<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Minnesota Risk Advisory</title><link>https://mnrisk.com/</link><description>Recent content on Minnesota Risk Advisory</description><generator>Hugo</generator><language>en-us</language><copyright/><lastBuildDate>Mon, 06 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://mnrisk.com/index.xml" rel="self" type="application/rss+xml"/><item><title>When April Fools Becomes a Security Risk</title><link>https://mnrisk.com/posts/cyber-april-first/</link><pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/cyber-april-first/</guid><description><![CDATA[<p>Every year on April 1st, the internet fills up with jokes, fake announcements, and pranks. Most of it is harmless.</p>
<p>But in cybersecurity, April Fools creates a very real problem:</p>
<blockquote>
<p>It becomes harder to tell what’s real—and what’s not.</p>
</blockquote>
<p>And that hesitation can be costly.</p>
<hr>

<h2 id="real-incidents-bad-timing" data-numberify>Real Incidents, Bad Timing<a class="anchor ms-1" href="#real-incidents-bad-timing"></a></h2>
<p>In 2026, multiple legitimate cybersecurity events happened right on April 1st.</p>
<ul>
<li>A major crypto platform was hacked, losing hundreds of millions of dollars</li>
<li>A large company disclosed a real cyber incident affecting its systems</li>
</ul>
<p>In both cases, early reactions were mixed:</p>]]></description><enclosure url="https://mnrisk.com/images/posts/cyber-april-first.webp" length="127642" type="image/.webp"/></item><item><title>Is My MSP/MSSP enough?</title><link>https://mnrisk.com/posts/is-my-msp-enough/</link><pubDate>Thu, 26 Mar 2026 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/is-my-msp-enough/</guid><description><![CDATA[<h1 id="do-i-need-a-vciso-or-is-my-msp-enough" data-numberify>Do I Need a vCISO or Is My MSP Enough?<a class="anchor ms-1" href="#do-i-need-a-vciso-or-is-my-msp-enough"></a></h1>
<p>If you’re a small or mid-sized business, you’ve probably asked a version of this question:</p>
<p><strong>“We already have an IT provider… aren’t they handling security?”</strong></p>
<p>It’s a fair question—and the answer is:</p>
<blockquote>
<p>Your MSP is essential. But they’re not designed to own your security strategy.</p>
</blockquote>

<h2 id="what-your-msp-does-well" data-numberify>What Your MSP Does Well<a class="anchor ms-1" href="#what-your-msp-does-well"></a></h2>
<p>Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) are critical partners. They:</p>]]></description><enclosure url="https://mnrisk.com/images/posts/ismymspenough.webp" length="162228" type="image/.webp"/></item><item><title>Why engage a vCISO?</title><link>https://mnrisk.com/posts/vciso-overview/</link><pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/vciso-overview/</guid><description><![CDATA[<h1 id="why-small-and-mid-sized-businesses-should-consider-a-vciso" data-numberify>Why Small and Mid-Sized Businesses Should Consider a vCISO<a class="anchor ms-1" href="#why-small-and-mid-sized-businesses-should-consider-a-vciso"></a></h1>
<p>If you run a small or mid-sized business, you’ve probably asked yourself a version of this question:</p>
<p><strong>“Do we really need a CISO?”</strong></p>
<p>The honest answer is:<br>
You need what a CISO <em>does</em>—not necessarily the full-time salary that comes with one.</p>
<p>That’s where a vCISO (virtual Chief Information Security Officer) comes in.</p>
<hr>

