What have you done to prepare for ransomware or other incidents that can cause repercussions that impact your business? Do you have a plan in place for post-boom or after an event has happened? This week I am joined again by Eric Hanson of Inland Productivity Solutions to discuss Protect and Detect....
Businesses come in all shapes and sizes, and when it comes to cybersecurity, there is no one size fits all. I sit down with William Mulcahey of M6 Managed IT to discuss what it means as a smaller MSP. Some good questions, and while not all of the questions necessarily have answers any of...
Sitting down with Jeremiah Grossman of Bit Discovery and Jeffrey Smith of Cyber Risk Underwriters to talk about the need to have cyber insurance. What it covers and how relatively inexpensive it is compared to not having coverage at all. Advocating for everyone to buy insurance (cyber in...
A few weeks back I attended Blue Team Con in Chicago. Based on one fo the sessions that discussed the culture challenges and shortages of qualified candidates I asked the founders of Blue Team Con to join me to discuss the challenges of finding talent and what to look for. Why are hacker (hoodies) c...
We recently talked about BCDR and making sure there is a plan in place that is communicated. It felt like we left a few things out so this week I sat down with Charles Love again to hash out some of the procedures. Join us as we discuss Tolerance, Expectations, and Categorical identifier...
I don't think there are any MSPs who aren't dealing with backups of data for their clients, whether it is for onsite data or cloud services it has become par for the course. In this episode I sit down with Charles Love of ShowTech Solutions to talk about pitfalls and obstacles we face with our...
Security and Compliance go hand in hand, but we live in a world where cybersecurity obligations are still driven by what our clients might require of us. You don't have to become an MSSP to prioritize cybersecurity in our own businesses and our clients. We don't have to be experts in c...
Power outages, slow internet, ransomware, and many other scenarios cause a finger to get pointed at someone. I know I have had a few fingers pointed at me and I know that I have also done my own share of finger pointing. In recent discussions with other MSPs I came to the following concl...
With T-Mobile, AT&T, and now even Microsoft reporting breaches questions start to come up as to what can be done. Why is this happening? Don't these companies focus on securing our information? I have also noticed that many of the answers coming from these large companies is a bit co...
We have all had an opportunity to work with a Microsoft product or two in our careers. This week I sit down with Charles Love to recap some recent O365 challenges we both faced and better prepared for future migrations, upgrades, and enhancements. Cybersecurity and O365 don't play nice o...
It seems we have covered different cybersecurity frameworks and the challenges MSPs face to become compliant, but until now we haven't talked specifically about HIPAA compliance. As an MSP you might find that you are a Business Associate and not knowing doesn't let you off the hook. Join Bry...
It seems that more often than not we talk about Cyber Insurance. The last two episodes we talked specifically about risk and going back to December 2020, Episode 8 , we talked about cyber insurance and ransomware with Frank Bauer of Vade Security. A recent voicemail from Eric Hansen of I...
Last we we discussed client risk and even a bit about our own risks. Throughout our discussion I kept thinking we need a way to score our prospective or existing clients to help determine those that bring us more risk. There is one person I know that is meticulous in how he manages the o...
Most of us can relate to a client grading system. We grade client's prompt bill payments, how they treat our techs, demands, or requests that sometimes seem outlandish or impossible. In our ever-changing world of managed services, we are now layering on security service offerings that have potential...
If you haven't seen the NIST definition of Zero Trust, then you have come to the right episode. I sit down with Bryan Sullo of Clock Tower Technologies to discuss what Zero Trust really means to those of us who operate in the realm of an MSP. As we go in circles on zero trust, we begin to unpack...
Do you ever feel like you aren't the expert? You are meeting with a prospect or an existing client, and you suddenly doubt your abilities... If you have ever been there and felt like you were just weren't good enough and what do the clients or prospects think when we don't have an answer. &nbs...
Starting with Communication and what is appropriate? We will discuss the different types of communication and when they should be used to have effective communication. When to use Chat, when to use email, when to use phones, and text messaging. This leads us down the path for incid...
As the podcast series has grown to more than 30 episodes it is starting to feel like Deja vu. We have topics to choose from that will likely go on indefinitely but is there a pattern to this madness as we work together to go on the offensive. The threat actors are still getting awa...
Is there hope in the fight against ransomware? In this week's episode, I sit down with Greg Edwards of CryptoStopper to discuss ransomware and other exciting topics. It is long past due that we get proactive and take the fight to the bad guys. There is hope and it isn't a single pr...
Recently Common Controls Framework put out a survey that asked respondents questions about how well they know the people in their client's companies and the people that work there. I thought I would really like to understand what went behind the questions and what the survey results looked like... S...