Episodit
-
This week on UnHacked, weâre talking with Brad Groux (cybersecurity engineer, tech founder, and co-host of The Digital Meld podcast) about how AI is quietly shaping how we build, manage, and lead our businesses.
From SMBs to the enterprise, Brad has worked with it all. In this episode, we break down:
Why weâre already outsourcing leadership decisions to AI (and what to do about it)How SMBs can avoid tech fatigue while still innovatingThe new risks AI introduces, and how to defend against themWhy cybersecurity and business growth are now inseparableWhether you're an MSP, a manufacturer, or a business owner trying to stay ahead of the tech curve, this episode gives you a candid look at whatâs coming next and how to lead through it.
đ Guest links
đ DigitalMeld.io
đď¸ The Digital Meld Podcast -
Password fatigue isnât just annoyingâitâs expensive and dangerous. In this episode of UnHacked, Raul Cepeda Jr. from rf IDEAS breaks down the hidden costs of password dependence and shows small businesses a better way forward. From clinicians wasting hours re-logging into systems to the real risk of password-related breaches, Raul makes the case for going passwordlessâsafely, securely, and affordably.
đ Learn more at rfideas.com
đ Explore passkey adoption at fidoalliance.org -
Puuttuva jakso?
-
In this episode of UnHacked, cybersecurity strategist Brett Gallant walks us through a real-world disasterâa manufacturing plant brought to its knees by an unsecured remote access tool. We break down what went wrong, how it couldâve been prevented, and why business leaders must stop assuming their IT support has cybersecurity covered.
If youâre a manufacturerâor any business relying on third-party tools and vendorsâthis is a wake-up call you canât afford to miss.
đ Learn more about Brettâs work at adaptiveoffice.ca
đ Why Your Business Must Have Cybersecurity Risk Assessments â Amazon -
What would happen if your entire business was encrypted overnight? No files. No access. No plan.
In this episode of UnHacked, we sit down with Michael Ritsemaâcybersecurity strategist and President of i3 Business Solutionsâwhoâs helped multiple companies survive full-scale breaches. Together with co-hosts Bryan Lachapelle and Mario Zake, we unpack what actually happens when things go sideways, why most CEOs think they're covered (but aren't), and how to make your business bulletproofâstarting today.
This episode is for every business owner whoâs ever thought:
đ§ âThat wonât happen to us.â
đ§ âWe have ITâweâre fine.â
đ§ âWeâll deal with it if something comes up.â
Donât wait until âsomethingâ shows up. Learn how to lead your company through the #1 operational risk of the decadeâand how one company was saved by a $300 tape backup.
đ§ Listen in. Take action. Keep your business UnHacked. -
Three small business owners are about to discover why their $150 inspection costs are bankrupting themâand how one diplomat's experience in Syrian war zones revealed the game-changing solution.
In this eye-opening episode, cybersecurity experts Justin, Bryan, and Mario sit down with Mounir Ibrahim, former US diplomat and Chief Communications Officer at TruePic. Mounir shares how witnessing fake images derail international investigations led him to a technology that's revolutionizing how businesses verify digital content.
What You'll Learn: ⢠How to eliminate $150 inspection fees and reduce wait times from 3 days to 1 hour ⢠Why your customers' photos, receipts, and documentation can't be trusted (and what to do about it) ⢠The two major fraud threats hitting small businesses: AI-generated content and "cheap fakes" ⢠Real-world examples: Insurance claims, warranty inspections, loan applications, and merchant cash advances ⢠How one pizza shop owner can now get funding in hours instead of days
Perfect for: Small business owners doing manual inspections, anyone processing customer-submitted photos or documents, and entrepreneurs looking to expand beyond their geographic area without the traditional costs.
The Bottom Line: While we're living in the "Wild West" of digital content, smart business owners are using authentication technology to cut costs by 90%, serve customers faster, and expand into new marketsâall while protecting themselves from fraud.
-
Are your cybersecurity gaps quietly devaluing your business? In this episode, entrepreneur and advisor Jim DuBos shares the top reasons buyers walk awayâand how small business owners can protect their companyâs value before itâs too late. Learn the 3 essential controls every buyer looks for, how to build a culture of security, and why cybersecurity is a business growth strategy, not just an IT concern.
