{"id":25574,"date":"2025-07-10T16:11:01","date_gmt":"2025-07-10T20:11:01","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=25574"},"modified":"2025-09-29T02:14:41","modified_gmt":"2025-09-29T06:14:41","slug":"msp-vendor-risk-management","status":"publish","type":"post","link":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/security\/msp-vendor-risk-management\/","title":{"rendered":"Ransomware isn\u2019t the only risk \u2014 why true cyber resilience starts with who you trust"},"content":{"rendered":"<p><em>Guest writer <a href=\"https:\/\/www.sherweb.com\/blog\/tag\/author-roddy-bergeron\/\">Roddy Bergeron<\/a>, Cybersecurity Technical Fellow, explores how Managed Service Providers (MSPs) can strengthen their vendor risk management strategies and build true cyber resilience. Learn how to protect your clients and your trust before the next threat tests your supply chain.<\/em><\/p>\n<p>Every MSP knows ransomware isn\u2019t going anywhere. It\u2019s evolved from a rare catastrophe to an everyday business risk \u2014 one that makes headlines when it lands at the top of the supply chain. We won\u2019t name names here, but the news cycle speaks for itself: even the biggest platforms can get locked down, partners can get stranded mid-transaction, and the silence that follows can cost more than any ransom note. It\u2019s not a matter of if, but when.<\/p>\n<p>We all brace for <a href=\"https:\/\/www.sherweb.com\/security\/\">security<\/a> incidents (like ransomware, leaked data, or credential theft), but what about the <strong>quiet assumptions<\/strong> we make about the people and companies we trust to protect us when it hits? That\u2019s where real resilience begins\u2026 and where too many businesses learn the hard way that a security stack isn\u2019t the same as a trust stack.<\/p>\n<h2><strong>The real test of resilience<\/strong><\/h2>\n<p>There\u2019s a reason I keep telling partners: resilience isn\u2019t just a firewall, a backup, or a patch cadence. Those things matter, but they\u2019re not the first line of defense when something breaks. Your people and your partners are.<\/p>\n<p>When a crisis strikes, you don\u2019t want a silent status page. You want clear communication, early honesty, and a partner that respects how your reputation rides on theirs. Any breach is an opportunity to learn \u2014 some lessons just cost more than others when the response leaves partners guessing.<\/p>\n<h2><strong>The blind spots no dashboard will flag<\/strong><\/h2>\n<p>Most threats that burn MSPs aren\u2019t new zero-days. They\u2019re assumptions that never got tested:<\/p>\n<ul>\n<li><em>\u201cWe assumed our supplier\u2019s <\/em><em>stack was bulletproof.\u201d<\/em><\/li>\n<li><em>\u201cWe assumed we\u2019d hear about a problem before our clients did.\u201d<\/em><\/li>\n<li><em>\u201cWe assumed our supply chain couldn\u2019t be our single point of failure.\u201d<\/em><\/li>\n<\/ul>\n<p>Too often, the cracks show up when the lights go out and you realize you don\u2019t have a plan B! That\u2019s why I always tell partners: the real test is simple: if your primary system goes dark today, what do you do tomorrow? Who do you call, and how fast can you pivot?<\/p>\n<h2><strong>Two big questions every MSP needs to revisit regularly.<\/strong><\/h2>\n<p>I hear the same two questions, every time MSPs want to tighten their resilience. They\u2019re simple but they\u2019ll save you more pain than any antivirus ever will.<\/p>\n<ol>\n<li>\n<h3><strong>How do I transact when the platform is down?<\/strong><\/h3>\n<p>For too many MSPs, a single pipeline feeds every piece of hardware, software, and licensing they deliver to clients. When that pipeline\u2019s frozen, your client commitments don\u2019t pause. They expect hardware to ship, licenses to activate, subscriptions to renew, and other downstream services to function. If you\u2019re relying on a single supply route, you\u2019re betting your revenue \u2014 and your reputation \u2014 on nothing going wrong. That\u2019s not resilience.<\/li>\n<li>\n<h3><strong> What does my vendor actually have access to?<\/strong><\/h3>\n<p>Here\u2019s the other blind spot: delegated access. Whether it\u2019s Office 365 GDAP permissions, admin consoles, or API keys, your vendors might have a direct line into you or your client environments. That access is there to help you work faster \u2014 until it isn\u2019t. If your vendor\u2019s compromised, could an attacker use that trust link to pivot deeper into your client tenants? It\u2019s a question too few MSPs want to test in real time.<\/li>\n<\/ol>\n<p>In my most recent Security Masterclass session in Toronto, I asked the room: \u201cWho knows exactly what permissions their vendors have inside their client tenants?\u201d Very few raised their hands. \u00a0It\u2019s simple: the more keys you hand out, the bigger the mess when one door gets kicked in. Vendor risk is a choice \u2014 you either manage it or you trust someone else to. Don\u2019t leave it to chance.