Tech for Business cover art

All Episodes

Tech for Business — 181 episodes

#
Title
1

Weekly AI News Recap

2

AI Live Chats: Show Me the ROI

3

AI Live Chats: The Prompt Doctor

4

Tech insights from GENIANS

5

AI Live Chats: Enhancing Business Operations

6

South Korea's Basic AI Act

7

Master Prompting: Strategies for Success

8

Navigating AI Models: Finding the Right Fit

9

Growth through Modern File Storage

10

Level up your Security

11

Tech Trends 2026

12

Empowering Your Business with AI: The Journey begins

13

AI in Business: Find Your First Project

14

The Vendor Due Diligence Process

15

Building a Security Culture

16

Cyber Essentials for Infrastructure

17

Insights from Experience

18

Unmasking Ransomware as a Service

19

Securing Your Home Network

20

The Rise of Deepfakes

21

Building Strong Business Partnerships: Insights from Barracuda Networks

22

AI is transforming IT Support

23

Essentials of Incident Response: Part 2

24

Essentials of Incident Response: Part 1

25

SonicWall Vulnerability Breakdown

26

City of St. Paul Cyber Incident

27

CIT Origins: AI First

28

Cyber tips for summer trips

29

The End of VPNs

30

AI: Focus on Ethics

31

AI Adoption: Security First

32

Your AI Policy guide

33

Agentic AI

34

AI Advocate: Why Your Workplace Needs You

35

Tech Solutions: Spotlight on LastPass

36

The Power of Aura Acceleration

37

Mastering Copilot Prompts

38

Top Tech Priorities

39

Navigating AI Compliance

40

The ROI of Zero Trust

41

Is your business ready for AI?

42

IT Skills Gap: Insights from the field

43

Workflow Automation: Insights from Experts

44

HIPAA Updates 2025

45

DMARC for PCI DSS

46

DeepSeek: AI Disruptor

47

What is Passwordless?

48

Your Role in Incident Response

49

Cybersecurity Trends 2025

50

Tech Trends 2025

51

Maximizing Your End-of-Year IT Budget

52

How to Navigate Healthcare Cybersecurity Incidents

53

How to Balance Profitability & Risk: A CEO’s Guide

54

Importance of Disaster Recovery Plans

55

What is Network Access Control?

56

What is DMARC?

57

What Keeps Business Leaders Up at Night?

58

Navigating EOL

59

What is Smishing?

60

Password Security 101

61

MFA: The basics

62

Tech strategies for Government

63

Hardware Solutions for Designers

64

What are Development Services?

65

Rendering Reality: Elevating Commercial Dealership Experiences

66

Real Talk: Explaining IT Partnerships with Commercial Furniture Dealerships

67

Cultivate Collaboration: Inside the MSP Partnership

68

Weathering the CrowdStrike Delta Storm: The Importance of Business Continuity

69

The AI Advantage: Tools, Tactics, & Truths

70

How much tech is too much?

71

Navigating the Cyber Storm: CrowdStrike

72

Fight AI with AI

73

Tech Solutions: Spotlight on ThreatLocker

74

Pioneering IAM Solutions

75

SIEM Simplified: Securing Financial Institutions

76

Tech Solutions: Spotlight on Datto

77

IAM Unlocked: Elevating Business Security

78

Secure Horizons: Optimal Zero Trust

79

Defend & Protect: Navigating CMMC

80

Ascent to Advanced Zero Trust

81

Awareness to Action: Protecting National Assets

82

Zero Trust in Motion

83

Celebrating 100 Episodes

84

Navigate Zero Trust: Traditional

85

Cybersecurity Strategies for Thriving Commercial Workspaces

86

Securing Government Agencies: Cybersecurity Best Practices

87

The HaaS Advantage

88

Cyber Insurance & Compliance: A powerful partnership

89

Microsoft Copilot: Powering Productivity

90

Cybersecurity Best Practices for Manufacturing

91

Eliminating VPNs

92

Tech Solutions: Spotlight on Scale Computing

93

Embrace the Future: Spotlight On VMware

94

Zero Trust Demystified

95

Cybersecurity Trends 2024

96

Technology trends 2024

97

Common Compliance Questions

98

Cybersecurity Unveiled: Part 2

99

Cybersecurity Unveiled: Part 1

100

Is it malicious or marketing?

