Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

How To Secure Small Business It Environments Podcasts

Series
Series
Episodes
Language:
English
All languages
English
Afrikaans
Cymraeg
Dansk
Deutsch
Eesti
Español
Esperanto
Français
Gaeilge
Gàidhlig
Hrvatski
Indonesia
Khmer
Latviešu
Lietuvių
Malay
Nederlands
Norsk
Oʻzbekcha
Pyccĸий
Shqip
Slovenčina
Slovenščina
Suomi
Svenska
Tatar
Tiếng Việt
Türkçe
català
italiano
magyar
polski
português
română
rumantsch
Íslenska
Čeština
Ελληνικά
Български
Српски
Українська
беларуская
Қазақша
Հայերեն
עברית
اردو
العربية
فارسی
हिन्दी
বাংলা
ไทย
ქართული
中文
日本語
한국어
show episodes
 
Artwork

1
Perimeter Perspective

Next Perimeter

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Artwork

1
KnowTechTalk

Barb Paluszkiewicz

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
  continue reading
 
Loading …
Episodes
Series
Episodes
Sort:
Newest
Newest
Oldest
Longest
Shortest
Language:
English
All languages
English
Afrikaans
Cymraeg
Dansk
Deutsch
Eesti
Español
Esperanto
Français
Gaeilge
Gàidhlig
Hrvatski
Indonesia
Khmer
Latviešu
Lietuvių
Malay
Nederlands
Norsk
Oʻzbekcha
Pyccĸий
Shqip
Slovenčina
Slovenščina
Suomi
Svenska
Tatar
Tiếng Việt
Türkçe
català
italiano
magyar
polski
português
română
rumantsch
Íslenska
Čeština
Ελληνικά
Български
Српски
Українська
беларуская
Қазақша
Հայերեն
עברית
اردو
العربية
فارسی
हिन्दी
বাংলা
ไทย
ქართული
中文
日本語
한국어
show series
 
Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
  continue reading
 
Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
  continue reading
 
40% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
  continue reading
 
287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
  continue reading
 
Cybercriminals aren’t just targeting enterprises anymore. SMBs are in the crosshairs, and the consequences are costly. A single data breach can cost an SMB over $3 million, yet many businesses still lack the visibility needed to detect threats before it’s too late. In this episode of Perimeter Perspective, hosts Michael Moore and Alyssa Birchfield …
  continue reading
 
60% of small businesses close within six months of a cyberattack. Cyber threats are evolving, and small to mid-sized businesses are becoming prime targets. Traditional security solutions—like standalone antivirus and firewalls—leave dangerous gaps that attackers exploit. Businesses need a proactive, unified approach to threat detection and response…
  continue reading
 
If you're with an IT provider who is slow to respond, constantly missing deadlines or fixing the same issues over and over again, have you ever stopped and wondered why? Maybe it isn't their workload, it's their workflow. Is their checklist in their head? Are they simply forgetting things? Frank Abagnale – famously portrayed by Leonardo DiCaprio in…
  continue reading
 
Ready for SaaS security without the complexity? Managing SaaS security is becoming one of the biggest challenges for IT teams. With employees using apps like Salesforce, Dropbox, and countless others, businesses struggle to keep access secure without adding friction to everyday workflows. Legacy security approaches—like VPNs and standalone logins—f…
  continue reading
 
Are You Ready to Scale Securely? For mid-market businesses, staying secure while growing your IT infrastructure is no easy task. Legacy solutions like VPNs can leave your network vulnerable, while the costs and complexity of piecing together security tools can overwhelm even the best IT teams. What’s the solution? Network as a Service (SASE)—a clou…
  continue reading
 
Are you ready for October 2025? The end of Windows 10 is more than a deadline—it’s a wake-up call for businesses relying on outdated systems. What’s your plan to stay secure, compliant, and ahead of the curve? In this episode of Perimeter Perspective, we dive into the critical implications of Windows 10’s end of life, scheduled for October 14, 2025…
  continue reading
 
In this inaugural episode of Perimeter Perspective, we introduce the podcast, its mission, and the value it brings to IT leaders, business owners, and tech enthusiasts. Learn what Perimeter Perspective is all about, the topics we’ll cover, and why cybersecurity and IT innovation are more critical than ever. Whether you're navigating zero trust arch…
  continue reading
 
A ransomware attack occurs every 14 seconds. Cyber attacks occur once every 39 seconds. The average ransomware attack costs a company $170,000! Does your business need cyber insurance? Is cyber insurance really worth the investment? What is a cyber warranty? Barb speaks with Nick Wolf, part of Cork’s Leadership Team about Cyber Warranties. 0:00 – B…
  continue reading
 
AI – It's everywhere nowadays, reshaping our reality in ways we’ve only begun to explore. Barb goes in depth with Jimmy Hatzell – the intrepid co-founder and CEO of Hatz AI – exploring his vision and expertise to see how AI can empower, enhance and encourage transformation for MSPs and their clients. 0:00 – Barb's Introduction 0:46 – Who is Jimmy H…
  continue reading
 
