Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

  • 00:23

    Avoiding Data Security Issues

    in Business

    The Internet has grown business at a rate before unknown.  But it has also created security threats and issues that can compromise the integrity of your business.  Listen in as Video Broadcast Services President, Marcia Hawkins and Vice President, Kyle Clouse discuss how you can avoid data security issues and keep your business and personal information safe.

  • 00:28

    Data Security for Small Businesses and Franchises

    in Technology

    This week we'll discuss data security with John Martin and the team from First Watch Technologies!

    John will share best practices in keeping your brand and business safe from data breaches and other technology threats.  Join us Wednesday at 8pm ET! 



  • 00:30

    Randy Roberts talks Data Security on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.

    Joining us will be Randy Roberts, President of Digital Security Advisors. DSA provides expertise to understand, design and implement controls needed to provide a secure network. With global enterprise experience our team can help your organization design or redesign your network so that it actively assist your team secure your assets. We discuss Sony, Home Depot and JP Morgan Chase data breaches. 

    Connect with Randy: www.linkedin.com/in/rsroberts

  • 00:14

    PureVPN: Data Security and Global Influence

    in Technology

    An overview about PureVPN  and the importance of data security.

  • 00:34

    Cybersecurity Essentials for Small and Mid-Size Businesses

    in Business

    Data security is a hot C-suite and board level topic as more and more companies make unflattering news when they’ve been hacked and valuable information gets stolen and misused.

    What two factors are essential for keeping your data safe? How safe is the Cloud? How do you create unique passwords you can actually remember? What’s the first thing you should do if you believe your computer has been hacked?

    Discover the answers by joining host Hanna Hasl-Kelchner as she welcomes Randy Gilmore, Security Consultant from Protus3, a security consulting, investigations, and design firm with a commitment to provide comprehensive programs and controls so clients will have the assets and stability to prosper.

    Rusty has been involved in countless computer forensic cases . . . think of it as CSI Cyber but happening to a business near you.

    Since it’s always smarter and cheaper to learn from other people’s mistakes it pays to tune on for his powerful tips and strategies to help keep your valuable data safe.

    This program is proudly sponsored by the Legal Leverage® Academy, a div. of Business M.O., LLC.

  • 00:14

    Embracing The Age of Mobility - Part 6 of 6

    in Technology

    4 Essential Pieces to Any Small Business BYOD Strategy

    Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.

    We’ve come a long way. Today, businesses really have no choice but to let employees use personal devices for work purposes. Blurred lines now make it difficult to differentiate between what is professional and what is personal. A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.

    Naturally, security and privacy issues are a concern since these devices synch to the company network. Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to but smaller businesses have limited resources.

  • 00:30

    Embracing The Age of Mobility - Part 5 of 6

    in Technology

    A Smarter Approach to Mobile Device Management

    More people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime.

    Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction.

    But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?

  • 00:30

    Embracing The Age of Mobility - Part 2 of 6

    in Technology

    Why SMBs Must Proactively Address the Threat of Mobile Hacks

    More cyber criminals are targeting small-to-medium sized businesses.  One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place.  Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets.

    This is a real cause for concern since data breaches have the ability to put many already financially challenged SMBs out of business.

    If customer/client data has been breached, there could be potential litigation costs, and naturally, lost goodwill and an irreparable hit to brand or company reputation. In part 2, we will discuss why this is a must!

  • 00:30

    Embracing The Age of Mobility - Part 4 of 6

    in Technology

    3 Things to Consider Before Jumping Into BYOD

    You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.

  • 01:59

    Homeland Security - The History and the Birth of Contemporary Homeland Security

    in Training

    Brought to you by The American Public Safety Training Institute (TAPSTI) www.tapsti.org, this 2 hour session will review the work of Mark Sauter and James Carafano and their excellent textbook entitled “Homeland Security” (2012, 2nd ed.).  This seminar includes a historical review of the Department of Homeland Security (DHS) from its early colonial legacy, to the Cold War, and then into its transition into its current form as the result of 9/11. Contemporary homeland security includes a huge array of challenges as our society becomes more technologically oriented and, as a result, more susceptible to targeting. We are dependent on stability in a very unstable world and, for the first real time, a very small group of people can wreak tremendous havoc. This seminar focuses on the change from national security being one that assumed the "homeland" was safe from its own people and the dangers were from outside our own borders to the present day where there can be no assumptions made where the next attack will come from. 

  • 01:50

    The History of Jet Skis - Joe Ballistrea - Episode 8

    in Sports

    Welcome to The History of Jet Skis! Where we will share with special guests the memories, races, rescues, industry, triumphs and rides with us as we build your Jetski community to preserve the heritage and legacy for future generations to enjoy. We are constantly added new content, so visit often! We appreciate your participation, together we can chronicle the data from the early years of the sport and industry, so the present generation knows where we came from.  

    Guest presenter:  Joe Ballistrea

    Host Joe Ballistrea shares his early influences and experiences during the formative years of the jet ski racing scene in Southern California

    Host:  Shawn Alladio

    Which Generation are you?

    1. First Generation-1973-1979
    2. Second Generation 1980-1989
    3. Third Generation 1990-1999
    4. Fourth Generation 2000-2009
    5. Fifth Generation 2010+