<\/p>\n<p>Not sure where to start? I put together a simple <strong><a href=\"https:\/\/view.officeapps.live.com\/op\/view.aspx?src=https%3A%2F%2Fimages.sherweb.com%2Ftoolbox%2Fsecurity%2FVendorRiskQuestionnaire.xlsx&amp;wdOrigin=BROWSELINK\">vendor risk questionnaire<\/a> <\/strong>you can use as a baseline to check your suppliers, their access and their security maturity, and make sure you\u2019re covered. It\u2019s not about mistrust; it\u2019s about knowing exactly who holds your keys, how they protect them, and how they\u2019ll stand up when you need them to.<\/p>\n<h2><strong>So what should you do next?<\/strong><\/h2>\n<p>If you only take one thing away from this make it this: you can\u2019t patch trust gaps overnight. But you can tighten them with the same discipline you apply to your own internal stack.<\/p>\n<p>Here\u2019s where I tell every partner to start:<\/p>\n<p><strong><em>\u2713 <\/em>Run a vendor risk management checkup.<\/strong><br \/>\nIf you don\u2019t have one, build one. It\u2019s not complicated. List your critical suppliers, understand what they access, and map out what happens if they go offline tomorrow.<\/p>\n<p><strong><em>\u2713 <\/em>Review permissions regularly.<\/strong><br \/>\nCheck your delegated access \u2014 Office 365 GDAP is a big one for most MSPs. Remove accounts or roles you don\u2019t truly need. Rotate passwords and keys. Apply least privilege like you do internally.<\/p>\n<p><strong><em>\u2713 <\/em>Read your vendors\u2019 SOC reports and ask for proof.<\/strong><br \/>\nSOC 2 reports are table stakes now. But don\u2019t stop at the paperwork, ask how they handle incidents, how they communicate, and whether they test their own disaster recovery playbooks.<\/p>\n<p><strong><em>\u2713 <\/em>Plan your fallback.<\/strong><br \/>\nHow do you continue delivering if your vendor\u2019s system goes offline? Who do you call? What\u2019s your manual process? How do I revoke vendor access until the issue is over? A second source might cost a point or two on margin \u2014 until you need it. Then it saves the quarter.<\/p>\n<p><strong><em>\u2713 <\/em>Bring your clients into the conversation.<\/strong><br \/>\nYour clients don\u2019t care who your supplier is, but they do care if they can\u2019t get hardware, a new license, or support when they need it. Good partners explain the risks up front. Great ones show they have a plan when it counts.<\/p>\n<h2><strong>Trust is a practice, not a promise<\/strong><\/h2>\n<p>There\u2019s no perfect defense against ransomware. But there is a clear difference between partners who talk about resilience and partners who <em>live it<\/em>. Real trust shows up before the breach. It\u2019s in the questions you ask, the scenarios you test and the people you call when the system says <em>try again later<\/em>.<\/p>\n<h2><strong>Don\u2019t wait for the next headline<\/strong><\/h2>\n<p>Review your stack. Review your assumptions. Review your partnerships. Because the only thing more damaging than ransomware is a trust breach no patch can fix.<\/p>\n<p>We can\u2019t stop every breach. But we can improve our resilience and make sure trust isn\u2019t what gets compromised next.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guest writer Roddy Bergeron, Cybersecurity Technical Fellow, explores how Managed Service Provide","protected":false},"author":188,"featured_media":25575,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[1121,919,1127,1122,1128],"class_list":["post-25574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-author-roddy-bergeron","tag-cybersecurity","tag-msp-best-practices","tag-thought-leadership","tag-vendor-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MSP vendor risk management: Build trust before a breach | Sherweb<\/title>\n<meta name=\"description\" content=\"Ransomware is inevitable. MSP vendor risk management strengthens trust. Review GDAP access and protect clients before the next breach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MSP vendor risk management: Build trust before a breach | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Ransomware is inevitable. MSP vendor risk management strengthens trust. Review GDAP access and protect clients before the next breach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-10T20:11:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-29T06:14:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/CRN-Channel-Chiefs-2025-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roddy Bergeron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roddy Bergeron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/\"},\"author\":{\"name\":\"Roddy Bergeron\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"headline\":\"Ransomware isn\u2019t the only risk \u2014 why true cyber resilience starts with who you trust\",\"datePublished\":\"2025-07-10T20:11:01+00:00\",\"dateModified\":\"2025-09-29T06:14:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/\"},\"wordCount\":1125,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/CRN-Channel-Chiefs-2025-1200x480-1.jpg\",\"keywords\":[\"Author: Roddy Bergeron\",\"Cybersecurity\",\"MSP Best Practices\",\"Thought Leadership\",\"Vendor Risk Management\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/\",\"url\":\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/\",\"name\":\"MSP vendor risk management: Build trust before a breach | Sherweb\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/CRN-Channel-Chiefs-2025-1200x480-1.jpg\",\"datePublished\":\"2025-07-10T20:11:01+00:00\",\"dateModified\":\"2025-09-29T06:14:41+00:00\",\"author\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"description\":\"Ransomware is inevitable. MSP vendor risk management strengthens trust. Review GDAP access and protect clients before the next breach.