800-214-0957 info@blackbottleit.com
Cybersecurity for Managing Partners

Cybersecurity for Managing Partners

Cybersecurity for Managing Partners: Your Fiduciary Duty to Protect Client Data

As a managing partner, you’re responsible for more than just billable hours and client development. You bear the fiduciary duty to protect your firm from threats that could end careers, drain bank accounts, and destroy decades of reputation-building. Cybersecurity isn’t just an IT issue—it’s a risk management imperative that belongs on every managing partner’s desk.

The Threat Landscape Facing Law Firms Today

Law firms have become prime targets for cybercriminals, and the statistics are sobering. According to the ABA’s Legal Technology Survey, 29% of law firms experienced a security breach in the past year. Unlike other industries where hackers seek credit card numbers or personal data, attackers targeting law firms are after something far more valuable: privileged client information, M&A deal terms, litigation strategy, intellectual property, and wire transfer credentials.

Your firm holds the keys to the kingdom for your clients’ most sensitive matters. A single compromised email account can expose:

  • Confidential settlement negotiations worth millions
  • Upcoming merger announcements that could be used for insider trading
  • Trade secrets and patent applications
  • Attorney-client privileged communications
  • Trust account wire transfer access

The consequences extend beyond the immediate breach. Law firms face malpractice claims, bar discipline, loss of client trust, mandatory breach notifications, regulatory fines, and the devastating reputational damage that comes when clients learn their confidential information was compromised under your watch.

Your Ethical and Legal Obligations

Many managing partners don’t realize that cybersecurity is no longer optional—it’s an ethical requirement imposed by your state bar.

Model Rule 1.6(c) requires attorneys to “make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.” State bars and courts have consistently interpreted this to include implementing reasonable cybersecurity measures.

But what does “reasonable” actually mean? That’s where managing partners often struggle. The ambiguity has led to inconsistent approaches across firms, with some doing the bare minimum and others over-investing in unnecessary tools.

State bars have begun providing more specific guidance:

  • New York requires attorneys to complete cybersecurity CLE training annually
  • North Carolina has issued formal ethics opinions on cloud computing security and data breach response
  • California and Florida bars have published detailed guidance on encryption, secure communication, and vendor management

The trend is clear: bars expect more from firms regarding data protection, and “we didn’t know” is no longer an acceptable defense.

Beyond Bar Requirements: Client Demands

Even if ethical obligations seem vague, your clients are and will be increasingly specific about their security expectations! Law firms can and should routinely send detailed vendor security questionnaires to their outside counsel.

These cybersecurity assessments ask about:

  • Encryption standards for data at rest and in transit
  • Multi-factor authentication implementation
  • Incident response procedures and breach notification protocols
  • Employee security awareness training programs
  • Third-party vendor risk management
  • Business continuity and disaster recovery plans
  • Whether you maintain certifications like SOC 2 or ISO 27001

Firms that can’t demonstrate adequate security controls are losing opportunities.

Law firms can be removed from RFP shortlists solely because they couldn’t certify their security posture. In competitive markets, security has become a differentiator—not just a compliance checkbox.

Investing in Cybersecurity

Your clients trust you with their most sensitive matters. Your partners have built their careers on the firm’s reputation. Your staff depend on the firm’s stability for their livelihoods. Protecting all of that from cyber threats isn’t optional—it’s your fundamental duty as a managing partner.

The question isn’t whether you can afford to invest in cybersecurity. The question is whether you can afford not to.


Black Bottle IT helps law firms meet their ethical duty to protect client data without the cost of a full-time security team. We implement the cybersecurity standards your bar requires and your corporate clients demand—so you can focus on practicing law, not IT compliance.

Payroll Companies are a Lucrative Business for Hackers

Payroll Companies are a Lucrative Business for Hackers

Payroll Companies Remain Prime Targets for Cybercriminals

As we enter 2026, the cybersecurity landscape for accounting firms, payroll providers, and tax preparers has never been more complex—or more critical. With regulatory requirements tightening and threat actors growing more sophisticated, compliance is no longer just about checking boxes. It’s about building a cyber-resilient operation that protects your clients’ most sensitive data while keeping your business operational.

The FTC Safeguards Rule, state data privacy laws, and industry-specific compliance mandates continue to evolve, placing greater responsibility on financial services professionals to demonstrate robust security measures. Yet many firms still treat their Written Information Security Plan (WISP) as a document that sits on a shelf rather than a living, breathing framework for daily operations.

