ThreatLocker Exec: ‘The Bad Guys Are Not Working 9 To 5’

Anybody who’s running an EDR who does not have MDR or 24x7 monitoring of the SOC is wasting your time. The bad guys are not working 9 to 5. They’re working in the middle of the night. They are working holidays. They love Thanksgiving. They love the Fourth of July, not in the same way that you love the Fourth of July,’ says Rob Allen, chief product officer at ThreatLocker.

Cybersecurity can seem very complex, but there are multiple ways MSPs can help simplify it for their clients.

That’s the word from Rob Allen, chief product officer at ThreatLocker, the Dublin, Ireland-based developer of enterprise cybersecurity software, who told MSP attendees at this week’s 2025 XChange NexGen conference that while cybersecurity can seem overwhelming sometimes with the amount of threats, tactics and techniques used in attacking customers’ systems, there are surprisingly simple steps that can be used to bolster their security posture.

XChange NexGen is being hosted in Houston by CRN parent company The Channel Company.

[Related: The 2025 Security 100]

Older business owners might think of cybersecurity threats such as the Love Bug and the Blaster virus, Allen said.

“Although it was a pain, you might have to shut your network down for a day to run virus scans; it wasn’t that serious,” he said. “It wasn’t a huge problem. Again, embarrassing, a little bit annoying, but not a major issue.”

Things have only gone downhill since then, Allen said.

“What happened is threat actors realized something,” he said. “They realized they could make money out of this. So then you started getting botnets. You started getting adware. You started getting spam. Today, the cyberthreat and cybercrime market is worth billions of dollars. How many billions? It's estimated this year to be $640 billion.”

It is possible to take simple steps to help eliminate much of the cybersecurity threat, Allen said.

“[The idea is to] stop as many cyberattacks as possible and make the life of cyber criminals as difficult as possible without killing you or the IT department’s approval rate,” he said.

Those steps, many of which Allen said can be done via group policies or via Configuration Manager and ThreatLocker, include the following:

ThreatLocker, Allen said, allows MSPs to deliver seamless technology to users.

“It runs currently 170 checks on every single machine in your environment every single day and reports back to a very pretty dashboard, telling you which compliance frameworks are affected, which things are critical,” he said. “It will give you information about the thing that is wrong, and it will tell you what is important. And if there is a solution, it will tell you what the solution is.”

RIch Little, vice president of operations at Cantey Tech Consulting, a Charleston, S.C.-based MSP, said that constant monitoring is key.

“We just have to constantly do our due diligence to make sure our clients are covered and our systems are covered,” Little told CRN. “We’re monitoring these things all the time knowing that the bad guys are always looking and always trying to get in. It doesn’t matter where it is.”

Allen was correct that attackers have upgraded themselves over the years, Little said.

“They’re very organized,” he said. “It’s no longer just the antisocial kid in the basement. It’s truly an organized crime.”