Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

  • 00:30

    Randy Roberts talks Data Security on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.


    Joining us will be Randy Roberts, President of Digital Security Advisors. DSA provides expertise to understand, design and implement controls needed to provide a secure network. With global enterprise experience our team can help your organization design or redesign your network so that it actively assist your team secure your assets. We discuss Sony, Home Depot and JP Morgan Chase data breaches. 


    Connect with Randy: www.linkedin.com/in/rsroberts

  • 00:30

    Embracing The Age of Mobility - Part 5 of 6

    in Technology

    A Smarter Approach to Mobile Device Management


    More people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime.


    Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction.


    But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?

  • 00:14

    Embracing The Age of Mobility - Part 6 of 6

    in Technology

    4 Essential Pieces to Any Small Business BYOD Strategy


    Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.


    We’ve come a long way. Today, businesses really have no choice but to let employees use personal devices for work purposes. Blurred lines now make it difficult to differentiate between what is professional and what is personal. A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.


    Naturally, security and privacy issues are a concern since these devices synch to the company network. Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to but smaller businesses have limited resources.

  • 00:30

    Embracing The Age of Mobility - Part 2 of 6

    in Technology

    Why SMBs Must Proactively Address the Threat of Mobile Hacks


    More cyber criminals are targeting small-to-medium sized businesses.  One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place.  Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets.


    This is a real cause for concern since data breaches have the ability to put many already financially challenged SMBs out of business.


    If customer/client data has been breached, there could be potential litigation costs, and naturally, lost goodwill and an irreparable hit to brand or company reputation. In part 2, we will discuss why this is a must!

  • 00:30

    Embracing The Age of Mobility - Part 4 of 6

    in Technology

    3 Things to Consider Before Jumping Into BYOD


    You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.

  • 00:30

    Windows Server 2003 End Of Support Is This July. Are You Ready?

    in Technology

    In July 2010, Microsoft transitioned from providing mainstream support for Windows Server 2003 to releasing critical patches only. July 14, 2015 marks another transition, this time the end of Microsoft support for Windows Server 2003/R2.


    While this date may seem distant, now is the time to understand that the end of support and the end of life of Windows Server 2003 means that your business needs to ensure that it has a plan to migrate the applications and workloads currently relying on Windows Server 2003 onto Windows Server 2012 R2 or Microsoft Azure.


    Just to be clear, End-of-Support for Windows Server 2003 means:



    NO UPDATES Will be developed or released after the end of support
    NO COMPLIANCE (HIPAA, PCI, SOX, etc.) which speaks for itself
    NO SAFE HAVEN as both physical & virtualized environments affected


    If you're still using Windows Server 2003, you to start your planning to migrate off of Windows Server 2003 and onto a platform that will provide you the security and reliability that you’ve experienced over the last decade with Windows Server 2003, with the added value of the features now included in Windows Server 2012 R2, as well as the hybrid opportunities available to you with Microsoft Azure.


    Delaying will only create additional expenses, and ‘rigging’ your environments to detect intrusion, inclusion of more advanced firewalls, network segmentation, and so on, to simply isolate Windows Server 2003 servers will only result in a datacenter that costs more, and is still out of compliance, and out of date. Not to mention the maintenance costs for aging hardware… you’re just delaying your opportunity to transform.


    If You Plan To Stay With Microsoft What Should You Do Now? We'll discuss that in this series.

  • 00:30

    Embracing The Age of Mobility - Part 3 of 6

    in Technology

    Remember… Always Practice Safe BYOD


    No matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement.


    We live in an exciting time when work can be done at any time from any place. Employees love the fact that they can get work done on their iPad as they sit poolside sipping a Pina Colada. Businesses love the cost savings along with the happier and more productive employees they’re noticing. Meanwhile, customers and clients take note that their emails are commonly answered outside traditional work hours with a “Sent from my iPhone” tagline at the bottom.


    Like anything related to business technology, there are naysayers who are quick to warn that a more mobile and dispersed workforce also means increased security risks.


    Do they have a point? I'll cover that today!

  • 00:30

    Embracing The Age of Mobility - Part 1 of 6

    in Technology

    Part 1: The Good, The Bad, and the Ugly of Mobility and BYOD


    There are a lot of advantages to mobility in today’s workforce, but the Bring-Your-Own-Device (BYOD) movement has also brought its share of headaches as well.


    We live in a society where everyone must have the newest technology. We are inundated with ads reminding us that the smartphone or tablet we just bought a year ago is laughably outdated and inferior to the upgrade that just hit the market.


    People who have just bought the latest technology don’t want to have to set it aside to use a separate company-issued device. As a result, businesses are beginning to grant these employee-owned devices access to their file and email servers, databases, and applications.


    While this brings certain competitive advantages to employers, it naturally carries many risks, too.

  • 00:14

    PureVPN: Data Security and Global Influence

    in Technology

    An overview about PureVPN  and the importance of data security.

  • 00:01

    Chew The Phat Kewl Khat: Security In America Important?

    in Entertainment

    Stan Jamrog stops by for another episode on Security issues and solutions in America. Is security really as important as I'm making it out to be? YES, an emphatic YES! There is a lot of evil out there trying to thwart America's standards of freedom. America must protect freedom at all costs due to the deaths of the people who fought for it in the past! So, come listen to a great show on security just in case you need to know how to protect enen yourselves from Tyranny!

  • 02:00

    LES NOCES DE L'AGNEAU 2

    in The Bible

    2 Corinthiens 11 : 1 - 4


    TURABIFURIZA GUHISHURIRWA KURUSHAHO.


    IMANA DATA WA TWESE URI MU IJURU ADUHE UMUGISHA MU IZINA RYA YESU KRISTO W’I NAZARETI. AMEN.

Join Host Live Chats

From the BTR Blog