Download the App!
show episodes
 
Artwork

1
KnowTechTalk

Barb Paluszkiewicz

Unsubscribe
Unsubscribe
Miesięcznie
 
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
  continue reading
 
Loading …
show series
 
A ransomware attack occurs every 14 seconds. Cyber attacks occur once every 39 seconds. The average ransomware attack costs a company $170,000! Does your business need cyber insurance? Is cyber insurance really worth the investment? What is a cyber warranty? Barb speaks with Nick Wolf, part of Cork’s Leadership Team about Cyber Warranties. 0:00 – B…
  continue reading
 
AI – It's everywhere nowadays, reshaping our reality in ways we’ve only begun to explore. Barb goes in depth with Jimmy Hatzell – the intrepid co-founder and CEO of Hatz AI – exploring his vision and expertise to see how AI can empower, enhance and encourage transformation for MSPs and their clients. 0:00 – Barb's Introduction 0:46 – Who is Jimmy H…
  continue reading
 
Our guest, Michael Contento, is a seasoned expert who has journeyed through the whole life cycle of an MSP. We hear about Michael's story and gain invaluable insights on the MSP landscape in Canada, the dynamics of mergers, what to look for in an acquisition, and the hurdles owner-operated MSPs face. Whether you're a budding MSP looking to scale or…
  continue reading
 
Small businesses require a simple plan to protect themselves from cyber crime. Cyber attacks are unexpected, and these attacks seem to be on the increase. The good news is the majority of cyber crimes can be prevented, and a network assessment performed by an MSP is pivotal to improving security within an organization. Matthew K. Koenig from Nodewa…
  continue reading
 
In this grand symphony of small business IT, every instrument, every section plays its part. But as we know, in any great performance, a single note change can influence the whole piece. This raises a crucial question: How does a business keep track of all the subtle changes in each section? Shawn Sailer from Liongard joins Barb to explain how tool…
  continue reading
 
In today's fast-paced business environment, technology has become an integral part of almost every aspect of operations. From communications, marketing to supply chain management and Cyber Security, ALL businesses rely heavily on technology. Journalists behind industry publications, conferences, social media and research reports provide a deep unde…
  continue reading
 
Consider this: 99% of the world doesn’t speak geek, nor do they understand cybersecurity and how to protect their digital assets. For the 1% of people who are familiar with terms like Privilege Escalation, Lateral movement and Seim, you might want to continue listening to understand how to communicate effectively to the rest of the world. Joining B…
  continue reading
 
Does your business need cyber insurance? Truth is, cyber criminals are targeting smaller organizations because the smaller your business, the less prepared it is to guard itself against a cyber attack. Cyber insurance policies and riders have grown popular over the last decade as cybercriminals have become more cunning. Because of this, cyber insur…
  continue reading
 
If you are thinking about selling your IT company chances are you have come full circle. The majority of MSPs are tech turned owner operators that grew a respectable businesses and now are done and want out. They can now take that long overdue vacation, treat themselves to something nice, pay back that line of credit and finally have some REAL mone…
  continue reading
 
What is Malware? Do you constantly get hammered by pop-up ads that come from nowhere and infuriate you when using your computer? Does your computer run slow, act funny, or crash unexpectedly? Are you getting tons of spam from unknown senders? Did your internet browser suddenly change? If so, then your computer might be infected with malicious progr…
  continue reading
 
When was the last time you thought about the security and the health of your computer network? I know you are so darn busy running your business that you simply forget, until something major happens. Consider this a friendly reminder to get your network checked out – if nothing else, it’s a good way to get a third party review of your network’s sec…
  continue reading
 
Let me ask you a controversial question: When was the last time you took inventory of all the computers and devices in your organization? What is being backed up? Have you checked it? If you don’t know what hardware you own, or what software subscriptions you are paying for then you might be overpaying or getting underserved. Think of this. If you …
  continue reading
 
