<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>LuzGrid Tech Blog</title><description>Plain-English IT and cybersecurity notes for Inland Empire small business owners. From a Rancho Cucamonga MSP.</description><link>https://luzgridtech.com/</link><language>en-us</language><item><title>Playbook: How a Small Insurance Agency Should Build a NIST CSF-Mapped WISP for Carrier Questionnaires</title><link>https://luzgridtech.com/blog/case-study-insurance-broker-nist-csf-carrier-questionnaire/</link><guid isPermaLink="true">https://luzgridtech.com/blog/case-study-insurance-broker-nist-csf-carrier-questionnaire/</guid><description>When a small independent insurance agency receives a carrier&apos;s annual security questionnaire that requires a full NIST CSF mapping of controls, what does the right engagement look like? Here is the playbook — what we would assess, what we would change, and what the agency should see when this is handled properly.</description><pubDate>Wed, 06 May 2026 00:00:00 GMT</pubDate><category>IT Strategy</category></item><item><title>How to Vet Your IT Provider in 30 Minutes (Questions, Red Flags, What Good Looks Like)</title><link>https://luzgridtech.com/blog/vet-it-provider-30-minutes/</link><guid isPermaLink="true">https://luzgridtech.com/blog/vet-it-provider-30-minutes/</guid><description>A 30-minute checklist any non-technical small business owner can run on a discovery call. The questions that separate a real MSP from a sales rep, the red flags to listen for, and what a good answer actually sounds like.</description><pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate><category>Buyer&apos;s Guide</category></item><item><title>What Happens When Ransomware Hits a 25-Person Firm in Riverside (a Realistic Timeline + What Stops It)</title><link>https://luzgridtech.com/blog/ransomware-25-person-firm-riverside-timeline/</link><guid isPermaLink="true">https://luzgridtech.com/blog/ransomware-25-person-firm-riverside-timeline/</guid><description>Ransomware does not arrive announced. It walks in through email, sits quietly for days or weeks, and detonates on a Friday night when nobody is watching. Here is the realistic timeline for a 25-person Riverside firm — and the controls that would have changed the ending.</description><pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate><category>Cybersecurity</category></item><item><title>The MSP Question Every Rancho Cucamonga Business Should Ask Before Signing</title><link>https://luzgridtech.com/blog/msp-question-rancho-cucamonga-business-should-ask/</link><guid isPermaLink="true">https://luzgridtech.com/blog/msp-question-rancho-cucamonga-business-should-ask/</guid><description>Most managed services pitches sound the same: 24/7 monitoring, unlimited helpdesk, proactive maintenance. Here is the one question that actually separates a good MSP from a bad one — and the supporting questions that flush out the truth.</description><pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate><category>Buyer&apos;s Guide</category></item><item><title>Your Dental Office IT Compliance Checklist (HIPAA + State Board + the Things They Don&apos;t Tell You)</title><link>https://luzgridtech.com/blog/dental-office-it-compliance-checklist/</link><guid isPermaLink="true">https://luzgridtech.com/blog/dental-office-it-compliance-checklist/</guid><description>Dental offices in California live at the intersection of HIPAA, the Dental Board, and a stack of practice-management software vendors. Here is the realistic IT compliance checklist for a 5- to 25-operatory practice — the things you have to do, the things you should do, and the gaps everyone misses.</description><pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate><category>Compliance</category></item><item><title>Why Most Small Businesses Are Easier to Hack Than They Think (and the 5-Step Fix)</title><link>https://luzgridtech.com/blog/small-business-easier-to-hack/</link><guid isPermaLink="true">https://luzgridtech.com/blog/small-business-easier-to-hack/</guid><description>Whether you run a 5-person shop or a 50-person firm, the truth is that attackers don&apos;t care about your size — and your defenses are usually thinner than you think. Here&apos;s why, and the 5-step fix that closes most of the gap in a few weeks.