Download Jim DuBosâ Cybersecurity Program for Small Business
-
In this episode, hosts Justin Shelley and Mario Zaki welcome Dr. Ilkay Damir, a deep fake detection expert who developed FakeCatcher at Intel. Dr. Damir explains how deepfakes threaten businesses through financial scams, political misinformation, and reputation damage. She discusses her groundbreaking technology that detects fake videos by analyzing blood flow signals in faces with 96% accuracy. The conversation covers practical protection strategies for business owners, including using the Content Provenance and Authenticity (C2PA) standard and protective technologies like "My Art My Choice" that prevent AI from successfully replicating content. Dr. Damir's message: we're not doomed - businesses can protect their digital identity by being proactive and leveraging emerging authentication technologies.
-
In this episode of UnHacked, hosts Justin Shelley and Mario Zake are joined by Tim O'Hearn, author and former software engineer, to explore the darker side of social media engagement strategies. Tim shares insights from his personal journey of creating social media bots and discusses the implications of fake activity on platforms like Instagram. The conversation delves into the potential harm of artificial social proof, highlighting the need for small business owners to be discerning about social media metrics. Tim also discusses his book, Framed: A Villain's Perspective on Social Media, and the broader impact of deceptive online practices. Listen to uncover the hidden threats and learn how to navigate the complexities of social media with your business's integrity intact.
Buy Tim's book here: https://amzn.to/3XoxUC1
-
This episode focuses on the critical role people play in cybersecurity. The hosts discuss how most breaches (95-97%) involve human error, emphasizing that while technology defenses are important, humans remain the weakest link. They explore how hackers exploit human psychology through social engineering and why creating a positive security culture that rewards reporting and learning is crucial. The episode includes stories of successful security awareness programs and offers practical advice for organizations looking to strengthen their "human firewall."
-
Today we bring in a guest who consults with solopreneurs who run their businesses on Macs. This question is debated all the time: Is Mac really more secure than Windows? Well, today we heat things up on UnHacked as we battle it out.
Where is Windows more vulnerable?Where is Mac more vulnerable?What threats are the same (PC vs Mac)I don't know that we ever solved the primary question... but here are some good tips for staying safe, regardless of which platform you are passionate about.
-
Dave Sobel is the host of The Business of Tech, a podcast that delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering âWhy Do We Care?
Dave shocked me when he said, "I hate the cybersecurity industry!" So I said, "Let's discuss!" The bottom line is this: we as a society can and should do better.
As consumers of cybersecurity products and services, we need to push back on vendors. Why do they get away with having no skin in the game?As citizens, we need to push back on our leaders. Why are we always on defense? Let's play offense!As users of technology, we have our own set of responsibilities. It's time to take that seriously. -
Lori Crooks is the Founder and CEO of Cadra, Inc. The organization focuses on security assessments and security management projects. With a career focused on information security assessments, developing policies and standards, and advising clients regarding their information security requirements, Lori brings a deep understanding of information security controls
-
Eric D. Brotman, CFPÂŽ, is the CEO of BFG Financial Advisors, President of Brotman Consulting Group, LLC, host of the Donât Retire⌠Graduate! podcast, and author of the award-winning book, Donât Retire⌠Graduate!
Use code "unhacked" for a 25% discount on Eric's book: https://dontretiregraduatebook.com/
In our pre-interview meeting, Eric said: âVery few things keep me up at night. Not stocks, not capital hill, but having my identity stolen and company infiltrated.â And he has a great reason for this. Several years ago his company was hit with a ransomware attack.
-
We make a lot of assumptions in the world of tech and cybersecurity. The most common one I see is assuming that a vendor is properly protecting your data. And honestly, that feels like the only option since we can't really see behind the curtains. But what if I told you there is a way to verify that your vendors have the proper cybersecurity safeguards in place? Take a listen!
-
Last week we talked about how AI can improve processes and output. Today, weâre going to talk more about the security side of AI.
-
This week we talk with Jonathan Steele, a prominent high-stakes divorce attorney who doubles as a cybersecurity expert.
At Steele Fortress, Jonathan leverages his unique blend of legal and cybersecurity expertise to provide comprehensive cybersecurity and privacy consulting services. His deep understanding of both the legal and technical aspects of cybersecurity and privacy makes him a valuable asset to any organization looking to bolster their security posture and navigate the complex landscape of cybersecurity laws and regulations.
-
Compared to 2023, ransomware attacks increased 4x in 2024. Why? Because it's EASY! With RaaS (Ransomware as a Service), anyone can be a successful bad guy. On average, it only takes someone 74 minutes to pull off a cyberheist. No skills required.
This is the problem. Take a listen to learn the solution.
-
It's bad enough that cyber-thugs are coming for our businesses. And our bank accounts. But there's a new threat that is gaining traction: class-action lawsuits. But there's good news! A Plan of Action with Milestones (POAM for short) is your get-out-of-jail-free card. Listen up... and we'll break it down!
- Näytä enemmän