What is your company's will? This Fireside Chat with Matt Lee tackles the Acceptable Use Policy, Written information security plan, Roles, and responsibilities. Please give us feedback, as we have a pretty healthy disagreemen...
From CompTIA MSP Community to the larger IT Community at large. Dawn Sizer of 3rd Element Consulting and Henry Timm of Phantom Technology Solutions are great CompTIA community members who volunteer their time for not just Com...
Talking about risk shouldn't be difficult, but it is as I sit down with Peter Maynard of SMB1001. There are so many challenges in cybersecurity, but sometimes we need to look through the lens of risk. SMBs worldwide will soon...
Most technological advancements in IT or OT are made with the best of intentions. What happens when the technology you have acquired causes unintended consequences? I sit down with Ryan Morris of Morris Management Partners to...
Control 18 has only five safeguards, yet you can spend an entire year preparing for it. Matt Lee of Pax8 and I will help you understand each safeguard and the importance of getting this right and the pitfalls to avoid.
Don't Forget about VoIP as you onboard new clients or even with existing clients. There are significant risks in not including some level of management of the VoIP system or providing some support when there are issues on the...
Each of the items in the title are titles for show episodes dating all the way back to the beginning of 2020. They have made the top 10 playbacks for all time. I sit down with Chad Holstead of the BKS Team to talk through cur...
We take a moment to remember where we were as an MSP. Joshua Smith of Reliaquest and Charles Love of ShowTech Solutions and I reflect on the technologies and challenges we faced more than eight years ago and then look at what...
Last week we talked about playbooks and runbooks... This week we are back in the CIS Top 18 controls, #17 and while the timing might be coincidental it is a perfect fit. What we have learned going through the first 16 control...
What happens if your RMM goes down and doesn't come back? We sit down with Mike Stewart of Anchor Networks and Charles Love of ShowTech Solutions to get their take on the importance of Runbooks. By the way, they were at a pee...
I always like to catch one or two attendees of an event after they get home to see what did they come away with. I spoke with Jim Harryman of Kinetic Technology Group to get his reaction on an event that he has now attended f...
The demand for cyber soldiers is always on the rise. We look at the challenges of protecting Critical Infrastructure and that while there is a lot of Doom and Gloom... there is hope. I sit down with Chris Storey of Qriar to d...
Using a framework to find gaps in your organization is a great way to improve your security posture. Have you thought about using the same framework with your clients? I think you find this discussion with Jim Harryman of Kin...
We are finally talking about Application Software Security with Matt Lee of Pax8. We went deep on a few safeguards and found some tangents.
Ever wonder what the world outside of IT does with cybersecurity awareness training? If they don’t engage with an MSP, how many do it at all? I sit down with Jennie Johnson of TCE Company to get her perspective on transitioni...
We have all configured Email automation at some point and we often use systems and tools that automate email notifications with actions or instructions. With that being said, how often do we check in on the recipient as to wh...
Talking through the CompTIA Cybersecurity Audit outcome with Jim Harryman of Kinetic Technology Group. Obtaining the Trustmark is no small feat and requires dedication and effort by the entire organization. In this episode, w...
We find ourselves getting closer to the end of CIS Top 18. In this episode, Matt Lee of Pax8 and I discuss Service Provider Management. Matt does an excellent job of laying out a success path for any MSP to implement. You sho...
If you didn't get a chance to attend the sessions on MSP+ Playbooks or tabletop exercises, then join Matt Topper and me as we recap some of our interactions with attendees and feedback from both our sessions. In this episode ...
Ever feel like a punching bag when the phone rings and you have an upset client? Do you communicate with your clients outside of IT support? I sit down with Morgan Barse of Wing Woman to talk about Marketing and how the major...
From Layoffs to job transitions in the channel. Desraie Thomas and I chat about cybersecurity and how it impacts us all. It doesn't just happen at work; yet, as employees, we have been given the tools and resources we don't o...
Security Awareness and Skills Training is CIS Top 18 Control 14 is where Matt Lee of Pax8 and I sit down in our home offices to discuss the ins and outs of all nine safeguards. The importance of them and how they help your or...
Cybersecurity should be front and center in every organization, and who you hire impacts how well you can implement it. In this episode, we discuss having the right staff and aligning with company expectations and goals. Whil...
Social media lives Social media is somehow a part of our everyday lives, and we see different platforms that cater to varying types of communication and content. With that said, when we misuse the platforms or share too much,...