MSP 1337 | Cybersecurity Education & Security Guidance

Chris Johnson | Cybersecurity Education & Security Guidance
undefined
Oct 25, 2022 • 44min

Monitoring Cloud Services

I always have wondered why we assume our end users know how to use the technology we provide them.  The age old argument of 10% of the product's capability is actually used.  I sit down with Charles Love to talk about all the interesting things that go on behind the scenes with end users.  We spend a lot of time on a specific vendor or two but these are just to provide good examples.
undefined
Oct 18, 2022 • 32min

Beyond Zero Trust My Browser

I couldn't let it go... The browser or browsers have the potential to be the trojan horse.  I sit down with Jim Harryman of Kinetic Group to discuss what we can do within the browser to ensure a more secure posture with resources to protect the user experience.  If you remember in part one of, "Zero Trust Your Browser" we talked about how much power the browser has.  In this episode we focus on reining it in.
undefined
Oct 11, 2022 • 35min

Four Truths of Cybersecurity

You can't secure others if you don't first secure yourself.  Security should be just as important at home as it is at work and you take responsibility for your actions.   I sit down with Scott Augenbaum to discuss what is in his book, "The Secret to Cybersecurity." Spoiler alert there is no secret.  We have a great conversation and I think everyone who listens will find some takeaways that will cost little to nothing to implement.
undefined
Oct 4, 2022 • 31min

Zero Trust Your Browser

Regardless of which browser(s) you use how often do you patch them.  Do you maintain the extensions and restrict what is and isn't sync'd.  I sit down with Kenneth May of Swift Chip to discuss how we need to do a better job creating whitelist/blacklist on apps within the browser. Educate the end user on the vulnerabilities created by adding extensions or not relaunching the browser when updates are pending.  It is Cybersecurity month and I think you will find this episode will give you some serious food for thought.
undefined
Sep 27, 2022 • 39min

Onboarding and Offboarding

In cybersecurity we don't spend as much time as we probably should in the area of onboarding and offboarding.  Initiated by the HR department or in smaller companies perhaps handled by the company owner to bring in new employees and then of course when an employee exits the company what does that process look like.  Is this process documented and is the workflow the same for onboarding as it is offboarding? This and many other questions associated with people and their role within a company as they are hired and what happens when they leave.  Thanks to Joshua Smith of Reliaquest for walking me through his recent journey of leaving one company to take a new role with another.
undefined
Sep 20, 2022 • 35min

Going Beyond RMM and MDM

A continued discussion on RMM and MDM tools.  How they differ and how they overlap.  In this ever evolving threat landscape they are both extremely important.  In this episode Jim Harryman and I will review some of the historical reasons behind why we have them in our environments but we will really be focused on how they help us now and in the future as BYOD and Cloud computing factor in to our end user and device management.
undefined
Sep 13, 2022 • 40min

Four Years Post Breach

Over the past two years I have gotten to know Brian Weiss and much of our conversation has revolved around how he continues to improve the security posture of his company.  This is largely tied to an event that took place back in March of 2018 that crippled 1/2 of his then client base.  In this milestone episode 100 we recap his journey when we checked in on him for episode one almost two years ago and how the world has changed in the last four years.
undefined
Sep 7, 2022 • 36min

MDM, Not Just for Mobile Devices

As solution providers we spend a lot of time with different tools and services to support our clients.  I sit down with Charles Love of ShowTech Solutions to discuss how RMM and MDM (DM) go hand in hand in managing the assets placed under our care.
undefined
Aug 30, 2022 • 37min

Vulnerabilities and Exploits

Vulnerabilities and exploits happen to be very common in today's threat landscape and not all vulnerabilities are actionable.  I sit down with Wes Spencer, of Fifth Wall, to provide insights to solution providers on how to communicate with their vendors and their clients in a way that is actionable and with credibility.  As the saying goes, "You are either part of the problem or part of the solution."
undefined
Aug 23, 2022 • 33min

Data Protection, a Moral Obligation

I think most of us would agree that protecting data is a very big part of the job as a Solution Provider.  Joshua Smith and I tackle this conversation when it comes to the costs associated with protecting that data and what it means to lead and follow in an ever evolving threat landscape.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app