Here’s the reality: Payroll and accounting firms hold the keys to the kingdom—Social Security numbers, bank account details, tax records, and financial histories. For cybercriminals, you’re not just a target; you’re a goldmine. And if your cybersecurity program isn’t actively identifying, prioritizing, and addressing vulnerabilities, you’re leaving the door wide open.


Questions Only You Can Answer About Your WISP Plan

Your WISP Can’t Just Sit on a Shelf!

  • Have you performed an Annual Risk Assessment?
  • Do you have an Incident Response Plan, and have you TESTED IT?
  • Has your organization implemented Advanced Security Controls?
  • Do you have a Cybersecurity Awareness Training Program?
  • Who is your CISO; one must be identified in your WISP!
  • Do you know what systems contain sensitive client data and how it’s protected?
  • What’s your process to communicate your plan across the organization?

There’s no time for complacency. Failure to comply could subject your organization to legal liability, regulatory penalties, client lawsuits, and reputational damage that takes years to repair.


Let’s Dive a Bit Deeper with AV & EDR: A Better Core Control

Traditional Anti-Virus (AV)

  • Can only detect previously known threats
  • Minimal to no data collection
  • Minimal to no added features or benefits

Endpoint Detection & Response (EDR)

  • Can detect previously known AND unknown threats due to behavioral-based monitoring
  • Complex and detailed endpoint data collection
  • Added benefits include application monitoring, threat-hunting capabilities, and advanced reporting

Wouldn’t it be nice to know at which bend in the road your business might encounter a breach?


Your Preparedness Should Include:

  • An updated WISP and tested Incident Response Plan
  • Employees who are current on cybersecurity awareness training
  • Multi-Factor Authentication (MFA) on every device and application
  • 24×7 monitoring of all systems and endpoints
  • A comprehensive Cyber Insurance policy

As a whole industry, we’re improving. Training initiatives are making a difference—breaches caused by human error continue to decline. But bad actors aren’t just after your data; they’re after your money. Payroll companies remain lucrative targets because of the direct access to bank accounts, wire transfers, and financial credentials.


Compliance and Cyber Resilience Go Hand-in-Hand

Black Bottle IT specializes in helping payroll companies, accounting firms, and tax preparers meet compliance requirements while building truly resilient cybersecurity programs. We don’t just help you pass an audit—we help you protect your business and your clients every single day.

Ready to strengthen your defenses in 2026? Contact Black Bottle IT today. We have a bench of cyber analysts ready to fight alongside you.


Key changes made:

  • Updated intro with 2026 context and current compliance landscape
  • Emphasized the evolving regulatory environment (FTC Safeguards Rule, state privacy laws)
  • Maintained all core technical content while refreshing the tone to be more urgent and relevant
  • Strengthened the call-to-action with partnership language

To get started, contact Black Bottle IT today. Our team is ready to support your business’s growth. 

The Remote Work Security Gap

The Remote Work Security Gap

The Remote Work Security Gap No One’s Talking About

Real Talk: Your Hybrid Workforce Is Your Biggest Vulnerability (And Your Competitors Know It)

Remember when “working from home” meant occasionally checking email from your couch? Those days are gone. Your team is now scattered across home offices, coffee shops, co-working spaces, and airport lounges—and cybercriminals are absolutely thrilled about it.

Here’s the truth most IT providers won’t tell you: remote and hybrid work has opened the floodgates for cybercriminals. Every unsecured home network, every public Wi-Fi connection, every personal device accessing company data—it’s all an invitation.

But here’s what we do differently at Black Bottle IT: We slam those floodgates shut.

The Problem: Security Built for Buildings, Not People

Traditional cybersecurity was designed for a world where everyone worked inside a secure office perimeter. Firewalls protected the building. IT controlled the devices. VPNs were occasional exceptions, not the daily rule.

That model is dead. Your security perimeter isn’t a building anymore—it’s wherever your team opens a laptop.

And if you’re still securing your business like everyone sits at a desk on the third floor, you’re leaving the door wide open.

What Real Protection Looks Like in 2026

At Black Bottle IT, we don’t just react to threats—we build comprehensive security strategies around how your team actually works. Here’s what that means:

1. Device-Level Lockdown

Every endpoint—whether it’s a company laptop, a contractor’s tablet, or a smartphone checking email—gets enterprise-grade protection. We’re talking endpoint detection and response (EDR), encryption, patch management, and real-time threat monitoring. If a device connects to your data, we secure it. Period.

2. Cloud Application Security

Your team lives in cloud apps—Microsoft 365, Google Workspace, Salesforce, Slack. Cybercriminals know this. We wrap these applications in layers of protection: multi-factor authentication, conditional access policies, data loss prevention, and continuous monitoring. We make sure your cloud isn’t the storm waiting to happen.

