Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts.
Our goal is Secure Outcomes and together we can make a difference.
Your employees might already use AI for either work or personal, but are you using it for your business? I sit down with Jimmy Hatzel of Hatz.ai to discuss the challenges and impact of AI and its usa…
With FFIEC retiring the CAT assessment in August 2025, it might seem daunting to consider other frameworks as a path forward. I sat down with Dan Sitton of Guardian Technology Group to discuss his ba…
The Last Control Domain discussed on the fireside chat is Physical and Environmental Security. This domain was taken directly from the CompTIA Cybersecurity Trustmark, and while it wasn't done in seq…
Whether you are aligning your cybersecurity to CIS Top 18, the Cybersecurity Trustmark, or any of the many other frameworks, you are bound to get stuck in an attempt to achieve perfection. I sit down…
Many of us remember the days of trying to recover data off of a physically damaged drive, human error of deleted files, and many other scenarios. I sit down with Sarah Farrell and Andy Maus of Drive …
As we wrap up Cybersecurity Month, I had a chance to sit down with Wayne Selk, VP of CompTIA Cybersecurity Programs and Executive Director of CompTIA ISAO, to discuss Risk Management and its role in …
We have discussed what happens when a vendor is just gone. What happens when a vendor has an outage or some business disruption? Do you jump to another vendor? Do you plan to weather the storm, or do…
What is your company's will? This Fireside Chat with Matt Lee tackles the Acceptable Use Policy, Written information security plan, Roles, and responsibilities. Please give us feedback, as we have a …
From CompTIA MSP Community to the larger IT Community at large. Dawn Sizer of 3rd Element Consulting and Henry Timm of Phantom Technology Solutions are great CompTIA community members who volunteer t…
Talking about risk shouldn't be difficult, but it is as I sit down with Peter Maynard of SMB1001. There are so many challenges in cybersecurity, but sometimes we need to look through the lens of risk…
Most technological advancements in IT or OT are made with the best of intentions. What happens when the technology you have acquired causes unintended consequences? I sit down with Ryan Morris of Mor…
Control 18 has only five safeguards, yet you can spend an entire year preparing for it. Matt Lee of Pax8 and I will help you understand each safeguard and the importance of getting this right and the…
Don't Forget about VoIP as you onboard new clients or even with existing clients. There are significant risks in not including some level of management of the VoIP system or providing some support wh…
Each of the items in the title are titles for show episodes dating all the way back to the beginning of 2020. They have made the top 10 playbacks for all time. I sit down with Chad Holstead of the BK…
We take a moment to remember where we were as an MSP. Joshua Smith of Reliaquest and Charles Love of ShowTech Solutions and I reflect on the technologies and challenges we faced more than eight years…
Last week we talked about playbooks and runbooks... This week we are back in the CIS Top 18 controls, #17 and while the timing might be coincidental it is a perfect fit. What we have learned going th…
What happens if your RMM goes down and doesn't come back? We sit down with Mike Stewart of Anchor Networks and Charles Love of ShowTech Solutions to get their take on the importance of Runbooks. By t…
I always like to catch one or two attendees of an event after they get home to see what did they come away with. I spoke with Jim Harryman of Kinetic Technology Group to get his reaction on an event …
The demand for cyber soldiers is always on the rise. We look at the challenges of protecting Critical Infrastructure and that while there is a lot of Doom and Gloom... there is hope. I sit down with …
Using a framework to find gaps in your organization is a great way to improve your security posture. Have you thought about using the same framework with your clients? I think you find this discussio…