Join the conversation in 2026<\/h2>\n\n\n\n<p>If this session made anything clear, it\u2019s that the MSP industry benefits from more honesty and less polish when it comes to cybersecurity. The conversations that move things forward are the ones that challenge assumptions, not reinforce them.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.mspglobal.com\/\">MSP GLOBAL<\/a> returns in October 2026, bringing together the people willing to have those conversations\u2014and to share what\u2019s actually happening on the front lines.<\/p>\n\n\n\n<p>If you want to stay ahead of the curve, rather than reacting to it, this is where you need to be.<\/p>\n\n\n\n<p><strong>Sign up for the newsletter to get your free registration code.<\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At MSP GLOBAL 2025, one of the most memorable sessions didn\u2019t come wrapped in a slick slide deck or a neatly packaged framework. It came as a story\u2014unfiltered, occasionally uncomfortable, and grounded in hard experience. Jesse Tuttle\u2014known to many as \u201cHackah Jack\u201d\u2014shared the stage with his daughter Reese, and together they offered something the MSP [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":13061,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"mark_post_sync":false,"footnotes":""},"categories":[1499],"tags":[],"class_list":["post-13060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp-global"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)<\/title>\n<meta name=\"description\" content=\"Key cybersecurity lessons for MSPs from Jesse Tuttle, aka Hackah Jack, covering compliance, attacker mindset, layered security, and breach readiness.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)\" \/>\n<meta property=\"og:description\" content=\"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/\" \/>\n<meta property=\"og:site_name\" content=\"MSP GLOBAL BLOG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100089083200946\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-07T08:34:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-03-31-at-16.13.07.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1115\" \/>\n\t<meta property=\"og:image:height\" content=\"598\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Miles Kendall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MSPglobalevent\" \/>\n<meta name=\"twitter:site\" content=\"@MSPglobalevent\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miles Kendall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/\"},\"author\":{\"name\":\"Miles Kendall\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/person\\\/3e9bed029b316efa7a58f3f21d3c2845\"},\"headline\":\"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)\",\"datePublished\":\"2026-04-07T08:34:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/\"},\"wordCount\":1213,\"publisher\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Screenshot-2026-03-31-at-16.13.07.png\",\"articleSection\":[\"MSP Global\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/\",\"name\":\"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Screenshot-2026-03-31-at-16.13.07.png\",\"datePublished\":\"2026-04-07T08:34:40+00:00\",\"description\":\"Key cybersecurity lessons for MSPs from Jesse Tuttle, aka Hackah Jack, covering compliance, attacker mindset, layered security, and breach readiness.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Screenshot-2026-03-31-at-16.13.07.png\",\"contentUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Screenshot-2026-03-31-at-16.13.07.png\",\"width\":1115,\"height\":598,\"caption\":\"Jesse Tuttle\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/weakest-link-cybersecurity-msp-global-hackah-jack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MSP Global\",\"item\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/category\\\/msp-global\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/\",\"name\":\"MSP INSIGHTS - The MSP GLOBAL Blog\",\"description\":\"The latest news for MSPs and Tech Experts.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#organization\",\"name\":\"MSP GLOBAL\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/MSP-GLOBAL-BLOG.svg\",\"contentUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/MSP-GLOBAL-BLOG.svg\",\"width\":536,\"height\":63,\"caption\":\"MSP GLOBAL\"},\"image\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=100089083200946\",\"https:\\\/\\\/x.com\\\/MSPglobalevent\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mspglobalevent\\\/\",\"https:\\\/\\\/www.instagram.com\\\/mspglobalevent\\\/\"],\"ownershipFundingInfo\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/imprint\\\/\",\"actionableFeedbackPolicy\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/imprint\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/person\\\/3e9bed029b316efa7a58f3f21d3c2845\",\"name\":\"Miles Kendall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/miles-kendall-96x96.jpeg\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/miles-kendall-96x96.jpeg\",\"contentUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/miles-kendall-96x96.jpeg\",\"caption\":\"Miles Kendall\"},\"description\":\"Miles is a highly experienced communications and technology expert, with a track record of delivering high performing content for a range of B2B clients across a variety of sectors. As part of the senior writing team at CloudFest he\u2019s responsible for highlighting key trends, teasing out thought leadership and delivering original insight \u2013 utilizing his background in journalism and content strategy.