<h2 id="security-is-about-maturity-not-magic" data-numberify>Security Is About Maturity, Not Magic<a class="anchor ms-1" href="#security-is-about-maturity-not-magic"></a></h2>
<p>Let’s start with a reality check.</p>]]></description><enclosure url="https://mnrisk.com/images/posts/vCISO.webp" length="352792" type="image/.webp"/></item><item><title>How Do I Recover From Ransomware?</title><link>https://mnrisk.com/posts/ransomware/</link><pubDate>Sun, 22 Mar 2026 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/ransomware/</guid><description><![CDATA[<h1 id="why-modern-backup-strategy-matters-3-2-1-1" data-numberify>Why Modern Backup Strategy Matters (3-2-1-1)<a class="anchor ms-1" href="#why-modern-backup-strategy-matters-3-2-1-1"></a></h1>
<p>A friend of mine works in IT consulting, mostly on the operational side of things. He was recently called in by a potential client who had started seeing some concerning messages on their computer—clear warning signs that something wasn’t right.</p>
<p>He advised the client to slow down, investigate, and address the issue properly.</p>
<p>The client chose a different path.</p>
<p>They prioritized getting the business back up and running as quickly as possible.</p>]]></description><enclosure url="https://mnrisk.com/images/posts/ransomware.webp" length="127132" type="image/.webp"/></item><item><title>Where Should a Small Business Start With Cybersecurity?</title><link>https://mnrisk.com/posts/where-do-i-start/</link><pubDate>Mon, 09 Mar 2026 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/where-do-i-start/</guid><description><![CDATA[<p>If you&rsquo;re a small or medium-sized business owner, cybersecurity can feel overwhelming.</p>
<p>You hear about things like <strong>NIST frameworks</strong>, <strong>ISO certifications</strong>, <strong>SOC 2 audits</strong>, and the <strong>OWASP Top 10</strong>, and it quickly starts to sound like something only giant corporations can afford to worry about.</p>
<p>The truth is much simpler.</p>
<p>You don’t need to start with a 400-page framework or hire a team of security engineers. Most small businesses can dramatically improve their security posture by focusing on a handful of practical controls.</p>
<p>Before worrying about compliance frameworks or certifications, start with the fundamentals.</p>]]></description><enclosure url="https://mnrisk.com/images/posts/frustrated-business-owner-security.webp" length="140646" type="image/.webp"/></item><item><title>Understanding the NIST Cybersecurity Framework: A Practical Guide for Small Businesses</title><link>https://mnrisk.com/posts/nist-csf-explained-smb/</link><pubDate>Sat, 07 Mar 2026 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/nist-csf-explained-smb/</guid><description><![CDATA[<p>If you start researching cybersecurity for your business, you will eventually encounter the <strong>NIST Cybersecurity Framework (CSF)</strong>.</p>
<p>At first glance, it can feel intimidating. It includes dozens of categories, references hundreds of controls, and is widely used by government agencies and large enterprises.</p>
<p>But the core idea behind the framework is actually very simple.</p>
<p>The <strong>NIST Cybersecurity Framework</strong> organizes cybersecurity into six major functions that describe the lifecycle of managing cyber risk.</p>]]></description><enclosure url="https://mnrisk.com/images/posts/NIST_600x400.webp" length="2378" type="image/.webp"/></item><item><title>What Happens During a Cybersecurity Review?</title><link>https://mnrisk.com/posts/cybersecurity-review/</link><pubDate>Fri, 06 Mar 2026 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/cybersecurity-review/</guid><description><![CDATA[<p>Cybersecurity can feel overwhelming. There are thousands of tools, vendors, and security products, and it is not always clear where organizations should focus their efforts.</p>
<p>A cybersecurity review helps organizations step back and evaluate whether their current security posture is addressing the most important risks.</p>

<h2 id="understanding-risk-exposure" data-numberify>Understanding Risk Exposure<a class="anchor ms-1" href="#understanding-risk-exposure"></a></h2>
<p>The review begins with understanding the organization&rsquo;s risk profile.</p>
<p>Important questions include:</p>
<ul>
<li>What types of data does the organization store?</li>
<li>What systems are critical to operations?</li>
<li>What would the impact of downtime or data loss be?</li>
</ul>
<p>Security priorities should be driven by business risk.</p>]]></description><enclosure url="https://mnrisk.com/images/posts/cybersecurity-review.webp" length="137492" type="image/.webp"/></item><item><title>Technology and Cybersecurity Reviews for Small and Mid-Sized Businesses in Hutchinson, Minnesota</title><link>https://mnrisk.com/posts/my-first-post/</link><pubDate>Thu, 05 Mar 2026 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/my-first-post/</guid><description><![CDATA[<p>Many organizations today rely on Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) to operate their technology and security environments. These providers are essential partners, and they play a critical role in keeping systems running and protecting businesses from threats.</p>
<p>However, many companies still struggle with an important question:</p>
<p><strong>Are we investing in the right technology and security priorities?</strong></p>
<p>That’s where an independent technology and cybersecurity review can help.</p>]]></description><enclosure url="https://mnrisk.com/images/posts/Hutchinson_MN.webp" length="400174" type="image/.webp"/></item><item><title>How Email Security Actually Works: API vs SEG vs Inline Solutions</title><link>https://mnrisk.com/posts/email-security-tools/</link><pubDate>Sun, 01 Feb 2026 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/email-security-tools/</guid><description><![CDATA[<p>Email is still the #1 attack vector for most businesses.</p>
<p>But when you start looking at email security products, it gets confusing fast:</p>
<ul>
<li>API-based tools</li>
<li>Inline / journaling solutions</li>
<li>Secure Email Gateways (SEG)</li>
</ul>
<p>They all “protect email”… but they work very differently.</p>
<p>Understanding that difference is more important than the product you choose.</p>
<hr>

