MSP Blog Logo


Business Growth


Help Desk



Sales & Marketing


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Can You Spot the 13 Security Flaws in This Photo?

Posted June 18, 2014by Hunter Smith


With all of the recent cyber security breaches in the news, it's easy to get caught up in the "technical" side of information security. Sure, there is a lot of work to be done to keep your information safe from hackers and malicious software programs, however, there's another side to the coin, and that's physical security. Many offices don't enforce best practices for physical information security, and frankly may just not be aware of them. As their MSP, your job is to educate them on these best practices, both from a technology standpoint and from a physical standpoint.

So, time to put your knowledge to the test. Can you find the 13 security flaws in this picture?

Click Here to See Larger Image 

So, think you spotted them all? Click below to check your answers.

Click to reveal answers


  1. Computer screen left on with no password protection - passerby has access to information on the device
  2. Unshredded files in trash could contain sensitive information
  3. File cabinet open - easy for someone to steal sensitive information
  4. Cell phone left out in the open - may display sensitive information and/or can be easily stolen
  5. Notes left on whiteboard - could contain confidential product updates, information or ideas
  6. Backpack left out and open
  7. Usernames and passwords left out in the open
  8. Key to locked drawer left out in the open - easy access to confidential files
  9. Calendar out in the open - could contain sensitive dates and/or information
  10. Credit card left out on desk
  11. Documents left out on desk that could contatin sensitive information
  12. USB drive left out in the open
  13. Wallet left on desk


While some of these may seem like obvious fixes, and some of these may seem redundant, it's important for all of your employees to understand where company and/or personal data can be easily stolen. Maybe it's a repairman in your office who sees the opportunity to steal confidential personal data, maybe it's just an office visitor who glances over and sees confidential information out in the open. Either way, there needs to be someone to conduct cyber security training as well as physical security training to educate employees on security best practices—and for your clients, that responsibility typically falls on you as their MSP.  


As Chief Information Officer (CIO), Hunter is expected to take Continuum's IT operations to the next level of performance as our company continues its rapid growth and expansion. Most recently, Hunter served as Senior Vice President and Chief Technology Officer for Acadian Asset Management. Prior to Acadian, Hunter held positions at Plymouth Rock Companies as Director of Enterprise Technology Services as well as positions at Hobbs/Madison, MFS Investment Management and CSC Consulting. Hunter has a bachelor’s degree in computer science from Dartmouth College. He is responsible for all IT resources for Continuum’s U.S. and India locations.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus