PodParley PodParley
2 Minute Tech Tips - Business Cybersecurity cover art

All Episodes

2 Minute Tech Tips - Business Cybersecurity — 88 episodes

#
Title
1

News and Tips for May 17, 2024

2

News and Tips for May 10, 2024

3

News and Tips for May 3, 2024

4

News and Tips for April 26, 2024

5

Tips for Combating Phishing

6

Tips to Combat Ransomware

7

Navigating ISP Headaches

8

Intro to PassKey

9

Malware and Anti-virus protection best practices

10

Password and MFA Best Practices

11

Firewall and Network Best Practices

12

Backup Best Practices

13

MSPs and Evolving Tech

14

MSPs Can Save You Money

15

Get organized and stay that way

16

Stay compliant and feel safe

17

Scale up your business tech

18

MSPs Role in your business

19

Zero Trust refresher

20

Cloud AD versus Local AD

21

Special Episode - Microsoft Copilot

22

Cloud Active Directory

23

Active Directory for Businesses

24

Mainting Mental Hygiene

25

Digital Workspace Hygiene

26

Clean Out the Dust

27

Your Kids Cyber Hygiene

28

Cyber Hygiene

29

Know Your Cloud

30

Explaining the Cloud

31

Backups: Be Prepared

32

Tips to identifying scam emails

33

Identifying Quality ISPs

34

Backup Business Internet

35

Power Hazards

36

Your business needs a reliable IT partner

37

Deploying a next-gen firewall system

38

Set your business I.T. up for success

39

Dealing with the trauma of getting hacked

40

What to do after you get hacked

41

What to do if you get hacked

42

More to stay safe Outside the office network

43

Staying safe outside the office network

44

Know Your Network

45

Until it breaks

46

Tips for troubleshooting

47

Spam

48

Spyware

49

Adware

50

Malware

51

Virus

52

Ransomware

53

Phishing

54

Invest in Your Health

55

Invest in Training

56

Invest in Real Experts

57

Invest in security

58

Invest in Technology

59

PC components: Build quality and Series Wrap

60

PC components: PSU and Cooling System

61

PC components: Motherboard and GPU

62

PC Components: Storage

63

PC components: CPU

64

PC components: RAM

65

Wrapping up Zero Trust Networking

66

The Final Steps to Zero Trust Network

67

Step Two to Zero Trust Network

68

Step One to Zero Trust Network

69

What is Zero Trust on a Network

70

Setup a domain for security and control

71

Uninterruptible Power Supply

72

More email security (Filtering Systems)

73

Creating a tunnel with VPNs

74

Managing Necessary, Healthy Changes

75

Don't Panic, A Cybersecurity Guide to Ransomware

76

Mental Health in Cybersecurity

77

Security and the Remote Worker

78

The One Anti-virus to Rule Them All

79

What is a Managed Service Provider

80

Mostly Convenient Forms of MFA

81

Your password should not be "password"

82

Multi-factor Authentication and its Necessary Annoyance

83

Firewalls, or The Dangers of an Open Network

84

The Importance of Good Backups

85

DON'T CLICK THAT EMAIL!!!!

86

Business Cybersecurity Basics Part 2

87

Business Cybersecurity Basics Part 1

88

Two Minute Tech Tips Introduction