{"id":13078,"date":"2026-04-16T11:09:49","date_gmt":"2026-04-16T10:09:49","guid":{"rendered":"https:\/\/mspglobal.com\/blog\/?p=13078"},"modified":"2026-04-16T11:18:25","modified_gmt":"2026-04-16T10:18:25","slug":"cybersecurity-best-practices-msp-global","status":"publish","type":"post","link":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/","title":{"rendered":"Spill the I-Tea Podcast: Cybersecurity Best Practices for MSPs (Video)"},"content":{"rendered":"\n<p>How much of cybersecurity today is real protection, and how much is marketing hype? This is a question that MSPs and their clients wrestle with every day. Luckily, MSP GLOBAL brought together three tell-it-like-it-is experts to look at the realities and share their advice and best practice list.<\/p>\n\n\n\n<p>This latest episode of <strong>Spill the I-Tea\u2014the MSP GLOBAL Podcast<\/strong>\u2014is a must-watch (or listen, especially if you\u2019re driving) for the entire IT community. You\u2019ll love this panel: famous (well, infamous) hacker <a href=\"https:\/\/www.linkedin.com\/in\/jessetuttle\/\">Jesse<\/a><a href=\"https:\/\/www.linkedin.com\/in\/jessetuttle\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> <\/a><a href=\"https:\/\/www.linkedin.com\/in\/jessetuttle\/\">Tuttle<\/a>, also known as \u201cHackah Jack\u201d, knows a thing or two about cybercrime. He&#8217;s been on the FBI&#8217;s Most Wanted List, and now he&#8217;s an ethical threat actor for APT2 Labs. Who better for a frank conversation about real-life cybersecurity, right?<\/p>\n\n\n\n<p>Jesse is joined by <a href=\"https:\/\/www.linkedin.com\/in\/brookatrevio\/\">Brook <\/a><a href=\"https:\/\/www.linkedin.com\/in\/brookatrevio\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Lee<\/a> (VP Community and Channel for Lionguard) and <a href=\"https:\/\/www.linkedin.com\/in\/marcushgregory\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Marcus Gregory<\/a> (Head of Distribution Partnerships, Spain, for Blackwall) in conversation with <a href=\"https:\/\/www.linkedin.com\/in\/martvirkus\/\">Mart <\/a><a href=\"https:\/\/www.linkedin.com\/in\/martvirkus\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Virkus<\/a> (Head of Marketing at Patchstack).<\/p>\n\n\n\n<p>This conversation highlights a gap that many MSPs recognize: the difference between the perception of security and the reality of defending against increasingly efficient threat actors.<\/p>\n\n\n\n<p>From testing the effectiveness of common security stacks to debating whether \u201call-in-one\u201d solutions can ever work, the session unpacks the practical challenges MSPs face when building security services for their customers.<\/p>\n\n\n\n<p><em>For more cybersecurity expertise and insights, <\/em><strong><em>join the MSP Community Intelligence Webinar on April 30<\/em><\/strong><em> where the focus is on security and compliance. <a href=\"https:\/\/www.mspglobal.com\/webinars\/\">Sign up for free<\/a>.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Spill the I-Tea: No-BS Cybersecurity for MSPs (MSP GLOBAL Podcast Episode 3)\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/R7oTevk6HjI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading cfs-article-heading has-x-large-font-size\" id=\"h-five-ways-for-msps-to-evolve-their-cybersecurity-strategies\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Five ways for MSPs to evolve their cybersecurity strategies<\/h2>\n\n\n\n<h3 class=\"wp-block-heading cfs-article-inner-heading has-medium-font-size\" id=\"h-stop-trusting-single-tool-security\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Stop trusting single-tool security<\/h3>\n\n\n\n<p>If you\u2019re still relying on one platform to cover everything, you\u2019re leaving gaps\u2014whether you realize it or not. No single tool can defend against every attack vector, despite what the marketing might suggest.<br><br>Real security requires layers of firewalls, endpoint protection, vulnerability management, monitoring, and user awareness into a system that works together. Each layer closes a different gap, and that cumulative effect is what makes the difference.<br><br>Attackers don\u2019t try to break strong systems\u2014they look for the easiest way in. If your environment forces them to push through multiple barriers, they\u2019re far more likely to move on. For MSPs, that\u2019s the core principle: defense-in-depth will always outperform convenience.<\/p>\n\n\n\n<h3 class=\"wp-block-heading cfs-article-inner-heading has-medium-font-size\" id=\"h-cut-through-the-marketing-noise\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Cut through the marketing noise<\/h3>\n\n\n\n<p>Cybersecurity marketing thrives on simplicity, but real-world environments are anything but simple. Clients are operating across hybrid systems, legacy infrastructure, and evolving threats\u2014so the idea of a single \u201ccomplete solution\u201d rarely holds up in practice.<br><br>That\u2019s where MSPs need to lead the conversation. Move beyond vendor language and explain security in practical, honest terms. Be clear about what tools can do, where the gaps are, and how different controls work together.<br><br>This level of transparency doesn\u2019t weaken your position\u2014it strengthens it. It builds trust, sets realistic expectations, and prevents security from becoming a superficial box-ticking exercise.