\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/author\\\/miles-kendall\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)","description":"Key cybersecurity lessons for MSPs from Jesse Tuttle, aka Hackah Jack, covering compliance, attacker mindset, layered security, and breach readiness.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/","og_locale":"en_US","og_type":"article","og_title":"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)","og_description":"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)","og_url":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/","og_site_name":"MSP GLOBAL BLOG","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100089083200946","article_published_time":"2026-04-07T08:34:40+00:00","og_image":[{"width":1115,"height":598,"url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-03-31-at-16.13.07.png","type":"image\/png"}],"author":"Miles Kendall","twitter_card":"summary_large_image","twitter_creator":"@MSPglobalevent","twitter_site":"@MSPglobalevent","twitter_misc":{"Written by":"Miles Kendall","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/#article","isPartOf":{"@id":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/"},"author":{"name":"Miles Kendall","@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/person\/3e9bed029b316efa7a58f3f21d3c2845"},"headline":"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)","datePublished":"2026-04-07T08:34:40+00:00","mainEntityOfPage":{"@id":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/"},"wordCount":1213,"publisher":{"@id":"https:\/\/mspglobal.com\/blog\/#organization"},"image":{"@id":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/#primaryimage"},"thumbnailUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-03-31-at-16.13.07.png","articleSection":["MSP Global"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/","url":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/","name":"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)","isPartOf":{"@id":"https:\/\/mspglobal.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/#primaryimage"},"image":{"@id":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/#primaryimage"},"thumbnailUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-03-31-at-16.13.07.png","datePublished":"2026-04-07T08:34:40+00:00","description":"Key cybersecurity lessons for MSPs from Jesse Tuttle, aka Hackah Jack, covering compliance, attacker mindset, layered security, and breach readiness.","breadcrumb":{"@id":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/#primaryimage","url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-03-31-at-16.13.07.png","contentUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-03-31-at-16.13.07.png","width":1115,"height":598,"caption":"Jesse Tuttle"},{"@type":"BreadcrumbList","@id":"https:\/\/mspglobal.com\/blog\/weakest-link-cybersecurity-msp-global-hackah-jack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mspglobal.com\/blog\/"},{"@type":"ListItem","position":2,"name":"MSP Global","item":"https:\/\/mspglobal.com\/blog\/category\/msp-global\/"},{"@type":"ListItem","position":3,"name":"The Weakest Link in Cybersecurity: What MSPs Can Learn from Jesse Tuttle, aka Hackah Jack (Video)"}]},{"@type":"WebSite","@id":"https:\/\/mspglobal.com\/blog\/#website","url":"https:\/\/mspglobal.com\/blog\/","name":"MSP INSIGHTS - The MSP GLOBAL Blog","description":"The latest news for MSPs and Tech Experts.","publisher":{"@id":"https:\/\/mspglobal.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mspglobal.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mspglobal.com\/blog\/#organization","name":"MSP GLOBAL","url":"https:\/\/mspglobal.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/MSP-GLOBAL-BLOG.svg","contentUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/MSP-GLOBAL-BLOG.svg","width":536,"height":63,"caption":"MSP GLOBAL"},"image":{"@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=100089083200946","https:\/\/x.com\/MSPglobalevent","https:\/\/www.linkedin.com\/company\/mspglobalevent\/","https:\/\/www.instagram.com\/mspglobalevent\/"],"ownershipFundingInfo":"https:\/\/mspglobal.com\/blog\/imprint\/","actionableFeedbackPolicy":"https:\/\/mspglobal.com\/blog\/imprint\/"},{"@type":"Person","@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/person\/3e9bed029b316efa7a58f3f21d3c2845","name":"Miles Kendall","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/miles-kendall-96x96.jpeg","url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/miles-kendall-96x96.jpeg","contentUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/miles-kendall-96x96.jpeg","caption":"Miles Kendall"},"description":"Miles is a highly experienced communications and technology expert, with a track record of delivering high performing content for a range of B2B clients across a variety of sectors. As part of the senior writing team at CloudFest he\u2019s responsible for highlighting key trends, teasing out thought leadership and delivering original insight \u2013 utilizing his background in journalism and content strategy.","url":"https:\/\/mspglobal.com\/blog\/author\/miles-kendall\/"}]}},"_links":{"self":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts\/13060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/comments?post=13060"}],"version-history":[{"count":3,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts\/13060\/revisions"}],"predecessor-version":[{"id":13071,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts\/13060\/revisions\/13071"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/media\/13061"}],"wp:attachment":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/media?parent=13060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/categories?post=13060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/tags?post=13060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}