
Sign up to save your podcasts
Or
Subscribe to Stupid or Irresponsible Podcast
Spotify | Apple Podcasts | Google Podcasts
Resources:
Go to www.master-computing.com/discovery and book a 10 minute call, and we will talk about this, we will create an action plan for you.
Join our FREE Security Webinar Here
Show Notes
You are probably thinking "100%? That is B.S." right? Listen now...
It is a matter of time before they get in, that’s the bigger point here.
Interesting statistics from this study: [4:07]
Problem #1: The problem we face in security is that it is just rampant, the attacks are everywhere. They are automated. They are relatively easy to pull off. [5:58]
[7:30] – Problem #2:
“As a business owner (theoretically say I do not own an IT company or have any experience in IT). Maybe I own a law firm and I am the managing partner of the Law firm. Maybe I’m the primary doctor or physician at a local clinic. Maybe I own an accounting firm. I am the guy, I started it, I filed all the paperwork and my specialty is in my craft… How do I prevent a cyber-attack, Joe? “
What to look for in IT support:
Point #1: I as a business owner of any industry outside the IT world, I DON'T KNOW HOW to pick a good IT company.
Point #2: Just because I found a good IT company doesn’t necessarily mean I found somebody that knows anything about security.
"The problem here like I said in the beginning, I don’t know how to vet an IT company, and I sure as hell don’t know how to vet a cyber security firm." [13:07]
[13:25] – Let’s say, we hired this firm to come and protect our company. If we were going to make sure they were doing their job properly, what should we be looking for?
[14:00] - So let’s give them a formula:
The reason that we are going to lay this out is so you the listener can understand or hold your guy accountable because we don’t know how to pick them. We don’t know how to vet them, and we sure as hell don’t know how to hold them accountable. What do we really know about holding these guys accountable? [14:25]
[14:57] – Let’s go through a basic checklist of what should be happening behind the scenes to protect a company:
Starting at the top:
You have got to have somebody or some entity that is looking out for security, that stays in on this, that is just living and breathing network security all the time. Like us!
We’ve got policies, procedures, ongoing training, what are some other things that might be maybe more on the technical side? [20:00]
Quick point about Two Factor Authentication:
[20:40] – Here is a great litmus test: If you aren’t annoyed as hell at your IT company for all the security stuff and hoops you are jumping through…you better find a different one!
[21:45] – Justin’s sign off:
5
33 ratings
Subscribe to Stupid or Irresponsible Podcast
Spotify | Apple Podcasts | Google Podcasts
Resources:
Go to www.master-computing.com/discovery and book a 10 minute call, and we will talk about this, we will create an action plan for you.
Join our FREE Security Webinar Here
Show Notes
You are probably thinking "100%? That is B.S." right? Listen now...
It is a matter of time before they get in, that’s the bigger point here.
Interesting statistics from this study: [4:07]
Problem #1: The problem we face in security is that it is just rampant, the attacks are everywhere. They are automated. They are relatively easy to pull off. [5:58]
[7:30] – Problem #2:
“As a business owner (theoretically say I do not own an IT company or have any experience in IT). Maybe I own a law firm and I am the managing partner of the Law firm. Maybe I’m the primary doctor or physician at a local clinic. Maybe I own an accounting firm. I am the guy, I started it, I filed all the paperwork and my specialty is in my craft… How do I prevent a cyber-attack, Joe? “
What to look for in IT support:
Point #1: I as a business owner of any industry outside the IT world, I DON'T KNOW HOW to pick a good IT company.
Point #2: Just because I found a good IT company doesn’t necessarily mean I found somebody that knows anything about security.
"The problem here like I said in the beginning, I don’t know how to vet an IT company, and I sure as hell don’t know how to vet a cyber security firm." [13:07]
[13:25] – Let’s say, we hired this firm to come and protect our company. If we were going to make sure they were doing their job properly, what should we be looking for?
[14:00] - So let’s give them a formula:
The reason that we are going to lay this out is so you the listener can understand or hold your guy accountable because we don’t know how to pick them. We don’t know how to vet them, and we sure as hell don’t know how to hold them accountable. What do we really know about holding these guys accountable? [14:25]
[14:57] – Let’s go through a basic checklist of what should be happening behind the scenes to protect a company:
Starting at the top:
You have got to have somebody or some entity that is looking out for security, that stays in on this, that is just living and breathing network security all the time. Like us!
We’ve got policies, procedures, ongoing training, what are some other things that might be maybe more on the technical side? [20:00]
Quick point about Two Factor Authentication:
[20:40] – Here is a great litmus test: If you aren’t annoyed as hell at your IT company for all the security stuff and hoops you are jumping through…you better find a different one!
[21:45] – Justin’s sign off: