Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts.
Our goal is Secure Outcomes and together we can make a difference.
Is there hope in the fight against ransomware? In this week's episode, I sit down with Greg Edwards of CryptoStopper to discuss ransomware and other exciting topics. It is long past due that we get…
Recently Common Controls Framework put out a survey that asked respondents questions about how well they know the people in their client's companies and the people that work there. I thought I would …
A recent post on Linkedin asked whether you do Table Top Exercises internally or with your clients? It hit me right between the eyes. We talk about the need to do them, and I am guilty of not getti…
This week I sit down with a former student, Matthew Schroeder, to talk about his take on cybersecurity. What inspired him to pursue a path in cybersecurity and the opportunities that await. While w…
People and Privacy, From one office of twenty or thirty employees to twenty offices of one employee per home office. 2020 was difficult for all of us as we adapted to new working conditions both at …
Over the past twenty-plus episodes, we inevitably get around to talking about people. In episode 22, "Cybersecurity Still Comes Down To People", only reinforces the need to hear what my guest, Craig …
Last week we talked about vendor evaluation from an MSP perspective and this week we talk about it from a client or end-user perspective. Join me as I sit down with Jon Munford of New London Communit…
In this two-part series we are taking a look at vendor evaluation from the perspective of an MSP and then next week we will look at it from the perspective of a client. While checklists are importan…
Having gaps in your cybersecurity is inevitable, but plugging gaps with products and services doesn't necessarily make you more secure. It may put your business at a greater risk of compromise. I ha…
Policies are a hot topic as insurance companies ask to see them, clients of clients ask to see them and even our peers are asking to see what policies we might have in place. Join me this week as I …
Sitting down with Marcus J. Ranum, Author of "The Myth of Homeland Security" and credited with a number of innovations in firewalls and intrusion detection systems, as well as being a co-founder at T…
Whether you are required to adhere to regulatory compliance or have voluntarily picked a framework to map your cybersecurity strategy and you inevitably come to crossroads with a vulnerability assess…
LinkedIn as a social networking platform is an extremely powerful tool. I was given some advice recently, by Corey Munson of PC Matic that I should connect with ProCircular. I followed Corey's advi…
In this week's episode, I sit down with Stel Valavanis of onShore Security to discuss Cybersecurity tools and solutions from the perspective of an MSP. Stel brings a lot of insight as he has been an…
MSPs have always provided to their clients' products and services that fall into the domains of Detection and Protection as well as Identification. That said, there are two categories in the NIST do…
The past decade and beyond the MSP has always been about managing the technology infrastructure of their clients. As the evolution of an MSP has gone from a business model that was largely break-fix…
A brief trip down memory lane to simpler times... Looking back 3-5 years we took on the likes of ransomware and malware with additional tools and products that made us look, dare I say, pretty good t…