

MSP 1337
Chris Johnson
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts.
Our goal is Secure Outcomes and together we can make a difference.
Our goal is Secure Outcomes and together we can make a difference.
Episodes
Mentioned books

Nov 15, 2022 • 31min
Risky People
Risk has been at the top of mind for several episodes as of late. So much so that it seems to show up in my Flipboard news feed and suddenly a LinkedIn post popped up by David Schultis, of Red Panda, talking about Risk to UNLV students. Join us for a conversation around Risk and educating people who often are the risk.

Nov 8, 2022 • 38min
Advisory Services
Within every MSP we have roles that involve Account Management and in some cases have even evolved the title to vCIO or other name. The challenge in many cases is how to charge for this role? Should it be a standalone service offering? Is it just the tip of the spear or the whole spear? I sit down with Brian Doyle of vCIOToolbox.com to discuss this challenge and opportunity as it pertains to how we provide advisory services both internally and to our clients.

Nov 1, 2022 • 34min
Risk Management Plan
In talking about risk we often don't address risk management plans at all. In this episode I discuss with Jim Harryman of Kinetic Technology Group, all things risk. It often starts with a Risk Assessment and we step through what that might look like and how to begin building out a plan within your organization.

Oct 25, 2022 • 44min
Monitoring Cloud Services
I always have wondered why we assume our end users know how to use the technology we provide them. The age old argument of 10% of the product's capability is actually used. I sit down with Charles Love to talk about all the interesting things that go on behind the scenes with end users. We spend a lot of time on a specific vendor or two but these are just to provide good examples.

Oct 18, 2022 • 32min
Beyond Zero Trust My Browser
I couldn't let it go... The browser or browsers have the potential to be the trojan horse. I sit down with Jim Harryman of Kinetic Group to discuss what we can do within the browser to ensure a more secure posture with resources to protect the user experience. If you remember in part one of, "Zero Trust Your Browser" we talked about how much power the browser has. In this episode we focus on reining it in.

Oct 11, 2022 • 35min
Four Truths of Cybersecurity
You can't secure others if you don't first secure yourself. Security should be just as important at home as it is at work and you take responsibility for your actions. I sit down with Scott Augenbaum to discuss what is in his book, "The Secret to Cybersecurity." Spoiler alert there is no secret. We have a great conversation and I think everyone who listens will find some takeaways that will cost little to nothing to implement.

Oct 4, 2022 • 31min
Zero Trust Your Browser
Regardless of which browser(s) you use how often do you patch them. Do you maintain the extensions and restrict what is and isn't sync'd. I sit down with Kenneth May of Swift Chip to discuss how we need to do a better job creating whitelist/blacklist on apps within the browser. Educate the end user on the vulnerabilities created by adding extensions or not relaunching the browser when updates are pending. It is Cybersecurity month and I think you will find this episode will give you some serious food for thought.

Sep 27, 2022 • 39min
Onboarding and Offboarding
In cybersecurity we don't spend as much time as we probably should in the area of onboarding and offboarding. Initiated by the HR department or in smaller companies perhaps handled by the company owner to bring in new employees and then of course when an employee exits the company what does that process look like. Is this process documented and is the workflow the same for onboarding as it is offboarding? This and many other questions associated with people and their role within a company as they are hired and what happens when they leave. Thanks to Joshua Smith of Reliaquest for walking me through his recent journey of leaving one company to take a new role with another.

Sep 20, 2022 • 35min
Going Beyond RMM and MDM
A continued discussion on RMM and MDM tools. How they differ and how they overlap. In this ever evolving threat landscape they are both extremely important. In this episode Jim Harryman and I will review some of the historical reasons behind why we have them in our environments but we will really be focused on how they help us now and in the future as BYOD and Cloud computing factor in to our end user and device management.

Sep 13, 2022 • 40min
Four Years Post Breach
Over the past two years I have gotten to know Brian Weiss and much of our conversation has revolved around how he continues to improve the security posture of his company. This is largely tied to an event that took place back in March of 2018 that crippled 1/2 of his then client base. In this milestone episode 100 we recap his journey when we checked in on him for episode one almost two years ago and how the world has changed in the last four years.


