All Episodes
Displaying 1 - 30 of 35 in total
35. 6 Signs Your It Company is Leaving You Exposed
How do you REALLY know that your IT company has you properly protected? How do you know you are getting what you pay for? This is one decision where you cannot afford ...
34. Ground Zero with Robert Cioffi
We've spent the last 3 weeks breaking down the formula in significant detail: using industry standards, protect your technology, protect your data, and protect your pe...
33. The Formula - Part 3: Protect Your People
In his book "Future Crimes", Marc Goodman said something that has been burned in my brain for years:“If you think technology can solve your security problems, then you...
32. The Formula - Part 2: Protect Your Data
Data backup used to be simple: a tape drive on the server and you're good to go! Now data lives everywhere. Taming this beast can be a challenge to say the least. Here...
31. The Formula - Part 1: Protect Your Technology
For Cybersecurity Awareness Month, we decided to do something special. So over the next 3 weeks we will deep-dive on each of these areas and give you a list of what ne...
30. What Exactly Is The Dark Web, Anyway?
In today’s episode, we are going to answer the burning question I know you all have: “What in the hell is the Dark Web?” Spoiler alert, we talk about the tame stuff on...
29. Can You Be Sued for NOT Paying the Ransom?
In today’s episode, we are going to talk about how to spot a phishing email (and how to get your whole company to do the same), dive into a $5 Million lawsuit for not ...
28. 4 Steps to Securing ALL of Your Critical Data
In today’s episode, we are going to talk about how to make sure ALL of your critical data is backed up, we’ll break down 2 specific security events that sent over a qu...
27. Joseph Brunsman - How to Make Sure Your Cyber Insurance Policy Pays Out in a Disaster
In this week's episode, we help business owners get proper cyber security insurance coverage, and make sure it’s paid in an emergency.
26. Pop Up Alerts Can Be Good Or Bad – How Do We Know The Difference?
In this episode, we talk about how to know the difference between good and bad popup alerts, break down the largest data leak ever, and as always, wrap it up with the ...
25. Working From Home: Security, Productivity, and Culture
In prepping for this episode, I ran a quick survey of those who work from home. There was a consistent theme: the flexibility is nice but the loneliness is real. Here'...
24. 6 Steps to Protect Against Bank Fraud
This week we discuss bank fraud and lessons learned from the CrowdStrike debacle.
21. Cybersecurity for the Road Warrior
What do Mormon Crickets have to do with cybersecurity? TBD. Meanwhile, here are some crucial protections you need to have in place before you leave for that next busin...
20. Cybersecurity and Productivity on a Budget
Unconventional Tricks for Maximizing Tech ROI
19. The Benefits and Risks of Using AI in Your Business
Leveraging AI in your small business may be the most important thing you do. But make these mistakes, and it may be game-over.
18. Cloud Security: 4 Things Business Owners Need to Know
I can't tell you how many times I've heard, "I've moved to the cloud, now I'm safe!" Nothing could be farther from the truth. In fact, a recent study of 600 organizati...
17. But... What If I DO Get Hacked?
I like to say that once you've been hit, you can never get UnHacked. Well, let's take a look at the worst-case scenario and create a plan. Just in case.
16. A Security-Minded Culture is Your Best Defense in the War on Cyber Crime
In this episode, the hosts discuss the importance of company culture in cybersecurity. They emphasize the need for businesses to prioritize cybersecurity and create a ...
15. The War Room - Surviving Cyber Attacks
In a very literal sense, without the proper formula for cyber security, your business is likely to suffer an attack from which you may never recover. This episode coul...
13. Passwords Are a Huge PITA! Let's Fix That
I like to say, "If cybersecurity protections aren't a giant pain in the ass, you're probably not doing it right." Passwords come to mind. Super long, super complex, ne...
12. Keystroke Loggers: Is Your Janitor The Problem?
Your janitor has keys to your office and is expected to enter the building when nobody's home. What if they were paid to plant spy equipment on your computers? True st...
11. Make It Happen To Somebody Else
The sad reality of cybercrime (and crime in general) is that there will always be criminals. Like I was taught when I worked as an armed guard for an armored car compa...
10. The Russians Are Coming! and what to do about it
In most episodes we talk about the devastating financial and emotional cost of a breach. This time, as far as public record goes, "The company does not expect the inci...
9. Sorry You Were Hacked - Here's a $480M Lawsuit to Brighten Your Day
An Ontario hospital system is hit with ransomware. 20,000 appointments cancelled. 267,000 patient records leaked. 3,000 employee records leaked. That's all you've got?...
8. MGM CyberNightmare
Key point: It's all about the people. We are the weakest link in the cybersecurity chain. Training, policies and procedures, and 3rd party assessments are your friend.
7. Tony Rucci - Counterintelligence Special Agent (Retired)
Antonio A. Rucci is a retired Counterintelligence Special Agent and US Army Warrant Officer, with more than 39 years of technical security experience. Tony runs a priv...
6. 80% of Cyber Incidents Caused by Human Error - And how to fix it
Cybersecurity awareness training us usually an afterthought at best. The conversation is usually about securing technology. Until this changes, we will continue to be ...