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#primaryimage\",\"url\":\"\/blog\/wp-content\/uploads\/CRN-Channel-Chiefs-2025-1200x480-1.jpg\",\"contentUrl\":\"\/blog\/wp-content\/uploads\/CRN-Channel-Chiefs-2025-1200x480-1.jpg\",\"width\":2400,\"height\":920,\"caption\":\"MSP vendor risk management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sherweb.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/www.sherweb.com\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware isn\u2019t the only risk \u2014 why true cyber resilience starts with who you trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\",\"url\":\"https:\/\/www.sherweb.com\/blog\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795\",\"name\":\"Roddy Bergeron\",\"description\":\"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/roddy-bergeron-cissp-ccsp-csap-33432573\/\"],\"url\":\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/roddy-bergeron\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MSP vendor risk management: Build trust before a breach | Sherweb","description":"Ransomware is inevitable. MSP vendor risk management strengthens trust. Review GDAP access and protect clients before the next breach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/","og_locale":"en_US","og_type":"article","og_title":"MSP vendor risk management: Build trust before a breach | Sherweb","og_description":"Ransomware is inevitable. MSP vendor risk management strengthens trust. Review GDAP access and protect clients before the next breach.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2025-07-10T20:11:01+00:00","article_modified_time":"2025-09-29T06:14:41+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/CRN-Channel-Chiefs-2025-1200x480-1.jpg","type":"image\/jpeg"}],"author":"Roddy Bergeron","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"Roddy Bergeron","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/"},"author":{"name":"Roddy Bergeron","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"headline":"Ransomware isn\u2019t the only risk \u2014 why true cyber resilience starts with who you trust","datePublished":"2025-07-10T20:11:01+00:00","dateModified":"2025-09-29T06:14:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/"},"wordCount":1125,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/CRN-Channel-Chiefs-2025-1200x480-1.jpg","keywords":["Author: Roddy Bergeron","Cybersecurity","MSP Best Practices","Thought Leadership","Vendor Risk Management"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/","url":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/","name":"MSP vendor risk management: Build trust before a breach | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/CRN-Channel-Chiefs-2025-1200x480-1.jpg","datePublished":"2025-07-10T20:11:01+00:00","dateModified":"2025-09-29T06:14:41+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"description":"Ransomware is inevitable. MSP vendor risk management strengthens trust. Review GDAP access and protect clients before the next breach.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#primaryimage","url":"\/blog\/wp-content\/uploads\/CRN-Channel-Chiefs-2025-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/CRN-Channel-Chiefs-2025-1200x480-1.jpg","width":2400,"height":920,"caption":"MSP vendor risk management"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-vendor-risk-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Ransomware isn\u2019t the only risk \u2014 why true cyber resilience starts with who you trust"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795","name":"Roddy Bergeron","description":"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.","sameAs":["https:\/\/www.linkedin.com\/in\/roddy-bergeron-cissp-ccsp-csap-33432573\/"],"url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/roddy-bergeron\/"}]}},"tag_names":["Author: Roddy Bergeron","Cybersecurity","MSP Best Practices","Thought Leadership","Vendor Risk Management"],"_links":{"self":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/comments?post=25574"}],"version-history":[{"count":3,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25574\/revisions"}],"predecessor-version":[{"id":25583,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25574\/revisions\/25583"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media\/25575"}],"wp:attachment":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media?parent=25574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/categories?post=25574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/tags?post=25574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}