Twice a week, we'll explore a new topic or thought and unpack the vulnerabilities surrounding humans and social engineering to help you and your business become more resistant to cybercrime.
New episodes every Monday & Wednesday
MSPs can often use Third-Parys risks to escape responsibility but for many, it comes down to their own internal weaknesses and policies. Jason Slagle joins us today to talk about how you can be more …
Over the past few years, we have generated more data and information than in the entire history of humanity. This means that we have a greater need to protect our data, and the demand for professiona…
The answer to that question comes down to the implementation and today we are joined by Jason Slagle to discuss Single Sign-On. It's important to acknowledge that our security is only as strong as ou…
Have you heard of PAM or Privileged Access Management? Today, Jimmy Hatzell is here again to shed light on why it is crucial for MSPs to implement Privileged Access Management in their systems, espec…
We’ve heard so much about AI changing how we do things but is the buzz justified? Jimmy Hatzell from Cyber QP is joining me today to give his predictions on when we’ll see AI integrated into our day-…
As an MSP, one of your primary offerings to clients is security awareness training. However, it can be challenging to sell this service to clients who may not fully understand its value and importanc…
In today's world, the term "AI" is widely used, and companies are eager to utilize this technology. However, it is often just a marketing gimmick. Today, I would like to explore the potential use of …
As an MSP, it's vital to obtain buy-in from clients for cybersecurity. Leaders may think they don't need it, but they are often the most targeted due to sensitive information access. Improving the cy…
In the final part of our series about using YouTube to grow your MSP, Tom Lawrence explains how to measure your channel's success using the right metrics. He also offers valuable advice on creating c…
Welcome back to Part 2 of our series on using YouTube to grow your MSP with Tom Lawrence. Nowadays, creating content is easier than ever. You don't need expensive equipment, nor do you need to record…
We're excited to have Tom Lawrence back for a three-part series where he'll be sharing tips on how to use YouTube to market your MSP business. Tom runs his own successful YouTube channel and will pro…
Joining a community is essential for vendors to succeed, and Ray Orsini is back to follow on from our last episode. By being part of a community, vendors can build relationships based on camaraderie,…
Ray Orsini is joining me today, a guy who’s been in the MSP space for over 15 years. I ask Ray his perspective on the MSP industry's progress and how AI technology has enabled MSP personnel to concen…
If you're searching for an MSP vendor, it's important to know how to distinguish a good one from an average one. A good vendor is transparent about their processes, they prioritize honesty and integr…
Welcome aboard the Gone Phishing boat, Tom Lawrence! Today, Tom will be sharing valuable advice on how to begin your journey as an MSP. Are you wondering if it's a good time to start? Stay tuned to f…
Data breaches are happening more frequently these days, but it is surprising how many people fail to understand the seriousness of the situation. To improve security, every employee's behavior needs …
He’s back again, Wes Spencer joins us for a bit of a different conversation today. Wes is the founder of Empath Cyber so today we explore the crucial role of empathy in cybersecurity. Discover how fo…
A common complaint I hear all the time when it comes to logging in, particularly with 2FA, is that it takes too much time and effort. However, this mindset is not only flawed but also dangerous. In t…
Welcome back to the show, cybersecurity expert Wes Spencer! Today, our topic revolves around why MSPs should prioritize preventive security measures over merely fixing the issues when they occur. A c…
Choosing the right MSP-friendly tools is crucial for managed service providers to do their jobs well, but not all providers meet their needs, hindering productivity. Careful evaluation is key when ad…