3. Zero Trust, Always

We operate on a simple principle: trust nothing by default. Every user, every device, every access request gets verified. Just because someone logged in from a recognized device yesterday doesn’t mean we trust them today. That’s how we catch compromised credentials before they become breaches.

The Black Bottle IT Difference: Strategy, Not Band-Aids

Here’s where most IT providers fail: they sell you security tools without a strategy. You end up with a patchwork of software that doesn’t talk to each other, policies no one follows, and a false sense of security.

We take a different approach.

Our comprehensive, integrated cybersecurity solution includes:

  • Assessment: We identify your actual vulnerabilities—not generic checklists, but real risks based on how your business operates
  • Incident Response Plan: When (not if) something happens, you have a playbook that’s been tested and ready to execute
  • Risk Management & Implementation: We don’t just tell you what’s broken—we fix it and manage ongoing risk
  • Cybersecurity Awareness Training: Your employees are your first line of defense. We make them partners, not liabilities
  • Continuous Monitoring: Threats evolve. We watch for them 24/7 so you don’t have to

Enterprise-Grade Security Without the Enterprise-Grade Bill

You shouldn’t need a Fortune 500 budget to get Fortune 500 protection. We deliver enterprise-level security designed for businesses that don’t have an army of internal IT staff or unlimited budgets.

Your team gets to work from wherever they’re most productive. We make sure they can do it safely.

The Stakes Are Higher Than Ever

A single breach can cost you:

  • Six figures (or more) in remediation costs
  • Customer trust that took years to build
  • Regulatory penalties if you handle sensitive data
  • Weeks or months of operational disruption

And here’s the kicker: most breaches are preventable with the right security strategy in place.

Ready for Real Talk?

If you’re reading this and thinking “I’m not sure how secure we actually are right now”—that’s the right instinct.

We offer comprehensive cyber risk assessments that show you exactly where your vulnerabilities are and what it takes to close them. No scare tactics. No overselling. Just honest evaluation and actionable recommendations.

Because securing remote and hybrid work isn’t about buying more software. It’s about having a partner who understands the threats you face and builds protection around how your business actually operates.

That’s what real protection looks like.

Schedule a Cyber Risk Assessment | Talk With an Expert


About Black Bottle IT
We develop cybersecurity strategies specifically around evolving threats and how to defend your business. Our comprehensive, integrated approach means we join your team at any stage of your cybersecurity journey—whether you’re starting from scratch or hardening existing defenses. Based in Wexford, PA, we protect businesses across the region with enterprise-grade security that actually fits their reality.

Deepfake Fraud: The $40 Billion Threat Targeting Small Businesses

Deepfake Fraud: The $40 Billion Threat Targeting Small Businesses

By John Hensberger, Founder, Black Bottle IT

Small business owners, we need to talk about deepfakes. And this isn’t a conversation about futuristic technology or Hollywood special effects – this is about an immediate, devastating threat that’s targeting businesses exactly like yours right now.

The Numbers Don’t Lie: Deepfake Fraud Has Exploded

The statistics are staggering and should keep every business owner awake at night. Deepfake fraud attempts have exploded by over 3,000% in 2024. Let that sink in – a thirty-fold increase in just one year.

But here’s what makes this even more alarming for small businesses: criminals aren’t just targeting Fortune 500 companies anymore. They’re specifically going after smaller businesses because they know you don’t have the enterprise-level security that larger corporations deploy.

What’s Actually Happening to Businesses Like Yours

These aren’t theoretical attacks. They’re happening every single day:

The Fake CEO Call: Your phone rings. It’s your CEO or business partner, asking you to wire money urgently for a “confidential deal.” The voice sounds exactly right – because AI has cloned it perfectly from videos on your company website or social media.

The Deepfake Video Conference: You receive a video call from your biggest client requesting changes to payment information. You can see their face, hear their voice, and everything seems normal. Except it’s not them – it’s a sophisticated deepfake created from their LinkedIn photos and recorded presentations.

The Trusted Vendor Scam: A long-time vendor sends you an email with an attached video message explaining new payment procedures. The face and voice are perfect matches, but the bank details route money straight to criminals.

These scenarios aren’t science fiction. A multinational engineering firm lost $25 million when an employee was fooled by a deepfake video conference call. An 82-year-old business owner drained his retirement fund investing $690,000 in a deepfake Elon Musk cryptocurrency scam.