<\/p>\n\n\n\n<h3 class=\"wp-block-heading cfs-article-inner-heading has-medium-font-size\" id=\"h-build-a-truly-integrated-stack\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Build a truly integrated stack<\/h3>\n\n\n\n<p>Adding more tools can improve protection, but only if they\u2019re designed to operate as a cohesive system. Poor integration creates blind spots, overlaps waste time and resources, and conflicts can reduce visibility at exactly the wrong moment.<br><br>The goal isn\u2019t to assemble a collection of \u201cbest-in-class\u201d products in isolation. It\u2019s to design a security ecosystem where each component complements the others and contributes to a clear, unified view of risk.<br><br>For MSPs managing multiple clients, consistency is critical. A well-structured, interoperable stack is far easier to scale, manage, and secure than a fragmented one built tool by tool.<\/p>\n\n\n\n<h3 class=\"wp-block-heading cfs-article-inner-heading has-medium-font-size\" id=\"h-assume-you-are-a-target-no-matter-your-size\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Assume you are a target\u2014no matter your size<\/h3>\n\n\n\n<p>Cybercriminals are driven by efficiency, not prestige. They\u2019re not necessarily chasing the biggest brand\u2014they\u2019re looking for the quickest, most repeatable path to a payday.<br><br>With automated tools, attackers can scan for known vulnerabilities, identify weak defenses, and deploy the same exploit across dozens or hundreds of organizations in a short space of time. Smaller businesses often become prime targets simply because they\u2019re easier to compromise.<br><br>For MSPs, this raises the stakes. Every client, endpoint, and connection in your ecosystem represents a potential entry point. Security cannot be tiered by size\u2014it has to be consistently strong across the board.<\/p>\n\n\n\n<h3 class=\"wp-block-heading cfs-article-inner-heading has-medium-font-size\" id=\"h-don-t-try-to-do-everything-yourself\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Don\u2019t try to do everything yourself<\/h3>\n\n\n\n<p id=\"h-assume-you-are-a-target-no-matter-your-size-building-a-fully-in-house-security-capability-is-resource-intensive-and-for-many-msps-it-s-simply-not-viable-to-cover-every-discipline-internally-skills-are-scarce-costs-are-high-and-the-threat-landscape-evolves-too-quickly-to-manage-in-isolation-strategic-partnerships-are-what-make-modern-security-delivery-possible-the-right-vendors-and-specialist-providers-allow-you-to-extend-your-capabilities-while-maintaining-focus-and-efficiency-however-those-partnerships-need-to-be-grounded-in-transparency-you-need-to-understand-exactly-what-each-solution-delivers-where-its-limitations-lie-and-how-it-fits-into-your-broader-stack-when-that-alignment-is-right-you-can-deliver-something-far-more-valuable-than-any-single-tool-a-layered-realistic-and-scalable-security-model-that-your-clients-can-depend-on\">Building a fully in-house security capability is resource-intensive, and for many MSPs it\u2019s simply not viable to cover every discipline internally. Skills are scarce, costs are high, and the threat landscape evolves too quickly to manage in isolation.<br><br>Strategic partnerships are what make modern security delivery possible. The right vendors and specialist providers allow you to extend your capabilities while maintaining focus and efficiency.<br><br>However, those partnerships need to be grounded in transparency. You need to understand exactly what each solution delivers, where its limitations lie, and how it fits into your broader stack.<br><br>When that alignment is right, you can deliver something far more valuable than any single tool\u2014a layered, realistic, and scalable security model that your clients can depend on.<\/p>\n\n\n\n<h2 class=\"wp-block-heading cfs-article-heading has-x-large-font-size\" id=\"h-join-the-conversation-at-msp-global-2026\" style=\"font-style:normal;font-weight:600;line-height:1.3\">Join the conversation at MSP Global 2026<\/h2>\n\n\n\n<p>At MSP GLOBAL 2026, MSP leaders, vendors, and security experts will once again come together to explore the biggest opportunities and challenges facing the channel.<\/p>\n\n\n\n<p>If cybersecurity, AI, Cloud platforms, and new service models are reshaping your business, this is where the next ideas\u2014and partnerships\u2014 begin.<\/p>\n\n\n\n<p><strong>Register now to be part of the next MSP GLOBAL\u2014just sign up for the newsletter to get your free code.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How much of cybersecurity today is real protection, and how much is marketing hype? This is a question that MSPs and their clients wrestle with every day. Luckily, MSP GLOBAL brought together three tell-it-like-it-is experts to look at the realities and share their advice and best practice list. This latest episode of Spill the I-Tea\u2014the [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":13079,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"mark_post_sync":false,"footnotes":""},"categories":[1514],"tags":[],"class_list":["post-13078","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interviews"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Spill the IT Podcast: Cybersecurity Best Practices for MSPs (Video)<\/title>\n<meta name=\"description\" content=\"Expert video discussion on cybersecurity hype, layered defense, and vendor transparency, tailored for Managed Service Providers (MSPs).