Welcome to MSP 1337 - Cybersecurity Maturity Journey | Guidance and Best Practices for MSPs!

Episodes

I'm Too Small For a Firewall
Jan. 24, 2023

I'm Too Small For a Firewall

There is still a mindset in our industry that says, " You are too small to need X." With the experiences shared by Sarah Goffman of TCE Communications, we cover the necessity of firewalls, Endpoint protection, and other secur...

Listen to the Episode
Pig Butchering & Other Scams
Jan. 17, 2023

Pig Butchering & Other Scams

I sit down with Kevin McDonald of Alvaka to talk about the three main scam types out there and what they look like. While we might not be able to prevent all threat actors from prevailing, we can make it more difficult and i...

Listen to the Episode
Password Manager or nothing?
Jan. 10, 2023

Password Manager or nothing?

So this episode is not about Lastpass specifically but about Password Hygiene and best practices around securing your credentials. We talk about the better-than-nothing model and even some unconventional ideas around password...

Listen to the Episode
2023 What can we expect?
Jan. 3, 2023

2023 What can we expect?

Not to follow in everyone's footsteps on predictions... I waited to publish until January 3rd 2023. I had an opportunity to sit with Steve Alexander, Facilitator and founder of MSP-Ignite, to talk about his hope and predicti...

Listen to the Episode
Looking Back on 2022
Dec. 27, 2022

Looking Back on 2022

Looking back on 2022 with Joshua Smith of Reliaquest and Charles Love of ShowTech Solutions on looking back on the highs and lows of 2022 and what we hope for in 2023.

Listen to the Episode
Policies and Controls, Compliance vs Security?
Dec. 20, 2022

Policies and Controls, Compliance vs Security?

I brought Jim Harryman back to finish the conversation on policies and controls. We left out a few key pieces.

Listen to the Episode
Preparing for an Audit.
Dec. 13, 2022

Preparing for an Audit.

Whether you have decided to get prepared for an ISO, SOC2, or other audit can be a daunting task. Listen to the journey and all of it's ups and downs that Jim Harryman goes through to get a SOC2 certification and all of the ...

Listen to the Episode
The Aftermath
Dec. 6, 2022

The Aftermath

The impact of an incident is often unknown until we enter into the aftermath. How it happened can't always be answered but the goal post incident is to determine what can be done to prevent this in the future. How do we pre...

Listen to the Episode
Building Confidence
Nov. 29, 2022

Building Confidence

How do we create better relationships between vendors and solution providers? How do we get vendors to lean into their partner success? How do I build confidence in those relationships? This and more as I sit down with Kevin...

Listen to the Episode
What About My Backups?
Nov. 22, 2022

What About My Backups?

We spend a lot of time and energy to protect our businesses and our client's businesses from threat actors, natural disasters and even user error. I'm pretty sure we don't spend enough time focusing on the backups of the dat...

Listen to the Episode
Risky People
Nov. 15, 2022

Risky People

Risk has been at the top of mind for several episodes as of late. So much so that it seems to show up in my Flipboard news feed and suddenly a LinkedIn post popped up by David Schultis, of Red Panda, talking about Risk to UN...

Listen to the Episode
Advisory Services
Nov. 8, 2022

Advisory Services

Within every MSP we have roles that involve Account Management and in some cases have even evolved the title to vCIO or other name. The challenge in many cases is how to charge for this role? Should it be a standalone servic...

Listen to the Episode
Risk Management Plan
Nov. 1, 2022

Risk Management Plan

In talking about risk we often don't address risk management plans at all. In this episode I discuss with Jim Harryman of Kinetic Technology Group, all things risk. It often starts with a Risk Assessment and we step through...

Listen to the Episode
Monitoring Cloud Services
Oct. 25, 2022

Monitoring Cloud Services

I always have wondered why we assume our end users know how to use the technology we provide them. The age old argument of 10% of the product's capability is actually used. I sit down with Charles Love to talk about all the...

Listen to the Episode
Beyond Zero Trust My Browser
Oct. 18, 2022

Beyond Zero Trust My Browser

I couldn't let it go... The browser or browsers have the potential to be the trojan horse. I sit down with Jim Harryman of Kinetic Group to discuss what we can do within the browser to ensure a more secure posture with resou...

Listen to the Episode
Four Truths of Cybersecurity
Oct. 11, 2022

Four Truths of Cybersecurity

You can't secure others if you don't first secure yourself. Security should be just as important at home as it is at work and you take responsibility for your actions. I sit down with Scott Augenbaum to discuss what is in ...

Listen to the Episode
Zero Trust Your Browser
Oct. 4, 2022

Zero Trust Your Browser

Regardless of which browser(s) you use how often do you patch them. Do you maintain the extensions and restrict what is and isn't sync'd. I sit down with Kenneth May of Swift Chip to discuss how we need to do a better job c...

Listen to the Episode
Onboarding and Offboarding
Sept. 27, 2022

Onboarding and Offboarding

In cybersecurity we don't spend as much time as we probably should in the area of onboarding and offboarding. Initiated by the HR department or in smaller companies perhaps handled by the company owner to bring in new employ...

Listen to the Episode
Going Beyond RMM and MDM
Sept. 20, 2022

Going Beyond RMM and MDM

A continued discussion on RMM and MDM tools. How they differ and how they overlap. In this ever evolving threat landscape they are both extremely important. In this episode Jim Harryman and I will review some of the histor...

Listen to the Episode
Four Years Post Breach
Sept. 13, 2022

Four Years Post Breach

Over the past two years I have gotten to know Brian Weiss and much of our conversation has revolved around how he continues to improve the security posture of his company. This is largely tied to an event that took place bac...

Listen to the Episode
MDM, Not Just for Mobile Devices
Sept. 7, 2022

MDM, Not Just for Mobile Devices

As solution providers we spend a lot of time with different tools and services to support our clients. I sit down with Charles Love of ShowTech Solutions to discuss how RMM and MDM (DM) go hand in hand in managing the assets...

Listen to the Episode
Vulnerabilities and Exploits
Aug. 30, 2022

Vulnerabilities and Exploits

Vulnerabilities and exploits happen to be very common in today's threat landscape and not all vulnerabilities are actionable. I sit down with Wes Spencer, of Fifth Wall, to provide insights to solution providers on how to co...

Listen to the Episode
Data Protection, a Moral Obligation
Aug. 23, 2022

Data Protection, a Moral Obligation

I think most of us would agree that protecting data is a very big part of the job as a Solution Provider. Joshua Smith and I tackle this conversation when it comes to the costs associated with protecting that data and what i...

Listen to the Episode
What are Integrator Groups?
Aug. 16, 2022

What are Integrator Groups?

As Solution providers (MSPs), a security first mindset can at times be difficult. We know that our responsibilities to our staff and clients is about reducing the probability of being an easy target. Cybersecurity isn't eas...

Listen to the Episode