The Knowledge Gap That’s Putting You at Risk

Here’s the brutal truth about where most small businesses stand today:

  • 71% of people worldwide don’t know what deepfakes are (Iproov survey)
  • 1 in 4 company leaders have little to no familiarity with deepfake technology
  • Small businesses lose an average of 10% of annual profits to successful deepfake attacks
  • More than half of companies haven’t provided any training to employees on deepfake threats

While you’re focused on running your business, serving customers, and driving growth, criminals are perfecting AI tools specifically designed to exploit companies of your size. They’re betting on the fact that you don’t have dedicated cybersecurity staff and that your employees haven’t been trained to recognize these sophisticated attacks.

Why Traditional IT Support Isn’t Enough

Your current IT provider may excel at repairing computers, managing your network, and keeping your systems. But deepfake fraud operates in a completely different realm. It exploits human psychology, not technical vulnerabilities.

These attacks bypass traditional security measures because they don’t target your firewall or antivirus software. They target your people. And unless your IT support understands both the technology behind deepfakes AND the psychology of social engineering, they can’t protect you from this threat.

The Real Cost of Being Wrong

For a small business, one successful deepfake attack isn’t just a financial loss – it could be a company-ending event. Consider the real costs:

Direct Financial Loss: The immediate theft of funds, which averaged $500,000 per successful attack in 2024.

Business Disruption: The time spent dealing with law enforcement, banks, insurance companies, and trying to recover stolen funds.

Reputation Damage: Customers losing trust when they learn your business fell victim to fraud.

Legal Complications: Potential liability issues if customer data or funds were compromised.

Recovery Costs: The expense of implementing new security measures after an attack.

For many small businesses, these combined costs would be impossible to absorb.

What You Can Do to Protect Your Business

The good news is that deepfake fraud is preventable when you know what to look for and implement the right defenses. Here’s what every small business needs to do immediately:

Independent Verification: Your First Line of Defense

Never act on suspicious requests without verification through trusted channels. This is your most critical defense against deepfake fraud.

  • If someone calls requesting money transfers or sensitive information, hang up and call them back using contact information you have on file
  • Don’t trust the caller ID – criminals can spoof phone numbers to make calls appear to come from trusted sources
  • For video calls, ask specific questions that only the real person would know, or reference recent conversations or inside information
  • Establish verification protocols with key vendors, clients, and employees before you need them

Implement Multi-Layer Defense

Deploy multiple security measures that work together:

  • Multi-Factor Authentication (MFA): Require additional verification beyond just passwords for all critical systems
  • Advanced Email Filters: Use business-grade email security that can detect sophisticated phishing attempts and suspicious attachments
  • Limit Public Information Sharing: Reduce the amount of video and audio content featuring key personnel on your website, social media, and public platforms – criminals need this content to create convincing deepfakes
  • Financial Controls: Implement dual approval processes for any money transfers above a certain threshold

Employee Training: Your Human Firewall

Your employees are both your greatest vulnerability and your strongest defense.

Regular training should cover:

  • How to recognize common social engineering tactics
  • What deepfakes are and how they’re used in business fraud
  • Your company’s verification procedures for unusual requests
  • Red flags to watch for in phone calls, emails, and video communications
  • Who to contact immediately if they suspect an attack

This training isn’t a one-time event. Criminals constantly evolve their tactics, so your team’s knowledge needs to evolve too.

The Bottom Line: You Can’t Afford to Wait

Deepfake fraud isn’t coming to small businesses – it’s already here. While you’re reading this, criminals are using AI to clone voices, create fake videos, and target businesses exactly like yours.

The question isn’t whether these attacks will continue to grow (they will). The question is whether your business will be prepared when criminals target you.

At Black Bottle IT, we protect businesses from threats that traditional IT providers don’t even understand exist. We don’t just maintain your technology – we defend against the sophisticated, AI-powered attacks that could devastate your business overnight.

Don’t wait until you’re the next headline. The time to act is now, before the criminals come calling with your CEO’s voice asking for that “urgent” wire transfer.


Ready to protect your business from AI-powered fraud? Contact Black Bottle IT today to learn how we can defend your company against deepfake attacks and other emerging cybersecurity threats.


John Hensberger is the founder of Black Bottle IT, a cybersecurity-focused managed service provider specializing in protecting small and medium businesses from emerging digital threats. With years of experience in cybersecurity and business technology, John helps companies navigate the complex landscape of modern cyber threats while maintaining operational efficiency.

Is Your Password Protection Duct Tape?

Is Your Password Protection Duct Tape?

Yes, we are in the year 2025, and yet weak passwords remain one of the easiest entry points for cybercriminals. While your team focuses on growing the business, hackers systematically test common passwords like “123456” and “password123” against your systems.