</description><pubDate>Fri, 01 May 2026 00:00:00 GMT</pubDate><category>Cybersecurity</category></item><item><title>Playbook: How a $400M+ AUM RIA Should Prepare for an SEC Exam Under the 2024 Reg S-P Amendments</title><link>https://luzgridtech.com/blog/case-study-ria-reg-sp-amendments-sec-exam-prep/</link><guid isPermaLink="true">https://luzgridtech.com/blog/case-study-ria-reg-sp-amendments-sec-exam-prep/</guid><description>When a small RIA managing $400M+ AUM faces an SEC exam under the 2024 Reg S-P amendments, what does the right engagement look like? Here is the playbook — what we would assess, what we would change, and what the firm should see when this is handled properly.</description><pubDate>Wed, 29 Apr 2026 00:00:00 GMT</pubDate><category>Compliance</category></item><item><title>Playbook: How a Property Management Firm Should Handle a Departing-Employee Data Exfiltration Risk</title><link>https://luzgridtech.com/blog/case-study-property-management-departing-employee-data-exfiltration/</link><guid isPermaLink="true">https://luzgridtech.com/blog/case-study-property-management-departing-employee-data-exfiltration/</guid><description>When a property management firm faces a departing employee who may be copying client and tenant files on their way out, what does the right engagement look like? Here is the playbook — what we would assess, what we would change, and what the firm should see when the next departure is handled properly.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>Cybersecurity</category></item><item><title>Micro-SaaS Vetting: The 5-Minute Security Check for Browser Extensions</title><link>https://luzgridtech.com/blog/browser-extension-security-check/</link><guid isPermaLink="true">https://luzgridtech.com/blog/browser-extension-security-check/</guid><description>That browser extension your team installed in 30 seconds could be reading everything they do online. Here&apos;s a 5-minute vetting process that should be standard.</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><category>Cybersecurity</category></item><item><title>The Backup Exit Strategy: Can You Move Your Data Without the Vendor&apos;s Help?</title><link>https://luzgridtech.com/blog/backup-exit-strategy-saas/</link><guid isPermaLink="true">https://luzgridtech.com/blog/backup-exit-strategy-saas/</guid><description>SaaS tools make it easy to get your data in — but can you get it out? Here&apos;s why data portability matters and how to avoid the proprietary trap.</description><pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate><category>IT Strategy</category></item><item><title>Clean Desk 2.0: Securing Your Home Office from Physical Data Leaks</title><link>https://luzgridtech.com/blog/clean-desk-home-office-security/</link><guid isPermaLink="true">https://luzgridtech.com/blog/clean-desk-home-office-security/</guid><description>The clean desk policy has evolved. In a world of remote work and AI tools, an unlocked screen is a data breach waiting to happen. Here&apos;s the modern version.</description><pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate><category>Remote Work</category></item><item><title>The Legacy Debt Audit: Identifying the 3 Oldest Risks in Your Server Room</title><link>https://luzgridtech.com/blog/legacy-debt-audit-server-room/</link><guid isPermaLink="true">https://luzgridtech.com/blog/legacy-debt-audit-server-room/</guid><description>That old server still works — until it doesn&apos;t. Here&apos;s how to find and prioritize the silent risks hiding in your infrastructure before they become emergencies.</description><pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate><category>IT Strategy</category></item><item><title>The Session Cookie Hijack: Why MFA Can&apos;t Always Save You</title><link>https://luzgridtech.com/blog/session-cookie-hijack-mfa/</link><guid isPermaLink="true">https://luzgridtech.com/blog/session-cookie-hijack-mfa/</guid><description>Multi-factor authentication is essential — but attackers have found ways around it. Here&apos;s how session cookie hijacking works and what layered defenses you actually need.</description><pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate><category>Cybersecurity</category></item><item><title>LinkedIn Social Engineering: Protecting Your Staff from Fake Recruitment Scams</title><link>https://luzgridtech.com/blog/linkedin-fake-recruiter-scams/</link><guid isPermaLink="true">https://luzgridtech.com/blog/linkedin-fake-recruiter-scams/</guid><description>Fake recruiters on LinkedIn are getting harder to spot. Here&apos;s the scam pattern your team needs to recognize — and the simple defaults that stop it.