Our guest, Michael Contento, is a seasoned expert who has journeyed through the whole life cycle of an MSP. We hear about Michael's story and gain invaluable insights on the MSP landscape in Canada, the dynamics of mergers, what to look for in an acquisition, and the hurdles owner-operated MSPs face. Whether you're a budding MSP looking to scale or…
  continue reading
 
Small businesses require a simple plan to protect themselves from cyber crime. Cyber attacks are unexpected, and these attacks seem to be on the increase. The good news is the majority of cyber crimes can be prevented, and a network assessment performed by an MSP is pivotal to improving security within an organization. Matthew K. Koenig from Nodewa…
  continue reading
 
In this grand symphony of small business IT, every instrument, every section plays its part. But as we know, in any great performance, a single note change can influence the whole piece. This raises a crucial question: How does a business keep track of all the subtle changes in each section? Shawn Sailer from Liongard joins Barb to explain how tool…
  continue reading
 
In today's fast-paced business environment, technology has become an integral part of almost every aspect of operations. From communications, marketing to supply chain management and Cyber Security, ALL businesses rely heavily on technology. Journalists behind industry publications, conferences, social media and research reports provide a deep unde…
  continue reading
 
Consider this: 99% of the world doesn’t speak geek, nor do they understand cybersecurity and how to protect their digital assets. For the 1% of people who are familiar with terms like Privilege Escalation, Lateral movement and Seim, you might want to continue listening to understand how to communicate effectively to the rest of the world. Joining B…
  continue reading
 
Does your business need cyber insurance? Truth is, cyber criminals are targeting smaller organizations because the smaller your business, the less prepared it is to guard itself against a cyber attack. Cyber insurance policies and riders have grown popular over the last decade as cybercriminals have become more cunning. Because of this, cyber insur…
  continue reading
 
If you are thinking about selling your IT company chances are you have come full circle. The majority of MSPs are tech turned owner operators that grew a respectable businesses and now are done and want out. They can now take that long overdue vacation, treat themselves to something nice, pay back that line of credit and finally have some REAL mone…
  continue reading
 
What is Malware? Do you constantly get hammered by pop-up ads that come from nowhere and infuriate you when using your computer? Does your computer run slow, act funny, or crash unexpectedly? Are you getting tons of spam from unknown senders? Did your internet browser suddenly change? If so, then your computer might be infected with malicious progr…
  continue reading
 
When was the last time you thought about the security and the health of your computer network? I know you are so darn busy running your business that you simply forget, until something major happens. Consider this a friendly reminder to get your network checked out – if nothing else, it’s a good way to get a third party review of your network’s sec…
  continue reading
 
Let me ask you a controversial question: When was the last time you took inventory of all the computers and devices in your organization? What is being backed up? Have you checked it? If you don’t know what hardware you own, or what software subscriptions you are paying for then you might be overpaying or getting underserved. Think of this. If you …
  continue reading
 
Did you know you are not supposed to use your mobile phone while it’s charging? When you use your phone while it’s charging, you are using more power than its being fed, and this screws up the battery. Did you also know that charging your phone overnight hurts the phone battery life? According to lifeside.com it is recommended that you charge your …
  continue reading
 
How do you decide who to hire when you reach the point in your business when you realize – I need help with the IT? IT companies can look all the same, but who can you trust to partner with? It’s no secret that everyone preaches prevention, customer service. So how do you make sure you are comparing apples to apples instead of oranges to grapefruit…
  continue reading
 
Businesses are spending more money on IT this year. Gartner predicts the global IT spend could reach $4.4 trillion this year and that’s despite rising inflation, the Russian invasion, chip shortages and talent shortages. Since we’re all leveraging technology as a competitive advantage, and looking to technology to solve our problems today, we’re go…
  continue reading
 
What should you expect to pay for IT support for your business? How do you make sure you know exactly what you are paying for? What are all the services you are buying to keep your business cyber safe? The computer industry is still young, and there are not many guides in place to protect consumers. How do you determine if the fees that are billed …
  continue reading
 
Our world has shifted online and it’s important that all of us make cybersecurity a priority. Let’s protect ourselves, our communities and our collective future. Remember: Human beings, devices, and applications all have identities. In your business, it is important to identify who your employees are, what account access they have and understanding…
  continue reading
 
Have you ever locked yourself out of your own system because you can't remember your own password? How do you know you are actually talking to someone from your tech support department? Forced password resets can be a catch 22 because changing your password all the time creates problems and so does not ever changing your password. Announcing Jimmy …
  continue reading
 
Congratulations! if you haven’t had to deal with a cyber attack, or if you were compromised the consequences weren’t significant. It seems like every day has a new cyber attack. The new computer virus’ that are out there are much like all the new “covid variants.” They’re polymorphic which means they have the ability to change their code to evade d…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play