The impact of an incident is often unknown until we enter into the aftermath. How it happened can't always be answered but the goal post incident is to determine what can be done to prevent this in the future. How do we pre...
How do we create better relationships between vendors and solution providers? How do we get vendors to lean into their partner success? How do I build confidence in those relationships? This and more as I sit down with Kevin...
We spend a lot of time and energy to protect our businesses and our client's businesses from threat actors, natural disasters and even user error. I'm pretty sure we don't spend enough time focusing on the backups of the dat...
Risk has been at the top of mind for several episodes as of late. So much so that it seems to show up in my Flipboard news feed and suddenly a LinkedIn post popped up by David Schultis, of Red Panda, talking about Risk to UN...
Within every MSP we have roles that involve Account Management and in some cases have even evolved the title to vCIO or other name. The challenge in many cases is how to charge for this role? Should it be a standalone servic...
In talking about risk we often don't address risk management plans at all. In this episode I discuss with Jim Harryman of Kinetic Technology Group, all things risk. It often starts with a Risk Assessment and we step through...
I always have wondered why we assume our end users know how to use the technology we provide them. The age old argument of 10% of the product's capability is actually used. I sit down with Charles Love to talk about all the...
I couldn't let it go... The browser or browsers have the potential to be the trojan horse. I sit down with Jim Harryman of Kinetic Group to discuss what we can do within the browser to ensure a more secure posture with resou...
You can't secure others if you don't first secure yourself. Security should be just as important at home as it is at work and you take responsibility for your actions. I sit down with Scott Augenbaum to discuss what is in ...
Regardless of which browser(s) you use how often do you patch them. Do you maintain the extensions and restrict what is and isn't sync'd. I sit down with Kenneth May of Swift Chip to discuss how we need to do a better job c...
In cybersecurity we don't spend as much time as we probably should in the area of onboarding and offboarding. Initiated by the HR department or in smaller companies perhaps handled by the company owner to bring in new employ...
A continued discussion on RMM and MDM tools. How they differ and how they overlap. In this ever evolving threat landscape they are both extremely important. In this episode Jim Harryman and I will review some of the histor...
Over the past two years I have gotten to know Brian Weiss and much of our conversation has revolved around how he continues to improve the security posture of his company. This is largely tied to an event that took place bac...
As solution providers we spend a lot of time with different tools and services to support our clients. I sit down with Charles Love of ShowTech Solutions to discuss how RMM and MDM (DM) go hand in hand in managing the assets...
Vulnerabilities and exploits happen to be very common in today's threat landscape and not all vulnerabilities are actionable. I sit down with Wes Spencer, of Fifth Wall, to provide insights to solution providers on how to co...
I think most of us would agree that protecting data is a very big part of the job as a Solution Provider. Joshua Smith and I tackle this conversation when it comes to the costs associated with protecting that data and what i...
As Solution providers (MSPs), a security first mindset can at times be difficult. We know that our responsibilities to our staff and clients is about reducing the probability of being an easy target. Cybersecurity isn't eas...
As we recover from a week in Chicago with our colleagues and friends I thought we should take a minute to recount some of the highlights. I sit down with Lenny Giller of Reliable Technology Services to get his perspective on...
The role of an MSP as trusted advisor or vCIO has evolved over the years and more recently it seems the added responsibility of security officer is added to the mix. In my conversation with Craig Buesing who is the CISO to t...
One week until ChannelCon and MSP-Ignite Pre-day. This week we have Dave Sobel, "Host of the Business of Tech Podcast." While Dave and I have been known to go down a few rabbit holes in past conversations, we manage in this ...
Table top exercises, Security Awareness Training, and vulnerability management are all ways that we look to improve our security posture. Join me as I talk to Kevin Ireland of Hack The Box regarding teaching your team to part...
ChannelCon is right around the corner and we are still discussing the culture shift to a cybersecurity first mindset. I sit down with Joshua Smith of Varonis to talk about how culture shift and doing the right thing are same...
With the theme of, "Doing the right thing," on our show I had the unique opportunity to sit down with Harry Brelsford to talk about the need for cybersecurity in the Cannabis dispensary vertical. While this is a very specifi...
As we continue our discussion around "Doing the right thing", I sit down with Eric Hanson of Inland Productivity to specifically discuss 2FA. There are so many layers in any security stack but there always seems to be a lot ...