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spill the I-Tea Podcast: Cybersecurity Best Practices for MSPs (Video)\" \/>\n<meta property=\"og:description\" content=\"Spill the I-Tea Podcast: Cybersecurity Best Practices for MSPs (Video)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/\" \/>\n<meta property=\"og:site_name\" content=\"MSP GLOBAL BLOG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100089083200946\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-16T10:09:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T10:18:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-04-16-at-11.06.51.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1057\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Miles Kendall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MSPglobalevent\" \/>\n<meta name=\"twitter:site\" content=\"@MSPglobalevent\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miles Kendall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/\"},\"author\":{\"name\":\"Miles Kendall\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/person\\\/3e9bed029b316efa7a58f3f21d3c2845\"},\"headline\":\"Spill the I-Tea Podcast: Cybersecurity Best Practices for MSPs (Video)\",\"datePublished\":\"2026-04-16T10:09:49+00:00\",\"dateModified\":\"2026-04-16T10:18:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/\"},\"wordCount\":918,\"publisher\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Screenshot-2026-04-16-at-11.06.51.png\",\"articleSection\":[\"Interviews\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/\",\"name\":\"Spill the IT Podcast: Cybersecurity Best Practices for MSPs (Video)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Screenshot-2026-04-16-at-11.06.51.png\",\"datePublished\":\"2026-04-16T10:09:49+00:00\",\"dateModified\":\"2026-04-16T10:18:25+00:00\",\"description\":\"Expert video discussion on cybersecurity hype, layered defense, and vendor transparency, tailored for Managed Service Providers (MSPs).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Screenshot-2026-04-16-at-11.06.51.png\",\"contentUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/Screenshot-2026-04-16-at-11.06.51.png\",\"width\":1057,\"height\":534,\"caption\":\"Spill the I-Tea Episode 3\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/cybersecurity-best-practices-msp-global\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interviews\",\"item\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/category\\\/interviews\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Spill the I-Tea Podcast: Cybersecurity Best Practices for MSPs (Video)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/\",\"name\":\"MSP INSIGHTS - The MSP GLOBAL Blog\",\"description\":\"The latest news for MSPs and Tech Experts.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#organization\",\"name\":\"MSP GLOBAL\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/MSP-GLOBAL-BLOG.svg\",\"contentUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/MSP-GLOBAL-BLOG.svg\",\"width\":536,\"height\":63,\"caption\":\"MSP GLOBAL\"},\"image\":{\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=100089083200946\",\"https:\\\/\\\/x.com\\\/MSPglobalevent\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mspglobalevent\\\/\",\"https:\\\/\\\/www.instagram.com\\\/mspglobalevent\\\/\"],\"ownershipFundingInfo\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/imprint\\\/\",\"actionableFeedbackPolicy\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/imprint\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/#\\\/schema\\\/person\\\/3e9bed029b316efa7a58f3f21d3c2845\",\"name\":\"Miles Kendall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/miles-kendall-96x96.jpeg\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/miles-kendall-96x96.jpeg\",\"contentUrl\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/wp-content\\\/uploads\\\/miles-kendall-96x96.jpeg\",\"caption\":\"Miles Kendall\"},\"description\":\"Miles is a highly experienced communications and technology expert, with a track record of delivering high performing content for a range of B2B clients across a variety of sectors. As part of the senior writing team at CloudFest he\u2019s responsible for highlighting key trends, teasing out thought leadership and delivering original insight \u2013 utilizing his background in journalism and content strategy.\",\"url\":\"https:\\\/\\\/mspglobal.com\\\/blog\\\/author\\\/miles-kendall\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Spill the IT Podcast: Cybersecurity Best Practices for MSPs (Video)","description":"Expert video discussion on cybersecurity hype, layered defense, and vendor transparency, tailored for Managed Service Providers (MSPs).