Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

  • 00:30

    Randy Roberts talks Data Security on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.


    Joining us will be Randy Roberts, President of Digital Security Advisors. DSA provides expertise to understand, design and implement controls needed to provide a secure network. With global enterprise experience our team can help your organization design or redesign your network so that it actively assist your team secure your assets. We discuss Sony, Home Depot and JP Morgan Chase data breaches. 


    Connect with Randy: www.linkedin.com/in/rsroberts

  • 00:30

    Embracing The Age of Mobility - Part 5 of 6

    in Technology

    A Smarter Approach to Mobile Device Management


    More people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime.


    Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction.


    But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?

  • 00:14

    Embracing The Age of Mobility - Part 6 of 6

    in Technology

    4 Essential Pieces to Any Small Business BYOD Strategy


    Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.


    We’ve come a long way. Today, businesses really have no choice but to let employees use personal devices for work purposes. Blurred lines now make it difficult to differentiate between what is professional and what is personal. A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.


    Naturally, security and privacy issues are a concern since these devices synch to the company network. Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to but smaller businesses have limited resources.

  • 00:30

    Embracing The Age of Mobility - Part 2 of 6

    in Technology

    Why SMBs Must Proactively Address the Threat of Mobile Hacks


    More cyber criminals are targeting small-to-medium sized businesses.  One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place.  Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets.


    This is a real cause for concern since data breaches have the ability to put many already financially challenged SMBs out of business.


    If customer/client data has been breached, there could be potential litigation costs, and naturally, lost goodwill and an irreparable hit to brand or company reputation. In part 2, we will discuss why this is a must!

  • 00:30

    Embracing The Age of Mobility - Part 4 of 6

    in Technology

    3 Things to Consider Before Jumping Into BYOD


    You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.

  • 00:30

    Windows Server 2003 End Of Support Is This July. Are You Ready?

    in Technology

    In July 2010, Microsoft transitioned from providing mainstream support for Windows Server 2003 to releasing critical patches only. July 14, 2015 marks another transition, this time the end of Microsoft support for Windows Server 2003/R2.


    While this date may seem distant, now is the time to understand that the end of support and the end of life of Windows Server 2003 means that your business needs to ensure that it has a plan to migrate the applications and workloads currently relying on Windows Server 2003 onto Windows Server 2012 R2 or Microsoft Azure.


    Just to be clear, End-of-Support for Windows Server 2003 means:



    NO UPDATES Will be developed or released after the end of support
    NO COMPLIANCE (HIPAA, PCI, SOX, etc.) which speaks for itself
    NO SAFE HAVEN as both physical & virtualized environments affected


    If you're still using Windows Server 2003, you to start your planning to migrate off of Windows Server 2003 and onto a platform that will provide you the security and reliability that you’ve experienced over the last decade with Windows Server 2003, with the added value of the features now included in Windows Server 2012 R2, as well as the hybrid opportunities available to you with Microsoft Azure.


    Delaying will only create additional expenses, and ‘rigging’ your environments to detect intrusion, inclusion of more advanced firewalls, network segmentation, and so on, to simply isolate Windows Server 2003 servers will only result in a datacenter that costs more, and is still out of compliance, and out of date. Not to mention the maintenance costs for aging hardware… you’re just delaying your opportunity to transform.


    If You Plan To Stay With Microsoft What Should You Do Now? We'll discuss that in this series.

  • 00:30

    Embracing The Age of Mobility - Part 3 of 6

    in Technology

    Remember… Always Practice Safe BYOD


    No matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement.


    We live in an exciting time when work can be done at any time from any place. Employees love the fact that they can get work done on their iPad as they sit poolside sipping a Pina Colada. Businesses love the cost savings along with the happier and more productive employees they’re noticing. Meanwhile, customers and clients take note that their emails are commonly answered outside traditional work hours with a “Sent from my iPhone” tagline at the bottom.


    Like anything related to business technology, there are naysayers who are quick to warn that a more mobile and dispersed workforce also means increased security risks.


    Do they have a point? I'll cover that today!

  • 00:30

    Embracing The Age of Mobility - Part 1 of 6

    in Technology

    Part 1: The Good, The Bad, and the Ugly of Mobility and BYOD


    There are a lot of advantages to mobility in today’s workforce, but the Bring-Your-Own-Device (BYOD) movement has also brought its share of headaches as well.


    We live in a society where everyone must have the newest technology. We are inundated with ads reminding us that the smartphone or tablet we just bought a year ago is laughably outdated and inferior to the upgrade that just hit the market.


    People who have just bought the latest technology don’t want to have to set it aside to use a separate company-issued device. As a result, businesses are beginning to grant these employee-owned devices access to their file and email servers, databases, and applications.


    While this brings certain competitive advantages to employers, it naturally carries many risks, too.

  • 00:14

    PureVPN: Data Security and Global Influence

    in Technology

    An overview about PureVPN  and the importance of data security.

  • 00:31

    Jason Lauritsen shines light on engagement with big data with Thug Metrics

    in Technology

    Jason never disappoints, great convo coming about engagement and being a Best Place to Work.


    Everyone meet Jason, Jason meet everyone.


    Jason:  Even when I was in grade school, I recognized when processes were broken. But, rather than complain about them, my instinct was to find or create a better way. I solved the problem. I facilitated progress. I never outgrew this. 

    As my career unfolded, it became clear to me that the experience of “work” wasn’t a good one for far too many people. And so it has become my calling to make work better. I believe that work can and should be an awesome experience (It happens, I’ve seen it.). I believe that people want to do great work. I also believe that leaders want their people to be successful. The challenge seems to be that we are stuck in outdated mindsets and beliefs about “work” that get in our way. My mission is to fix that. 
     

  • 00:30

    Internet of Things (IoT) & the Security Challenges We Face

    in Technology

    The term Internet of Things (IoT) is relatively new and one we are going to be hearing a lot more about. Consider this; currently there are more wireless devices than there are people. The plus side is, of course, all of the great things we can do with this connectivity. The bad side is, at what risk? Recently 104,000 IRS records were breached. Are patient healthcare accounts secure?  These, and questions like them, will need answers as we continue the evolution to a 'connected society'.


    On June 1st, join host Melissa Birnie as she speaks with Dan Lohrmann, Chief Security Officer & Chief Strategist at Security Mentor, Inc., and most recently, Chief Security Officer for the State of Michigan, to learn more about IoT and the security challenges we will face as IoT becomes more prevalent.


    Our guest Dan Lohrmann holds a master’s degree in computer science from Johns Hopkins University in Baltimore and a bachelor’s degree in computer science from Valparaiso University in Indiana, and has more than 28 years of experience in the computer industry. He is an internationally recognized cybersecurity leader, technologist and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. Under Lohrmann’s leadership, Michigan was recognized as a global leader in cyberdefense for government - winning numerous professional awards for outstanding accomplishments.

Join Host Live Chats

From the BTR Blog