
Mario Zaki
During my career, I have advised clients on effective – and cost-effective – approaches to developing infrastructure that fosters productivity and profitability. My work has provided me with a broad-based knowledge of business from the inside, with an expertise in areas that go beyond IT alone, ranging from strategic planning to cloud computing to workflow automation solutions.
Appears in 39 Episodes
16. A Security-Minded Culture is Your Best Defense in the War on Cyber Crime
In this episode, the hosts discuss the importance of company culture in cybersecurity. They emphasize the need for businesses to prioritize cybersecurity and create a ...

15. The War Room - Surviving Cyber Attacks
In a very literal sense, without the proper formula for cyber security, your business is likely to suffer an attack from which you may never recover. This episode coul...

13. Passwords Are a Huge PITA! Let's Fix That
I like to say, "If cybersecurity protections aren't a giant pain in the ass, you're probably not doing it right." Passwords come to mind. Super long, super complex, ne...

12. Keystroke Loggers: Is Your Janitor The Problem?
Your janitor has keys to your office and is expected to enter the building when nobody's home. What if they were paid to plant spy equipment on your computers? True st...

11. Make It Happen To Somebody Else
The sad reality of cybercrime (and crime in general) is that there will always be criminals. Like I was taught when I worked as an armed guard for an armored car compa...

10. The Russians Are Coming! and what to do about it
In most episodes we talk about the devastating financial and emotional cost of a breach. This time, as far as public record goes, "The company does not expect the inci...

9. Sorry You Were Hacked - Here's a $480M Lawsuit to Brighten Your Day
An Ontario hospital system is hit with ransomware. 20,000 appointments cancelled. 267,000 patient records leaked. 3,000 employee records leaked. That's all you've got?...

8. MGM CyberNightmare
Key point: It's all about the people. We are the weakest link in the cybersecurity chain. Training, policies and procedures, and 3rd party assessments are your friend.