</description><pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate><category>Cybersecurity</category></item><item><title>Playbook: How a Two-Location Dental Practice Should Respond to a Lookalike-Domain Phishing Attempt</title><link>https://luzgridtech.com/blog/case-study-dental-ransomware-near-miss-email-gateway/</link><guid isPermaLink="true">https://luzgridtech.com/blog/case-study-dental-ransomware-near-miss-email-gateway/</guid><description>When a two-location dental practice faces a lookalike-domain phishing attempt targeting the front desk, what does the right engagement look like? Here is the playbook — what we would assess, what we would change, and what the practice should see when this is handled properly.</description><pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate><category>Cybersecurity</category></item><item><title>The Home-Office Laptop Checklist We Wish Every Small Business Used</title><link>https://luzgridtech.com/blog/securing-company-laptops-at-home-checklist/</link><guid isPermaLink="true">https://luzgridtech.com/blog/securing-company-laptops-at-home-checklist/</guid><description>Most home-office security incidents aren&apos;t dramatic. They&apos;re small habits multiplied — a screen left unlocked, a router with the default password, a quick &quot;just checking something&quot; from a family member. Here&apos;s the simple checklist that catches the boring stuff.</description><pubDate>Fri, 27 Mar 2026 00:00:00 GMT</pubDate><category>Remote Work</category></item><item><title>Stop Ransomware Before It Starts: A 5-Step Plan That Works</title><link>https://luzgridtech.com/blog/ransomware-5-step-defense-plan/</link><guid isPermaLink="true">https://luzgridtech.com/blog/ransomware-5-step-defense-plan/</guid><description>Ransomware almost never starts with encryption. It starts days or weeks earlier with a stolen login or an unpatched system. The fix isn&apos;t fancy — it&apos;s five fundamentals done consistently.</description><pubDate>Mon, 23 Mar 2026 00:00:00 GMT</pubDate><category>Cybersecurity</category></item><item><title>Playbook: How a 9-Person CPA Firm Should Respond to a Tax Software Portal Vulnerability During Tax Season</title><link>https://luzgridtech.com/blog/case-study-cpa-tax-software-portal-credential-stuffing/</link><guid isPermaLink="true">https://luzgridtech.com/blog/case-study-cpa-tax-software-portal-credential-stuffing/</guid><description>When a 9-person CPA firm faces a credential-stuffing wave against its tax-prep platform vendor mid-tax-season, what does the right engagement look like? Here is the playbook — what we would assess, what we would change, and what the firm should see when this is handled properly.</description><pubDate>Sun, 22 Mar 2026 00:00:00 GMT</pubDate><category>Compliance</category></item><item><title>The 2026 Guide to Finding the Cloud Apps Your Team Is Actually Using</title><link>https://luzgridtech.com/blog/uncovering-unsanctioned-cloud-apps-2026/</link><guid isPermaLink="true">https://luzgridtech.com/blog/uncovering-unsanctioned-cloud-apps-2026/</guid><description>Most IT teams think their company uses 30-40 cloud apps. The real number is closer to 1,000. Here&apos;s how to find what&apos;s actually running, decide what stays, and replace what doesn&apos;t — without driving everyone to a worse workaround.</description><pubDate>Tue, 17 Mar 2026 00:00:00 GMT</pubDate><category>Cloud Security</category></item><item><title>How to Run a Shadow AI Audit Without Slowing Your Team Down</title><link>https://luzgridtech.com/blog/shadow-ai-audit-without-slowing-team-down/</link><guid isPermaLink="true">https://luzgridtech.com/blog/shadow-ai-audit-without-slowing-team-down/</guid><description>Shadow AI is what happens when AI tools spread faster than the rules. People aren&apos;t trying to break things — they&apos;re trying to save time. Here&apos;s how to find what&apos;s in use and decide what to do with it, without making your team feel watched.</description><pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate><category>Cybersecurity</category></item></channel></rss>