The uncomfortable truth? Most businesses walk around with digital front doors held shut by nothing more than duct tape and good intentions.

If your employees still use their pet’s name plus their birth year, or worse, the same password across multiple accounts, you’re not just vulnerable—you’re practically inviting trouble.

But here’s the good news (and this has been no secret): robust password policies aren’t complicated to implement, and they’re one of the most cost-effective security measures you can deploy. The key is moving beyond the “just make it complicated” approach to a comprehensive strategy that actually works in the real world.

Let’s walk through exactly how to build password policies that protect your business without driving your team crazy.

Implementing strong password policies is crucial for protecting business systems. Here’s a more detailed breakdown:

Require complex passwords:

  • Mandate a mix of uppercase and lowercase letters, numbers, and special characters
  • Prohibit common words, phrases, or easily guessable information (like birthdates)
  • Consider using passphrases instead of single words
  • Set minimum length requirements (e.g., at least 12 characters)
  • A reminder to implement multi-factor authentication (MFA):

 

Require a second form of verification beyond passwords

Options include:

  • Require a second form of verification beyond passwords
  • SMS codes (though less secure than other methods)
  • Authenticator apps (like Google Authenticator or Authy)
  • Hardware tokens (such as YubiKeys)
  • Biometric verification (fingerprints, facial recognition)
  • Apply MFA to all critical systems and accounts, especially those with administrative access

 

Use password managers:

  • Encourage or require employees to use reputable password management tools
  • These tools generate and store strong, unique passwords for each account
  • Reduces the risk of password reuse across multiple accounts
  • Some options include LastPass, 1Password, or Bitwarden

 

Implement password rotation policies:

  • Require password changes at regular intervals (e.g., every 90 days)
  • Prevent the reuse of recent passwords

 

Monitor for compromised credentials:

  • This is where Black Bottle IT comes in with services that check if employee email addresses or passwords have been exposed in known data breaches
  • We will require immediate password changes if compromised credentials are detected

 

Implement account lockout policies:

  • Our solution will lock accounts after a certain number of failed login attempts
  • This helps prevent brute-force attacks

 

Use single sign-on (SSO) for multiple applications:

  • Reduces the number of passwords employees need to remember
  • Allows for centralized control and monitoring of access

 

By implementing these robust password policies, businesses can significantly reduce the risk of unauthorized access to their systems, making it much harder for hackers to intrude.

Contact Black Bottle IT today to remove the duct tape!

Beyond Break-Fix: Transform Your IT with Proactive Management

Beyond Break-Fix: Transform Your IT with Proactive Management

Implementing a comprehensive, proactive maintenance strategy through Managed IT Services is essential for modern businesses seeking to maintain operational excellence and minimize costly downtime.

Organizations can identify and address potential issues before they escalate into major problems that disrupt business operations by continuously monitoring system health, automating critical updates, and conducting regular infrastructure assessments. This preventive approach safeguards against unexpected system failures and optimizes performance across the entire IT infrastructure. A well-managed IT environment reduces security risks, ensures compliance with industry standards, and provides predictable IT costs through strategic planning.

Moreover, with automated monitoring and expert oversight, businesses can focus on their core objectives while maintaining confidence that their technology infrastructure is operating at peak efficiency, backed by robust disaster recovery protocols that protect against both natural disasters and cyber threats. This proactive stance ultimately translates into improved system reliability, enhanced user productivity, and a more substantial return on technology investments.

5 Proactive IT maintenance and managed services Black Bottle IT focuses on with their clients:

  • Regular system monitoring and diagnostics detect potential hardware failures, performance bottlenecks, and security vulnerabilities before they cause disruptions – this includes monitoring server health, network traffic patterns, and system resource usage to identify warning signs early.
  • Automated patch management and software updates ensure all systems have the latest security fixes and performance improvements, reducing exposure to cyber threats and preventing compatibility issues between applications.
  • Scheduled hardware assessments and lifecycle management help plan for equipment replacement before components reach end-of-life, preventing unexpected failures and allowing for strategic budget planning for upgrades.
  • Continuous network optimization through bandwidth monitoring, traffic analysis, and infrastructure tuning keeps data flowing efficiently and prevents slowdowns that can impact productivity.
  • Systematic data backup verification and disaster recovery testing ensures business continuity plans remain viable and can be executed successfully if needed, protecting against both system failures and cybersecurity incidents.

Black Bottle IT would love to learn more about your work environment and provide an assessment for a modern-day Managed IT and Cybersecurity Solution. Contact us today!