What is a PenTest? What if I can't afford a PenTest? How is a pentest different from a vulnerability assessment? These questions and many more Matt Lang and I attempt to give some direction. Perhaps redefining what a pentest ...
Our first fireside chat was about Physical Assets and the hurdles or obstacles faced when trying to get a complete inventory. In this month's special edition, a fireside chat with Matt Lee, we are addressing control 2. This i...
I love a good origin story. Sitting down with Matt Lang of SVAM International showed me just how alike many of our stories are. How we got started in IT, why we started an MSP, and in some cases why we became super passionate...
We are all too familiar with regulatory requirements and penalties for failing to comply. The FTC has put into effect June 9, 2023 requirements that will directly impact financial institutions. In this episode, we talk specif...
Domain Registrations and an extra invoice that has a bit of sticker shock... This and more with Charles Love of ShowTech Solutions. We have talked about doom and gloom in the past but this story is one that I am already losin...
If you haven't met me, you know that my passion is to help others with improving their cybersecurity posture. In an effort to make a bigger impact, I have brought Matt Lee of Pax8 on to the show as a special guest to talk abo...
We are all to familiar with our own mortality. In this episode we talk about the scenarios that can arise when a key person in a company holds all of the keys and is suddenly taken from us. While there is some morbidity to th...
As a podcast we pride ourselves in the focus of cybersecurity topics. This is an episode focused on Cybersecurity without talking about cybersecurity. Crazy, I think Ian Richardson of Richardson and Richardson make it almost ...
CompTIA's research team Seth Robinson and Carolyn April join me in discussing some interesting research trends that cover 4 pillars or steps that I like to refer to as the 4 Ps. Policy, Process, People, and Product. Be forewa...
Cybersecurity challenges exist in every aspect of our daily lives. Join me as I discuss with Dom Kirby of Pax8 an approach to cybersecurity with friends and family. Technology helps but it doesn't solve it all.
Ever wonder why your prospect or client gets a confused look on their face? You try to describe the new service offering or features that have been added to improve the security or efficiencies of their task force but they j...
If my organization has no technology can I still be secure? Matt Topper of Connectwise and I explore Cybersecurity with an approach that says you can prove a mature cybersecurity posture without technology. Technology is sh...
With Communities, Councils, and Forums just a few weeks away, I thought we should tee up the Unfiltered Fireside chat between Matt Lee of Pax8 and myself. In this precursor, you will hear our two different approaches to achi...
We talk a lot about social engineering and its potential impact on our employees, our businesses, and even our family and friends. What we often fail to talk about is our responsibility to ensure that our employees, clients,...
We are beginning to see a pattern in frameworks updating or adding additional privacy controls. Whether they are long overdue or not is neither here nor there as they are now being stood up. From CCPA becoming CPRA, ISO 2700...
Have you ever dealt with a client, prospect, or perhaps an internal event that caused harm to your business or others? If so I am sure you can relate to feelings of shame, and embarrassment and I am sure many sleepless night...
There is some buzz circulating about the upcoming CompTIA Cybersecurity Trustmark, Compliance with frameworks, and how to get started as a solution provider. I sit down with Matt Lee of Pax8 to discuss the opportunities pres...
There is still a mindset in our industry that says, " You are too small to need X." With the experiences shared by Sarah Goffman of TCE Communications, we cover the necessity of firewalls, Endpoint protection, and other secur...
I sit down with Kevin McDonald of Alvaka to talk about the three main scam types out there and what they look like. While we might not be able to prevent all threat actors from prevailing, we can make it more difficult and i...
So this episode is not about Lastpass specifically but about Password Hygiene and best practices around securing your credentials. We talk about the better-than-nothing model and even some unconventional ideas around password...
Not to follow in everyone's footsteps on predictions... I waited to publish until January 3rd 2023. I had an opportunity to sit with Steve Alexander, Facilitator and founder of MSP-Ignite, to talk about his hope and predicti...
Looking back on 2022 with Joshua Smith of Reliaquest and Charles Love of ShowTech Solutions on looking back on the highs and lows of 2022 and what we hope for in 2023.
I brought Jim Harryman back to finish the conversation on policies and controls. We left out a few key pieces.
Whether you have decided to get prepared for an ISO, SOC2, or other audit can be a daunting task. Listen to the journey and all of it's ups and downs that Jim Harryman goes through to get a SOC2 certification and all of the ...