Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry expe... more
FAQs about MSP 1337:How many episodes does MSP 1337 have?The podcast currently has 235 episodes available.
October 18, 2022Beyond Zero Trust My BrowserI couldn't let it go... The browser or browsers have the potential to be the trojan horse. I sit down with Jim Harryman of Kinetic Group to discuss what we can do within the browser to ensure a more secure posture with resources to protect the user experience. If you remember in part one of, "Zero Trust Your Browser" we talked about how much power the browser has. In this episode we focus on reining it in....more32minPlay
October 11, 2022Four Truths of CybersecurityYou can't secure others if you don't first secure yourself. Security should be just as important at home as it is at work and you take responsibility for your actions. I sit down with Scott Augenbaum to discuss what is in his book, "The Secret to Cybersecurity." Spoiler alert there is no secret. We have a great conversation and I think everyone who listens will find some takeaways that will cost little to nothing to implement....more36minPlay
October 04, 2022Zero Trust Your BrowserRegardless of which browser(s) you use how often do you patch them. Do you maintain the extensions and restrict what is and isn't sync'd. I sit down with Kenneth May of Swift Chip to discuss how we need to do a better job creating whitelist/blacklist on apps within the browser. Educate the end user on the vulnerabilities created by adding extensions or not relaunching the browser when updates are pending. It is Cybersecurity month and I think you will find this episode will give you some serious food for thought....more31minPlay
September 27, 2022Onboarding and OffboardingIn cybersecurity we don't spend as much time as we probably should in the area of onboarding and offboarding. Initiated by the HR department or in smaller companies perhaps handled by the company owner to bring in new employees and then of course when an employee exits the company what does that process look like. Is this process documented and is the workflow the same for onboarding as it is offboarding? This and many other questions associated with people and their role within a company as they are hired and what happens when they leave. Thanks to Joshua Smith of Reliaquest for walking me through his recent journey of leaving one company to take a new role with another....more39minPlay
September 20, 2022Going Beyond RMM and MDMA continued discussion on RMM and MDM tools. How they differ and how they overlap. In this ever evolving threat landscape they are both extremely important. In this episode Jim Harryman and I will review some of the historical reasons behind why we have them in our environments but we will really be focused on how they help us now and in the future as BYOD and Cloud computing factor in to our end user and device management....more35minPlay
September 13, 2022Four Years Post BreachOver the past two years I have gotten to know Brian Weiss and much of our conversation has revolved around how he continues to improve the security posture of his company. This is largely tied to an event that took place back in March of 2018 that crippled 1/2 of his then client base. In this milestone episode 100 we recap his journey when we checked in on him for episode one almost two years ago and how the world has changed in the last four years....more41minPlay
September 07, 2022MDM, Not Just for Mobile DevicesAs solution providers we spend a lot of time with different tools and services to support our clients. I sit down with Charles Love of ShowTech Solutions to discuss how RMM and MDM (DM) go hand in hand in managing the assets placed under our care....more36minPlay
August 30, 2022Vulnerabilities and ExploitsVulnerabilities and exploits happen to be very common in today's threat landscape and not all vulnerabilities are actionable. I sit down with Wes Spencer, of Fifth Wall, to provide insights to solution providers on how to communicate with their vendors and their clients in a way that is actionable and with credibility. As the saying goes, "You are either part of the problem or part of the solution."...more38minPlay
August 23, 2022Data Protection, a Moral ObligationI think most of us would agree that protecting data is a very big part of the job as a Solution Provider. Joshua Smith and I tackle this conversation when it comes to the costs associated with protecting that data and what it means to lead and follow in an ever evolving threat landscape....more34minPlay
August 16, 2022What are Integrator Groups?As Solution providers (MSPs), a security first mindset can at times be difficult. We know that our responsibilities to our staff and clients is about reducing the probability of being an easy target. Cybersecurity isn't easy but it get's easier when you do it with others. Chad Holstead and I discuss what it means to be part of an integrator group that has agreed upon a set of standards or controls to improve their security posture....more35minPlay
FAQs about MSP 1337:How many episodes does MSP 1337 have?The podcast currently has 235 episodes available.