MSP 1337

Chris Johnson
undefined
Nov 15, 2022 • 31min

Risky People

Risk has been at the top of mind for several episodes as of late.  So much so that it seems to show up in my Flipboard news feed and suddenly a LinkedIn post popped up by David Schultis, of Red Panda, talking about Risk to UNLV students.  Join us for a conversation around Risk and educating people who often are the risk.
undefined
Nov 8, 2022 • 38min

Advisory Services

Within every MSP we have roles that involve Account Management and in some cases have even evolved the title to vCIO or other name.  The challenge in many cases is how to charge for this role? Should it be a standalone service offering? Is it just the tip of the spear or the whole spear?  I sit down with Brian Doyle of vCIOToolbox.com to discuss this challenge and opportunity as it pertains to how we provide advisory services both internally and to our clients.
undefined
Nov 1, 2022 • 34min

Risk Management Plan

In talking about risk we often don't address risk management plans at all.  In this episode I discuss with Jim Harryman of Kinetic Technology Group, all things risk.  It often starts with a Risk Assessment and we step through what that might look like and how to begin building out a plan within your organization.
undefined
Oct 25, 2022 • 44min

Monitoring Cloud Services

I always have wondered why we assume our end users know how to use the technology we provide them.  The age old argument of 10% of the product's capability is actually used.  I sit down with Charles Love to talk about all the interesting things that go on behind the scenes with end users.  We spend a lot of time on a specific vendor or two but these are just to provide good examples.
undefined
Oct 18, 2022 • 32min

Beyond Zero Trust My Browser

I couldn't let it go... The browser or browsers have the potential to be the trojan horse.  I sit down with Jim Harryman of Kinetic Group to discuss what we can do within the browser to ensure a more secure posture with resources to protect the user experience.  If you remember in part one of, "Zero Trust Your Browser" we talked about how much power the browser has.  In this episode we focus on reining it in.
undefined
Oct 11, 2022 • 35min

Four Truths of Cybersecurity

You can't secure others if you don't first secure yourself.  Security should be just as important at home as it is at work and you take responsibility for your actions.   I sit down with Scott Augenbaum to discuss what is in his book, "The Secret to Cybersecurity." Spoiler alert there is no secret.  We have a great conversation and I think everyone who listens will find some takeaways that will cost little to nothing to implement.
undefined
Oct 4, 2022 • 31min

Zero Trust Your Browser

Regardless of which browser(s) you use how often do you patch them.  Do you maintain the extensions and restrict what is and isn't sync'd.  I sit down with Kenneth May of Swift Chip to discuss how we need to do a better job creating whitelist/blacklist on apps within the browser. Educate the end user on the vulnerabilities created by adding extensions or not relaunching the browser when updates are pending.  It is Cybersecurity month and I think you will find this episode will give you some serious food for thought.
undefined
Sep 27, 2022 • 39min

Onboarding and Offboarding

In cybersecurity we don't spend as much time as we probably should in the area of onboarding and offboarding.  Initiated by the HR department or in smaller companies perhaps handled by the company owner to bring in new employees and then of course when an employee exits the company what does that process look like.  Is this process documented and is the workflow the same for onboarding as it is offboarding? This and many other questions associated with people and their role within a company as they are hired and what happens when they leave.  Thanks to Joshua Smith of Reliaquest for walking me through his recent journey of leaving one company to take a new role with another.
undefined
Sep 20, 2022 • 35min

Going Beyond RMM and MDM

A continued discussion on RMM and MDM tools.  How they differ and how they overlap.  In this ever evolving threat landscape they are both extremely important.  In this episode Jim Harryman and I will review some of the historical reasons behind why we have them in our environments but we will really be focused on how they help us now and in the future as BYOD and Cloud computing factor in to our end user and device management.
undefined
Sep 13, 2022 • 40min

Four Years Post Breach

Over the past two years I have gotten to know Brian Weiss and much of our conversation has revolved around how he continues to improve the security posture of his company.  This is largely tied to an event that took place back in March of 2018 that crippled 1/2 of his then client base.  In this milestone episode 100 we recap his journey when we checked in on him for episode one almost two years ago and how the world has changed in the last four years.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app