Did you know you are not supposed to use your mobile phone while it’s charging? When you use your phone while it’s charging, you are using more power than its being fed, and this screws up the battery. Did you also know that charging your phone overnight hurts the phone battery life? According to lifeside.com it is recommended that you charge your …
  continue reading
 
How do you decide who to hire when you reach the point in your business when you realize – I need help with the IT? IT companies can look all the same, but who can you trust to partner with? It’s no secret that everyone preaches prevention, customer service. So how do you make sure you are comparing apples to apples instead of oranges to grapefruit…
  continue reading
 
Businesses are spending more money on IT this year. Gartner predicts the global IT spend could reach $4.4 trillion this year and that’s despite rising inflation, the Russian invasion, chip shortages and talent shortages. Since we’re all leveraging technology as a competitive advantage, and looking to technology to solve our problems today, we’re go…
  continue reading
 
What should you expect to pay for IT support for your business? How do you make sure you know exactly what you are paying for? What are all the services you are buying to keep your business cyber safe? The computer industry is still young, and there are not many guides in place to protect consumers. How do you determine if the fees that are billed …
  continue reading
 
Our world has shifted online and it’s important that all of us make cybersecurity a priority. Let’s protect ourselves, our communities and our collective future. Remember: Human beings, devices, and applications all have identities. In your business, it is important to identify who your employees are, what account access they have and understanding…
  continue reading
 
Have you ever locked yourself out of your own system because you can't remember your own password? How do you know you are actually talking to someone from your tech support department? Forced password resets can be a catch 22 because changing your password all the time creates problems and so does not ever changing your password. Announcing Jimmy …
  continue reading
 
Congratulations! if you haven’t had to deal with a cyber attack, or if you were compromised the consequences weren’t significant. It seems like every day has a new cyber attack. The new computer virus’ that are out there are much like all the new “covid variants.” They’re polymorphic which means they have the ability to change their code to evade d…
  continue reading
 
Joining Barb Paluszkiewicz‏ for this episode of #KNOWTECHTALK talk are Paul Nebb of Titan Technologies, Henry Overton of Turn Key Solutions, Al Alper of Absolute Logic and Tim Meredith of Tech Eagles, to discuss how you can choose the right IT company to support your business. Listen to this podcast and you'll discover: 0:00- 2:32 - Intro 02:33-10:…
  continue reading
 
Listen To This Podcast and You'll Discover: The 3 most common ways IT services companies charge for their services and the pros and cons of each approach A common billing model that puts ALL THE RISK on you, the customer when buying IT services; you'll learn what it is and why you need to avoid agreeing to it Exclusions, hidden fees and other "Gotc…
  continue reading
 
If you want to prevent your personal or business identity from being stolen by a cybercriminal, have a listen to what Namik Muduroglu from Human ID shares. You will discover: 1:55 - What is classified as Personal Identifiable Information 2:11 - What is not classified as Personal Identifiable Information & Anonymous 3:00 - Who is Namik Muduroglu & H…
  continue reading
 
Counterfeit emails are really hard to spot, and in situations like business email comprise the attacker is impersonating the real owner, and the real owner has *no idea* what’s going on. Listen to Kelvin Tegelaar of Lime Networks and Barb Paluszkiewicz of CDN Technologies go through a mini table top on good practices and controls that you may want …
  continue reading
 
Ask yourself this key question... would you pay the ransom? The story that Felicia and Barb talk about is all true. Colonial Pipeline, despite having at IT department got hit with ransomware and paid a 4.4 million dollar ransom. Listen to Felicia King, President of Quality Plus Consulting and Barb Paluszkiewicz, CEO of CDN Technologies, talk about …
  continue reading
 
As you replace and upgrade your computers, servers, phones, mobiles, tablets, printers, scanners, firewalls, routers, e- waste is becoming the largest and fastest growing waste stream. How do you know if you have fully erased your hard drive? Tony Perrotta, President and CEO of Greentec talks with Barb Paluszkiewicz of CDN Technologies on Know Tech…
  continue reading
 
Loading …

Skrócona instrukcja obsługi