<h2 id="the-three-main-types-of-email-security" data-numberify>The Three Main Types of Email Security<a class="anchor ms-1" href="#the-three-main-types-of-email-security"></a></h2>
<p>There are three primary architectures:</p>
<ol>
<li>API-based email security</li>
<li>Inline / journaling (hybrid API)</li>
<li>Secure Email Gateways (SEG / MX-based)</li>
</ol>
<p>Let’s break them down.</p>]]></description><enclosure url="https://mnrisk.com/images/posts/email-security-tools.webp" length="142704" type="image/.webp"/></item><item><title>What’s the Difference Between Antivirus, Malwarebytes, EDR, and XDR?</title><link>https://mnrisk.com/posts/antivirus-edr-xdr/</link><pubDate>Thu, 01 Jan 2026 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/antivirus-edr-xdr/</guid><description><![CDATA[<p>If you’ve looked into cybersecurity tools recently, you’ve probably seen terms like antivirus (AV), Malwarebytes, EDR, and XDR.</p>
<p>They all “protect your systems”… but they’re not the same thing.</p>
<p>Here’s a simple way to understand the differences—and how they fit together.</p>
<hr>

<h2 id="antivirus-av-the-basics" data-numberify>Antivirus (AV): The Basics<a class="anchor ms-1" href="#antivirus-av-the-basics"></a></h2>
<p>Antivirus is the traditional security tool most people are familiar with.</p>
<p>It focuses on:</p>
<ul>
<li>detecting known malware</li>
<li>blocking viruses and basic threats</li>
<li>scanning files and downloads</li>
</ul>
<p><strong>Examples:</strong></p>]]></description><enclosure url="https://mnrisk.com/images/posts/av-edr-xdr.webp" length="65090" type="image/.webp"/></item><item><title>What Does Cyber Insurance Actually Cover?</title><link>https://mnrisk.com/posts/cyberinsurance/</link><pubDate>Mon, 01 Dec 2025 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/cyberinsurance/</guid><description><![CDATA[<p>Cyber insurance is becoming more common for small and mid-sized businesses.</p>
<p>But most business owners don’t really understand:</p>
<ul>
<li>what it covers</li>
<li>what it doesn’t</li>
<li>and what it requires from them</li>
</ul>
<p>That can become a problem when you actually need to use it.</p>
<hr>

<h2 id="what-cyber-insurance-typically-covers" data-numberify>What Cyber Insurance Typically Covers<a class="anchor ms-1" href="#what-cyber-insurance-typically-covers"></a></h2>
<p>Most cyber insurance policies are designed to help after a security incident.</p>
<p>That can include:</p>
<ul>
<li>Incident response (forensics, investigation)</li>
<li>Legal costs</li>
<li>Notification requirements (if customer data is involved)</li>
<li>Business interruption (lost revenue during downtime)</li>
<li>Ransomware payments (in some cases)</li>
</ul>
<p>In short:</p>]]></description><enclosure url="https://mnrisk.com/images/posts/cyberinsurance.webp" length="149318" type="image/.webp"/></item><item><title>Common Cybersecurity Threats Small Businesses Face</title><link>https://mnrisk.com/posts/smb-threats/</link><pubDate>Sat, 01 Nov 2025 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/smb-threats/</guid><description><![CDATA[<p>When people think about cybersecurity threats, they often picture large companies being targeted by sophisticated attackers.</p>
<p>In reality, small and mid-sized businesses are often easier targets.</p>
<p>Not because they’re more valuable—but because they’re easier to break into.</p>
<p>Here are some of the most common threats SMBs face today.</p>
<hr>

<h2 id="1-phishing-emails" data-numberify>1. Phishing Emails<a class="anchor ms-1" href="#1-phishing-emails"></a></h2>
<p>Phishing is still the most common way attackers get in.</p>
<p>These emails are designed to:</p>
<ul>
<li>trick users into clicking a link</li>
<li>steal login credentials</li>
<li>install malware</li>
</ul>
<p>They often look like:</p>]]></description><enclosure url="https://mnrisk.com/images/posts/SMB-threats.webp" length="146304" type="image/.webp"/></item><item><title>How to Spot a Phishing Email</title><link>https://mnrisk.com/posts/phishing/</link><pubDate>Wed, 01 Oct 2025 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/phishing/</guid><description><![CDATA[<p>Phishing emails are one of the most common ways attackers get into a business.</p>
<p>They don’t rely on hacking systems—they rely on tricking people.</p>
<p>The good news is most phishing emails have warning signs.</p>
<p>You just need to know what to look for.</p>
<hr>

