All Episodes
Tech for Business — 181 episodes
Weekly AI News Recap
AI Live Chats: Show Me the ROI
AI Live Chats: The Prompt Doctor
Tech insights from GENIANS
AI Live Chats: Enhancing Business Operations
South Korea's Basic AI Act
Master Prompting: Strategies for Success
Navigating AI Models: Finding the Right Fit
Growth through Modern File Storage
Level up your Security
Tech Trends 2026
Empowering Your Business with AI: The Journey begins
AI in Business: Find Your First Project
The Vendor Due Diligence Process
Building a Security Culture
Cyber Essentials for Infrastructure
Insights from Experience
Unmasking Ransomware as a Service
Securing Your Home Network
The Rise of Deepfakes
Building Strong Business Partnerships: Insights from Barracuda Networks
AI is transforming IT Support
Essentials of Incident Response: Part 2
Essentials of Incident Response: Part 1
SonicWall Vulnerability Breakdown
City of St. Paul Cyber Incident
CIT Origins: AI First
Cyber tips for summer trips
The End of VPNs
AI: Focus on Ethics
AI Adoption: Security First
Your AI Policy guide
Agentic AI
AI Advocate: Why Your Workplace Needs You
Tech Solutions: Spotlight on LastPass
The Power of Aura Acceleration
Mastering Copilot Prompts
Top Tech Priorities
Navigating AI Compliance
The ROI of Zero Trust
Is your business ready for AI?
IT Skills Gap: Insights from the field
Workflow Automation: Insights from Experts
HIPAA Updates 2025
DMARC for PCI DSS
DeepSeek: AI Disruptor
What is Passwordless?
Your Role in Incident Response
Cybersecurity Trends 2025
Tech Trends 2025
Maximizing Your End-of-Year IT Budget
How to Navigate Healthcare Cybersecurity Incidents
How to Balance Profitability & Risk: A CEO’s Guide
Importance of Disaster Recovery Plans
What is Network Access Control?
What is DMARC?
What Keeps Business Leaders Up at Night?
Navigating EOL
What is Smishing?
Password Security 101
MFA: The basics
Tech strategies for Government
Hardware Solutions for Designers
What are Development Services?
Rendering Reality: Elevating Commercial Dealership Experiences
Real Talk: Explaining IT Partnerships with Commercial Furniture Dealerships
Cultivate Collaboration: Inside the MSP Partnership
Weathering the CrowdStrike Delta Storm: The Importance of Business Continuity
The AI Advantage: Tools, Tactics, & Truths
How much tech is too much?
Navigating the Cyber Storm: CrowdStrike
Fight AI with AI
Tech Solutions: Spotlight on ThreatLocker
Pioneering IAM Solutions
SIEM Simplified: Securing Financial Institutions
Tech Solutions: Spotlight on Datto
IAM Unlocked: Elevating Business Security
Secure Horizons: Optimal Zero Trust
Defend & Protect: Navigating CMMC
Ascent to Advanced Zero Trust
Awareness to Action: Protecting National Assets
Zero Trust in Motion
Celebrating 100 Episodes
Navigate Zero Trust: Traditional
Cybersecurity Strategies for Thriving Commercial Workspaces
Securing Government Agencies: Cybersecurity Best Practices
The HaaS Advantage
Cyber Insurance & Compliance: A powerful partnership
Microsoft Copilot: Powering Productivity
Cybersecurity Best Practices for Manufacturing
Eliminating VPNs
Tech Solutions: Spotlight on Scale Computing
Embrace the Future: Spotlight On VMware
Zero Trust Demystified
Cybersecurity Trends 2024
Technology trends 2024
Common Compliance Questions
Cybersecurity Unveiled: Part 2
Cybersecurity Unveiled: Part 1
Is it malicious or marketing?
Seamless Server Lifecycle
Transformative Connections: The Strategic Advantage
Integrated power of cybersecurity
Incident Insights: Tales from the Frontlines
Incident Insights: Infiltration
Incident Insights: Real-Life Close Calls
Designers in the Digital Age
Hardware lifecycle: Maximizing efficiency
Bridging the Gap: Top 5 questions to ask your business leaders
Revolutionize Leadership: Top 5 questions to ask your IT team
Proactive Defense: Risk Assessment
Government Regulations: The Basics
Deep Dive: What are RTOs & RPOs?
Quality IT on Limited Budget
Why you need a tech partner
AI: Best Practices
Deep Dive into Cybercrime
Do We Trust Deep Learning Too Much?
Preparing for NIST CSF 2.0
CIT Origins: Manufacturing
PAM for Banks
PAM for SMBs
Transforming Commercial Workspaces
Compliance in the Future
How Can EDR Save My Business? - Deep Dive
Why doctors refuse to use MFA
vCISO: Is it Right for Your Business?
Cybersecurity: Staying Informed
Addressing the Cybersecurity Labor Shortage
Cybersecurity Best Practices for Healthcare
Should you take your meetings in the Metaverse?
Networking and Cloud Security - The Future
Can you afford $100,000 a month in HIPAA fines?
AI: Balancing Innovation and Ethics
Employee Engagement from the Leadership Perspective
AI - Is it replacing workers?
Taking IT From Cost Center to Revenue Driver
Insights from the 2022 IC3 Report
Protecting the Education Industry: Best Cybersecurity Practices
How Do I Choose the Right SIEM?
Do You Fear Technology?
What Is EDR?
The Death of Active Directory
Glass Shattering Moments
The Future of PCI DSS 4.0: New Standards for Data Security in a Rapidly Evolving World
Ways to Win Over: Navigating User Adoption in Technology
Decoding the Future: Navigating Chat GPT and the Cybersecurity Landscape
Privacy at work and at home
Technology and Employee Engagement
Cybersecurity Issues In The Finance Industry, And What To Do About It
I have backups, why should I be worried about ransomware?
Happy Holidays - The FUD Edition
Email Security (What Is It)
Your Guide to Cybersecurity Insurance
How To Recognize And Report Phishing
Don’t Skip Updates
Let's Talk About Deepfakes
Auto Dealers And The New Federal Trade Commission (FTC) Safeguards Rule - Part 2
Auto Dealers And The New Federal Trade Commission (FTC) Safeguards Rule - Part 1
Social Media Strategy & Cybersecurity
Cybersecurity Trends 2023
Technology Trends 2023
CIT Origins: Office Locations
CIT Origins: Late 80's to Early 90's
Are passwords going away?
The Trust Factor: Recent Events, Password Managers, & More
Return on Technology Investment
What Should You Ask a Potential Tech Partner?
Zero Trust Part II: How Do I Get Started?
Cloud vs. On Prem: The Smackdown
How Do I Budget for IT?
Zero Trust Part I: What Is It?
Maturity Model
Myths of Managed Services
Healthcare Cybersecurity Act 2022
Physical Security (Cameras, Sensors, & more!)
Choosing a Managed Service Provider (MSP)
Budgeting Migrating to the Cloud
U.S. Securities and Exchange Commission (SEC) Compliance
Technology planning for SMBs
Multi-Factor Authentication (MFA): The basics and why does my business need it?