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/","og_locale":"en_US","og_type":"article","og_title":"Spill the I-Tea Podcast: Cybersecurity Best Practices for MSPs (Video)","og_description":"Spill the I-Tea Podcast: Cybersecurity Best Practices for MSPs (Video)","og_url":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/","og_site_name":"MSP GLOBAL BLOG","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100089083200946","article_published_time":"2026-04-16T10:09:49+00:00","article_modified_time":"2026-04-16T10:18:25+00:00","og_image":[{"width":1057,"height":534,"url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-04-16-at-11.06.51.png","type":"image\/png"}],"author":"Miles Kendall","twitter_card":"summary_large_image","twitter_creator":"@MSPglobalevent","twitter_site":"@MSPglobalevent","twitter_misc":{"Written by":"Miles Kendall","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/#article","isPartOf":{"@id":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/"},"author":{"name":"Miles Kendall","@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/person\/3e9bed029b316efa7a58f3f21d3c2845"},"headline":"Spill the I-Tea Podcast: Cybersecurity Best Practices for MSPs (Video)","datePublished":"2026-04-16T10:09:49+00:00","dateModified":"2026-04-16T10:18:25+00:00","mainEntityOfPage":{"@id":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/"},"wordCount":918,"publisher":{"@id":"https:\/\/mspglobal.com\/blog\/#organization"},"image":{"@id":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/#primaryimage"},"thumbnailUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-04-16-at-11.06.51.png","articleSection":["Interviews"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/","url":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/","name":"Spill the IT Podcast: Cybersecurity Best Practices for MSPs (Video)","isPartOf":{"@id":"https:\/\/mspglobal.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/#primaryimage"},"image":{"@id":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/#primaryimage"},"thumbnailUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-04-16-at-11.06.51.png","datePublished":"2026-04-16T10:09:49+00:00","dateModified":"2026-04-16T10:18:25+00:00","description":"Expert video discussion on cybersecurity hype, layered defense, and vendor transparency, tailored for Managed Service Providers (MSPs).","breadcrumb":{"@id":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/#primaryimage","url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-04-16-at-11.06.51.png","contentUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/Screenshot-2026-04-16-at-11.06.51.png","width":1057,"height":534,"caption":"Spill the I-Tea Episode 3"},{"@type":"BreadcrumbList","@id":"https:\/\/mspglobal.com\/blog\/cybersecurity-best-practices-msp-global\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mspglobal.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Interviews","item":"https:\/\/mspglobal.com\/blog\/category\/interviews\/"},{"@type":"ListItem","position":3,"name":"Spill the I-Tea Podcast: Cybersecurity Best Practices for MSPs (Video)"}]},{"@type":"WebSite","@id":"https:\/\/mspglobal.com\/blog\/#website","url":"https:\/\/mspglobal.com\/blog\/","name":"MSP INSIGHTS - The MSP GLOBAL Blog","description":"The latest news for MSPs and Tech Experts.","publisher":{"@id":"https:\/\/mspglobal.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mspglobal.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mspglobal.com\/blog\/#organization","name":"MSP GLOBAL","url":"https:\/\/mspglobal.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/MSP-GLOBAL-BLOG.svg","contentUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/MSP-GLOBAL-BLOG.svg","width":536,"height":63,"caption":"MSP GLOBAL"},"image":{"@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=100089083200946","https:\/\/x.com\/MSPglobalevent","https:\/\/www.linkedin.com\/company\/mspglobalevent\/","https:\/\/www.instagram.com\/mspglobalevent\/"],"ownershipFundingInfo":"https:\/\/mspglobal.com\/blog\/imprint\/","actionableFeedbackPolicy":"https:\/\/mspglobal.com\/blog\/imprint\/"},{"@type":"Person","@id":"https:\/\/mspglobal.com\/blog\/#\/schema\/person\/3e9bed029b316efa7a58f3f21d3c2845","name":"Miles Kendall","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/miles-kendall-96x96.jpeg","url":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/miles-kendall-96x96.jpeg","contentUrl":"https:\/\/mspglobal.com\/blog\/wp-content\/uploads\/miles-kendall-96x96.jpeg","caption":"Miles Kendall"},"description":"Miles is a highly experienced communications and technology expert, with a track record of delivering high performing content for a range of B2B clients across a variety of sectors. As part of the senior writing team at CloudFest he\u2019s responsible for highlighting key trends, teasing out thought leadership and delivering original insight \u2013 utilizing his background in journalism and content strategy.","url":"https:\/\/mspglobal.com\/blog\/author\/miles-kendall\/"}]}},"_links":{"self":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts\/13078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/comments?post=13078"}],"version-history":[{"count":4,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts\/13078\/revisions"}],"predecessor-version":[{"id":13085,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/posts\/13078\/revisions\/13085"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/media\/13079"}],"wp:attachment":[{"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/media?parent=13078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/categories?post=13078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mspglobal.com\/blog\/wp-json\/wp\/v2\/tags?post=13078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}