<h2 id="what-is-a-phishing-email" data-numberify>What Is a Phishing Email?<a class="anchor ms-1" href="#what-is-a-phishing-email"></a></h2>
<p>A phishing email is designed to:</p>
<ul>
<li>trick you into clicking a link</li>
<li>get you to enter your password</li>
<li>or convince you to take an action (like sending money)</li>
</ul>
<p>They often pretend to be:</p>]]></description><enclosure url="https://mnrisk.com/images/posts/phishing.webp" length="118614" type="image/.webp"/></item><item><title>How Attackers Bypass MFA (and How to Stop Them)</title><link>https://mnrisk.com/posts/attacking-mfa/</link><pubDate>Sat, 13 Sep 2025 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/attacking-mfa/</guid><description><![CDATA[<p>Multi-factor authentication (MFA) is one of the best protections you can put in place.</p>
<p>But it’s not perfect.</p>
<p>Attackers know this—and they’ve adapted.</p>
<p>Understanding how MFA gets bypassed is key to making sure it actually protects your business.</p>
<hr>

<h2 id="wait-i-thought-mfa-was-secure" data-numberify>Wait… I Thought MFA Was Secure?<a class="anchor ms-1" href="#wait-i-thought-mfa-was-secure"></a></h2>
<p>It is.</p>
<p>MFA stops a huge percentage of basic attacks.</p>
<p>But attackers don’t try to “break” MFA directly.</p>
<p>Instead, they:</p>
<ul>
<li>trick users</li>
<li>steal sessions</li>
<li>or exploit weak configurations</li>
</ul>
<blockquote>
<p>Most MFA bypasses are not technical—they’re behavioral.</p>]]></description><enclosure url="https://mnrisk.com/images/posts/bypassing-mfa.webp" length="120474" type="image/.webp"/></item><item><title>What Is MFA and Why Does Your Business Need It?</title><link>https://mnrisk.com/posts/mfa/</link><pubDate>Mon, 01 Sep 2025 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/mfa/</guid><description><![CDATA[<p>Multi-factor authentication (MFA) is one of the simplest and most effective ways to protect your business.</p>
<p>But it’s also one of the most misunderstood.</p>
<p>Most people know they “should have it,” but don’t fully understand what it does—or why it matters.</p>
<hr>

<h2 id="what-is-mfa" data-numberify>What Is MFA?<a class="anchor ms-1" href="#what-is-mfa"></a></h2>
<p>MFA stands for <strong>multi-factor authentication</strong>.</p>
<p>It means you need more than just a password to log in.</p>
<p>Instead of only entering a password, you also need something else, such as:</p>]]></description><enclosure url="https://mnrisk.com/images/posts/MFA.webp" length="115018" type="image/.webp"/></item><item><title>Cybersecurity vs IT Support — What’s the Difference?</title><link>https://mnrisk.com/posts/cybervsitsupport/</link><pubDate>Fri, 01 Aug 2025 00:00:00 +0000</pubDate><guid>https://mnrisk.com/posts/cybervsitsupport/</guid><description><![CDATA[<p>Many small and mid-sized businesses rely on an IT provider to keep things running.</p>
<p>And for the most part, that works well.</p>
<p>But when it comes to cybersecurity, there’s often confusion about where IT support ends—and where security actually begins.</p>
<p>Understanding that difference is important.</p>
<hr>

<h2 id="what-is-it-support" data-numberify>What Is IT Support?<a class="anchor ms-1" href="#what-is-it-support"></a></h2>
<p>IT support (often provided by an MSP) focuses on keeping systems working.</p>
<p>That typically includes:</p>
<ul>
<li>Setting up computers and servers</li>
<li>Managing networks and WiFi</li>
<li>Installing and maintaining software</li>
<li>Help desk support (fixing issues when things break)</li>
<li>Managing backups and updates</li>
</ul>
<p>In simple terms:</p>]]></description><enclosure url="https://mnrisk.com/images/posts/cybervsit.webp" length="93100" type="image/.webp"/></item></channel></rss>