

MSP 1337 | Cybersecurity Education & Security Guidance
Chris Johnson | Cybersecurity Education & Security Guidance
Educational sound bytes to help MSPs and their clients navigate Cybersecurity. Cybersecurity maturity is a journey; don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts.
Our goal is Secure Outcomes, and together we can make a difference.
Our goal is Secure Outcomes, and together we can make a difference.
Episodes
Mentioned books

Oct 25, 2022 • 44min
Monitoring Cloud Services
I always have wondered why we assume our end users know how to use the technology we provide them. The age old argument of 10% of the product's capability is actually used. I sit down with Charles Love to talk about all the interesting things that go on behind the scenes with end users. We spend a lot of time on a specific vendor or two but these are just to provide good examples.

Oct 18, 2022 • 32min
Beyond Zero Trust My Browser
I couldn't let it go... The browser or browsers have the potential to be the trojan horse. I sit down with Jim Harryman of Kinetic Group to discuss what we can do within the browser to ensure a more secure posture with resources to protect the user experience. If you remember in part one of, "Zero Trust Your Browser" we talked about how much power the browser has. In this episode we focus on reining it in.

Oct 11, 2022 • 35min
Four Truths of Cybersecurity
You can't secure others if you don't first secure yourself. Security should be just as important at home as it is at work and you take responsibility for your actions. I sit down with Scott Augenbaum to discuss what is in his book, "The Secret to Cybersecurity." Spoiler alert there is no secret. We have a great conversation and I think everyone who listens will find some takeaways that will cost little to nothing to implement.

Oct 4, 2022 • 31min
Zero Trust Your Browser
Regardless of which browser(s) you use how often do you patch them. Do you maintain the extensions and restrict what is and isn't sync'd. I sit down with Kenneth May of Swift Chip to discuss how we need to do a better job creating whitelist/blacklist on apps within the browser. Educate the end user on the vulnerabilities created by adding extensions or not relaunching the browser when updates are pending. It is Cybersecurity month and I think you will find this episode will give you some serious food for thought.

Sep 27, 2022 • 39min
Onboarding and Offboarding
In cybersecurity we don't spend as much time as we probably should in the area of onboarding and offboarding. Initiated by the HR department or in smaller companies perhaps handled by the company owner to bring in new employees and then of course when an employee exits the company what does that process look like. Is this process documented and is the workflow the same for onboarding as it is offboarding? This and many other questions associated with people and their role within a company as they are hired and what happens when they leave. Thanks to Joshua Smith of Reliaquest for walking me through his recent journey of leaving one company to take a new role with another.

Sep 20, 2022 • 35min
Going Beyond RMM and MDM
A continued discussion on RMM and MDM tools. How they differ and how they overlap. In this ever evolving threat landscape they are both extremely important. In this episode Jim Harryman and I will review some of the historical reasons behind why we have them in our environments but we will really be focused on how they help us now and in the future as BYOD and Cloud computing factor in to our end user and device management.

Sep 13, 2022 • 40min
Four Years Post Breach
Over the past two years I have gotten to know Brian Weiss and much of our conversation has revolved around how he continues to improve the security posture of his company. This is largely tied to an event that took place back in March of 2018 that crippled 1/2 of his then client base. In this milestone episode 100 we recap his journey when we checked in on him for episode one almost two years ago and how the world has changed in the last four years.

Sep 7, 2022 • 36min
MDM, Not Just for Mobile Devices
As solution providers we spend a lot of time with different tools and services to support our clients. I sit down with Charles Love of ShowTech Solutions to discuss how RMM and MDM (DM) go hand in hand in managing the assets placed under our care.

Aug 30, 2022 • 37min
Vulnerabilities and Exploits
Vulnerabilities and exploits happen to be very common in today's threat landscape and not all vulnerabilities are actionable. I sit down with Wes Spencer, of Fifth Wall, to provide insights to solution providers on how to communicate with their vendors and their clients in a way that is actionable and with credibility. As the saying goes, "You are either part of the problem or part of the solution."

Aug 23, 2022 • 33min
Data Protection, a Moral Obligation
I think most of us would agree that protecting data is a very big part of the job as a Solution Provider. Joshua Smith and I tackle this conversation when it comes to the costs associated with protecting that data and what it means to lead and follow in an ever evolving threat landscape.


