The Last Control Domain discussed on the fireside chat is Physical and Environmental Security. This domain was taken directly from the CompTIA Cybersecurity Trustmark, and while it wasn't done in sequence like the majority of...
Whether you are aligning your cybersecurity to CIS Top 18, the Cybersecurity Trustmark, or any of the many other frameworks, you are bound to get stuck in an attempt to achieve perfection. I sit down with Charles Love of Show...
Many of us remember the days of trying to recover data off of a physically damaged drive, human error of deleted files, and many other scenarios. I sit down with Sarah Farrell and Andy Maus of Drive Savers to debunk a few myt...
As we wrap up Cybersecurity Month, I had a chance to sit down with Wayne Selk, VP of CompTIA Cybersecurity Programs and Executive Director of CompTIA ISAO, to discuss Risk Management and its role in cybersecurity—flashback to...
We have discussed what happens when a vendor is just gone. What happens when a vendor has an outage or some business disruption? Do you jump to another vendor? Do you plan to weather the storm, or do you pivot? Eric Hanson of...
What is your company's will? This Fireside Chat with Matt Lee tackles the Acceptable Use Policy, Written information security plan, Roles, and responsibilities. Please give us feedback, as we have a pretty healthy disagreemen...
From CompTIA MSP Community to the larger IT Community at large. Dawn Sizer of 3rd Element Consulting and Henry Timm of Phantom Technology Solutions are great CompTIA community members who volunteer their time for not just Com...
Talking about risk shouldn't be difficult, but it is as I sit down with Peter Maynard of SMB1001. There are so many challenges in cybersecurity, but sometimes we need to look through the lens of risk. SMBs worldwide will soon...
Most technological advancements in IT or OT are made with the best of intentions. What happens when the technology you have acquired causes unintended consequences? I sit down with Ryan Morris of Morris Management Partners to...
Control 18 has only five safeguards, yet you can spend an entire year preparing for it. Matt Lee of Pax8 and I will help you understand each safeguard and the importance of getting this right and the pitfalls to avoid.
Don't Forget about VoIP as you onboard new clients or even with existing clients. There are significant risks in not including some level of management of the VoIP system or providing some support when there are issues on the...
Each of the items in the title are titles for show episodes dating all the way back to the beginning of 2020. They have made the top 10 playbacks for all time. I sit down with Chad Holstead of the BKS Team to talk through cur...
We take a moment to remember where we were as an MSP. Joshua Smith of Reliaquest and Charles Love of ShowTech Solutions and I reflect on the technologies and challenges we faced more than eight years ago and then look at what...
Last week we talked about playbooks and runbooks... This week we are back in the CIS Top 18 controls, #17 and while the timing might be coincidental it is a perfect fit. What we have learned going through the first 16 control...
What happens if your RMM goes down and doesn't come back? We sit down with Mike Stewart of Anchor Networks and Charles Love of ShowTech Solutions to get their take on the importance of Runbooks. By the way, they were at a pee...
I always like to catch one or two attendees of an event after they get home to see what did they come away with. I spoke with Jim Harryman of Kinetic Technology Group to get his reaction on an event that he has now attended f...
The demand for cyber soldiers is always on the rise. We look at the challenges of protecting Critical Infrastructure and that while there is a lot of Doom and Gloom... there is hope. I sit down with Chris Storey of Qriar to d...
Using a framework to find gaps in your organization is a great way to improve your security posture. Have you thought about using the same framework with your clients? I think you find this discussion with Jim Harryman of Kin...
We are finally talking about Application Software Security with Matt Lee of Pax8. We went deep on a few safeguards and found some tangents.
Ever wonder what the world outside of IT does with cybersecurity awareness training? If they don’t engage with an MSP, how many do it at all? I sit down with Jennie Johnson of TCE Company to get her perspective on transitioni...
We have all configured Email automation at some point and we often use systems and tools that automate email notifications with actions or instructions. With that being said, how often do we check in on the recipient as to wh...
Talking through the CompTIA Cybersecurity Audit outcome with Jim Harryman of Kinetic Technology Group. Obtaining the Trustmark is no small feat and requires dedication and effort by the entire organization. In this episode, w...
We find ourselves getting closer to the end of CIS Top 18. In this episode, Matt Lee of Pax8 and I discuss Service Provider Management. Matt does an excellent job of laying out a success path for any MSP to implement. You sho...
If you didn't get a chance to attend the sessions on MSP+ Playbooks or tabletop exercises, then join Matt Topper and me as we recap some of our interactions with attendees and feedback from both our sessions. In this episode ...