Channel Insider sought nominations from IT vendors, solution providers, and partners to highlight impactful collaborations. Check out our top choices here.
Channel Insider sought nominations from IT vendors, solution providers, and partners to highlight impactful collaborations. Check out our top choices here.
Channel Insider content and product recommendations are
editorially independent. We may make money when you click on links
to our partners.
Learn More
In a special, two-part bonus episode of Channel Insider: Partner POV, host Katie Bavoso sat down with Cody Kretzinger, Principal Security Advisor at Galactic Advisors and former LulzSec hacker, to discuss the latest developments — and heightened risks — in cybersecurity heading into 2024.
Kretzinger’s experience on both sides of the cybersecurity battlefield allowed him to provide a unique perspective on the current threat landscape and how managed service providers (MSPs) and managed security service providers (MSSPs) can stay ahead of the game in 2024.
How cybersecurity is like the “golden age of piracy”
In Part 1 of the interview, Kretzinger shared insights into the escalating threat of ransomware attacks — particularly those targeting healthcare facilities.
He emphasized the urgency for organizations to fortify their defenses as threat actors increasingly disregard previous “gentlemen’s agreements” that protected healthcare facilities, critical infrastructure, and other public services — leading to disruptive consequences for patient care and organizational operations.
Listen to the Part 1 of the podcast:
Watch the Part 1 video:
Teen hackers are throwing out all the rules
The emergence of younger cybercriminals, exemplified by groups like Scattered Spider, presents a new challenge for cybersecurity professionals. Kretzinger described the recruitment process targeting teenagers through online gaming platforms and the blend of digital and physical tactics employed by these youth-driven entities.
“There are specific cases where they’ve actually assaulted individuals in order to get passwords or other sensitive information that they then can leverage in a cybercrime attack,” Kretzinger said. “There’s not too many threat actors outside of nation-states that are willing to go quite that far.”
So, how can organizations protect themselves?
Proactive vulnerability management and continuous monitoring, to start. Kretzinger underscored the importance of keeping systems up-to-date and patching vulnerabilities promptly, citing recent disclosures of critical SSL vulnerabilities in networking appliances.
Zero trust remains one of the best cyberattacker deterrents
The adoption of zero trust principles is another key strategy for organizations to bolster their security posture. By distributing security controls across every asset within an organization, Zero Trust mitigates the impact of potential breaches and fortifies overall resilience against cyber threats.
Security researchers and malicious hackers alike are “constantly hammering away at [firewall] systems because it allows them that first step into a network,” Kretzinger explained. “That really highlights the need for the adoption of the kind of the zero trust network that everybody has been talking about.”
Why?
“Because the reliance on that [firewall] appliance to do all of the work to totally protect the organization is now distributed amongst every asset within an organization — every endpoint, every network device, every IoT device, as long as they’re all following zero trust — it makes it incredibly more difficult for the bad guys to compromise the entire organization.”
Advertisement
Risks of ransomware in healthcare, and the emergence of AI
In the second part of this Partner POV bonus episode, Kretzinger highlighted the challenging timeline for detecting ransomware attacks, emphasizing the importance of robust cybersecurity hygiene. He explained how threat actors exploit vulnerabilities and move laterally within networks, often remaining undetected for extended periods before deploying ransomware.
Listen to Part 2 of the podcast:
Watch the Part 2 video:
The dangers of ‘just OK’ security
Reflecting on recent ransomware attacks in the healthcare sector, which cost the industry billions of dollars, Kretzinger underscores the critical need for comprehensive security measures.
“What most organizations have,” Kretzinger warned, “is ‘OK’ cybersecurity hygiene. And when you have OK cybersecurity hygiene, you have OK security tools, which means you have OK policies and procedures, which means everything’s just OK. So when you have ‘just OK’ everything, it can take some time in order to not only detect [an attack], but also see what’s going on and maybe who it was from.”
Kretzinger recommends a proactive approach, combining tools like endpoint detection and response (EDR), extended detection and response (XDR), and managed detection and response (MDR) with thorough monitoring and response capabilities, in order to stay on top of any suspicious activity at any level of your networks.
Managing data — and clients — in the AI era
Addressing concerns surrounding emerging AI technologies like Microsoft Copilot, Kretzinger stressed the significance of data classification and sensitivity labels to safeguard sensitive information. He cautioned against complacency and advocated for proactive risk mitigation strategies.
When it comes to addressing these issues for clients, Kretzinger identified “two components” of being a trusted advisor as an MSP: “The first one is being able to identify risk and the second component is to be able to communicate risk.” Kretzinger gave a common example: employees reusing their passwords.
“That is a shared risk,” he said, “a common risk. But you need to be able to talk about it in such a way that it’s a risk to the business — not a risk to the end user, not a risk to the data, but a risk to the organization. When we’re communicating the risk back to business owners, we have to do it in such a way that they understand what we’re talking about.”
Finally, Kretzinger outlined a few practical steps for solution providers to expand their client base and enhance their cybersecurity posture. First, he recommends leveraging cybersecurity incidents as learning opportunities; second, preparing clients for inevitable breaches; and third, emphasizing the value of administrative controls such as acceptable use policies and incident response policies to better enforce employee compliance.
Advertisement
Get informed and get involved
In closing, Kretzinger invited viewers and listeners to connect with Galactic Advisors, where he serves as an executive director, and encouraged involvement with the Illinois Cyber Foundation.
In addition to inviting viewers and listeners to connect with Galactic Advisors for more tailored guidance on their organization’s security hygiene, Kretzinger highlighted the work of the Illinois Cyber Foundation, where he serves as executive director. The Illinois Cyber Foundation is a nonprofit organization dedicated to educating youth, the elderly, and other vulnerable individuals on the scams they may encounter online, and empowering them with the skills, resources, and mentorship they need to thrive in today’s cyberthreat landscape.
To engage with Cody Kretzinger and explore more insights on cybersecurity, connect with him on LinkedIn. Don’t miss upcoming episodes of Channel Insider: Partner POV on YouTube or your podcasting platform of choice for more industry insights and expert interviews. Like, follow, and subscribe to stay informed!
Featured Partners: Managed Service Provider (MSP) Software
We are able to offer our services for free because some vendors may pay us for web traffic or other sales opportunities. Our mission is to help technology buyers make better purchasing decisions, so we provide you with information for all vendors — even those that don't pay us.
Jacob Edson is Managing Editor of Channel Insider. He has over 6 years of experience connecting audiences to the best B2B tech brands through informative, engaging content that provides direct, actionable advice and helps IT decision makers, small business owners, and end users make the best purchasing decisions for their business needs.
Discover how Eaton’s White Space Team and Power Advantage Partner Program help channel partners optimize AI-ready data centers and unlock new business opportunities.
A fast-paced editorial recap of Q2 2025 in the IT channel covering leadership shakeups at Kaseya, layoffs at Intel, federal obstacles pausing major acquisitions, AI adoption slowdowns, quantum security threats, evolving partner programs, and global economic tensions. A fast-paced editorial recap of Q2 2025 in the IT channel covering leadership shakeups at Kaseya, layoffs at Intel, federal obstacles pausing major acquisitions, AI adoption slowdowns, quantum security threats, evolving partner programs, and global economic tensions.
Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.
Advertiser Disclosure: Some of the products that appear on
this site are from companies from which TechnologyAdvice
receives compensation. This compensation may impact how and
where products appear on this site including, for example,
the order in which they appear. TechnologyAdvice does not
include all companies or all types of products available in
the marketplace.