101

Seamless Server Lifecycle

102

Transformative Connections: The Strategic Advantage

103

Integrated power of cybersecurity

104

Incident Insights: Tales from the Frontlines

105

Incident Insights: Infiltration

106

Incident Insights: Real-Life Close Calls

107

Designers in the Digital Age

108

Hardware lifecycle: Maximizing efficiency

109

Bridging the Gap: Top 5 questions to ask your business leaders

110

Revolutionize Leadership: Top 5 questions to ask your IT team

111

Proactive Defense: Risk Assessment

112

Government Regulations: The Basics

113

Deep Dive: What are RTOs & RPOs?

114

Quality IT on Limited Budget

115

Why you need a tech partner

116

AI: Best Practices

117

Deep Dive into Cybercrime

118

Do We Trust Deep Learning Too Much?

119

Preparing for NIST CSF 2.0

120

CIT Origins: Manufacturing

121

PAM for Banks

122

PAM for SMBs

123

Transforming Commercial Workspaces

124

Compliance in the Future

125

How Can EDR Save My Business? - Deep Dive

126

Why doctors refuse to use MFA

127

vCISO: Is it Right for Your Business?

128

Cybersecurity: Staying Informed

129

Addressing the Cybersecurity Labor Shortage

130

Cybersecurity Best Practices for Healthcare

131

Should you take your meetings in the Metaverse?

132

Networking and Cloud Security - The Future

133

Can you afford $100,000 a month in HIPAA fines?

134

AI: Balancing Innovation and Ethics

135

Employee Engagement from the Leadership Perspective

136

AI - Is it replacing workers?

137

Taking IT From Cost Center to Revenue Driver

138

Insights from the 2022 IC3 Report

139

Protecting the Education Industry: Best Cybersecurity Practices

140

How Do I Choose the Right SIEM?

141

Do You Fear Technology?

142

What Is EDR?

143

The Death of Active Directory

144

Glass Shattering Moments

145

The Future of PCI DSS 4.0: New Standards for Data Security in a Rapidly Evolving World

146

Ways to Win Over: Navigating User Adoption in Technology

147

Decoding the Future: Navigating Chat GPT and the Cybersecurity Landscape

148

Privacy at work and at home

149

Technology and Employee Engagement

150

Cybersecurity Issues In The Finance Industry, And What To Do About It

151

I have backups, why should I be worried about ransomware?

152

Happy Holidays - The FUD Edition

153

Email Security (What Is It)

154

Your Guide to Cybersecurity Insurance

155

How To Recognize And Report Phishing

156

Don’t Skip Updates

157

Let's Talk About Deepfakes

158

Auto Dealers And The New Federal Trade Commission (FTC) Safeguards Rule - Part 2

159

Auto Dealers And The New Federal Trade Commission (FTC) Safeguards Rule - Part 1

160

Social Media Strategy & Cybersecurity

161

Cybersecurity Trends 2023

162

Technology Trends 2023

163

CIT Origins: Office Locations

164

CIT Origins: Late 80's to Early 90's

165

Are passwords going away?

166

The Trust Factor: Recent Events, Password Managers, & More

167

Return on Technology Investment

168

What Should You Ask a Potential Tech Partner?

169

Zero Trust Part II: How Do I Get Started?

170

Cloud vs. On Prem: The Smackdown

171

How Do I Budget for IT?

172

Zero Trust Part I: What Is It?

173

Maturity Model

174

Myths of Managed Services

175

Healthcare Cybersecurity Act 2022

176

Physical Security (Cameras, Sensors, & more!)

177

Choosing a Managed Service Provider (MSP)

178

Budgeting Migrating to the Cloud

179

U.S. Securities and Exchange Commission (SEC) Compliance

180

Technology planning for SMBs

181

Multi-Factor Authentication (MFA): The basics and why does my business need it?