Domain Registrations and an extra invoice that has a bit of sticker shock... This and more with Charles Love of ShowTech Solutions. We have talked about doom and gloom in the past but this story is one that I am already losin...
If you haven't met me, you know that my passion is to help others with improving their cybersecurity posture. In an effort to make a bigger impact, I have brought Matt Lee of Pax8 on to the show as a special guest to talk abo...
We are all to familiar with our own mortality. In this episode we talk about the scenarios that can arise when a key person in a company holds all of the keys and is suddenly taken from us. While there is some morbidity to th...
As a podcast we pride ourselves in the focus of cybersecurity topics. This is an episode focused on Cybersecurity without talking about cybersecurity. Crazy, I think Ian Richardson of Richardson and Richardson make it almost ...
CompTIA's research team Seth Robinson and Carolyn April join me in discussing some interesting research trends that cover 4 pillars or steps that I like to refer to as the 4 Ps. Policy, Process, People, and Product. Be forewa...
Cybersecurity challenges exist in every aspect of our daily lives. Join me as I discuss with Dom Kirby of Pax8 an approach to cybersecurity with friends and family. Technology helps but it doesn't solve it all.
Ever wonder why your prospect or client gets a confused look on their face? You try to describe the new service offering or features that have been added to improve the security or efficiencies of their task force but they j...
If my organization has no technology can I still be secure? Matt Topper of Connectwise and I explore Cybersecurity with an approach that says you can prove a mature cybersecurity posture without technology. Technology is sh...
With Communities, Councils, and Forums just a few weeks away, I thought we should tee up the Unfiltered Fireside chat between Matt Lee of Pax8 and myself. In this precursor, you will hear our two different approaches to achi...
We talk a lot about social engineering and its potential impact on our employees, our businesses, and even our family and friends. What we often fail to talk about is our responsibility to ensure that our employees, clients,...
We are beginning to see a pattern in frameworks updating or adding additional privacy controls. Whether they are long overdue or not is neither here nor there as they are now being stood up. From CCPA becoming CPRA, ISO 2700...
Have you ever dealt with a client, prospect, or perhaps an internal event that caused harm to your business or others? If so I am sure you can relate to feelings of shame, and embarrassment and I am sure many sleepless night...
There is some buzz circulating about the upcoming CompTIA Cybersecurity Trustmark, Compliance with frameworks, and how to get started as a solution provider. I sit down with Matt Lee of Pax8 to discuss the opportunities pres...
I sit down with Kevin McDonald of Alvaka to talk about the three main scam types out there and what they look like. While we might not be able to prevent all threat actors from prevailing, we can make it more difficult and i...
Not to follow in everyone's footsteps on predictions... I waited to publish until January 3rd 2023. I had an opportunity to sit with Steve Alexander, Facilitator and founder of MSP-Ignite, to talk about his hope and predicti...
Looking back on 2022 with Joshua Smith of Reliaquest and Charles Love of ShowTech Solutions on looking back on the highs and lows of 2022 and what we hope for in 2023.
I brought Jim Harryman back to finish the conversation on policies and controls. We left out a few key pieces.
Whether you have decided to get prepared for an ISO, SOC2, or other audit can be a daunting task. Listen to the journey and all of it's ups and downs that Jim Harryman goes through to get a SOC2 certification and all of the ...
The impact of an incident is often unknown until we enter into the aftermath. How it happened can't always be answered but the goal post incident is to determine what can be done to prevent this in the future. How do we pre...
How do we create better relationships between vendors and solution providers? How do we get vendors to lean into their partner success? How do I build confidence in those relationships? This and more as I sit down with Kevin...
We spend a lot of time and energy to protect our businesses and our client's businesses from threat actors, natural disasters and even user error. I'm pretty sure we don't spend enough time focusing on the backups of the dat...