Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Justin Shelley and Phoenix IT Advisors. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Justin Shelley and Phoenix IT Advisors or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

45. How to Protect Your Business When Using 3rd Party Integrations

33:16
 
Share
 

Manage episode 472668509 series 3338921
Content provided by Justin Shelley and Phoenix IT Advisors. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Justin Shelley and Phoenix IT Advisors or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

We make a lot of assumptions in the world of tech and cybersecurity. The most common one I see is assuming that a vendor is properly protecting your data. And honestly, that feels like the only option since we can't really see behind the curtains. But what if I told you there is a way to verify that your vendors have the proper cybersecurity safeguards in place? Take a listen!

  continue reading

55 episodes

Artwork
iconShare
 
Manage episode 472668509 series 3338921
Content provided by Justin Shelley and Phoenix IT Advisors. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Justin Shelley and Phoenix IT Advisors or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

We make a lot of assumptions in the world of tech and cybersecurity. The most common one I see is assuming that a vendor is properly protecting your data. And honestly, that feels like the only option since we can't really see behind the curtains. But what if I told you there is a way to verify that your vendors have the proper cybersecurity safeguards in place? Take a listen!

  continue reading

55 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play