Look for any podcast host, guest or anyone
Showing episodes and shows of

Executech

Shows

Between the BytesBetween the BytesHow to Increase Your PC Performance in 2024One of Executech's most popular blog articles is on improving your PC performance, written back in 2017. In this episode, James and Derik talk through each of the 10 tips to see how they hold up in 2024 and offer some additional tips to get your PC running smoother this year. Enjoy the show! 2024-01-1824 minPayPod: The Payments and Fintech PodcastPayPod: The Payments and Fintech PodcastSecuring our Financial World with James Fair of Executech Episode Topic: Welcome to an insightful episode of PayPod, where we explore the dual impact of generative AI—it's a boon for hackers and a blessing for cybersecurity professionals. James Fair, the senior vice president of IT services at Executech discusses the challenges and opportunities presented by the mainstream adoption of generative AI and the enduring impact of blockchain technology. The episode navigates through the evolving landscape of cybersecurity, exploring how advancements in AI have both empowered malicious actors and provided new tools for defenders. Additionally, it sheds light on the transformative potential of...2024-01-0428 minBetween the BytesBetween the BytesOur Tech Gift Guide for 2023!For all of us last-minute shoppers, James and Derik put together a gift guide for the tech lover in your life. They've compiled a broad list of around 20 gift ideas for kids and adults with a wide range of prices from $30 and up. The list varies from the ultra-niche to smart home, audio, time/space savers, and things just for fun. None of the products listed are sponsors or affiliated with Between the Bytes or Executech in any way. The products can be found at several stores (Target, Best Buy, Amazon, etc.) or by searching...2023-12-1917 minBetween the BytesBetween the BytesJames Fair Guest Appearance: Data Leadership LessonsOne of our co-hosts, James Fair, joined Data Leadership Lessons as a special guest appearance. Here's a repost of the episode in full. Enjoy! "This week, our guest is James Fair. James is a Senior Vice President for Executech. With over 35 years of experience in IT, 30 years in Leadership, and a dozen years in the interpersonal workspace, James combines his love for IT and cybersecurity along with his passion for Leadership development. Our conversation is sure to have something (likely many things) new you can do to make your digital life safer." Algmin Dada Leadership2023-05-1744 minBetween the BytesBetween the BytesJames Fair's Guest Appearance: That Tech ShowOne of our co-hosts, James Fair, joined That Tech Show as a special guest appearance. Here's a repost of the episode in full. Enjoy! "This week, we’re talking with James Fair. A man with 35 years of experience under his belt, working his way up from IT support to Senior Vice President at Executech, but what’s probably most interesting is his work in Utah-based Feature Films for Families, a Mormon production company based in Salt Lake City, and his voice-over work." That Tech Show 2023-05-1048 minBetween the BytesBetween the BytesCybersecurity Requirements and IT Assessments: Staying Ahead in Today's Digital Landscape - With Lee Weech Gary and Derik welcome Lee Weech, Director of Sales @ Executech, back to share insights on how businesses can determine whether to use in-house IT or outsource their IT needs. Lee provides examples of when each solution makes sense and emphasizes the importance of communication, collaboration, and a deep understanding of business needs. The episode also covers new cybersecurity requirements for business insurance and the importance of proactively assessing and mitigating cyber risks. Lee explains what an IT assessment is and provides tips on how companies can avoid falling behind in their organization's technology by investing...2023-05-0533 minBetween the BytesBetween the BytesLive Replay: Preparing for the WorstFEI Utah and Executech got together live for this informative meeting where James navigates through the cyber risks facing businesses in 2023. Get a breakdown of a real risk register for your business. Understand the essential layers of cyber protection that will help prevent an attack and the key planning steps and tools you should put in place to react and recover from a cyber incident. If you'd like to see the visuals that accompanied the presentation, check out the recording on LinkedIn or YouTube! 2023-03-2832 minBetween the BytesBetween the BytesCybersecurity in 2023Join us as James, Gary, and Derik talk about what to expect on the cybersecurity front this year.  James also covers Executech's next cybersecurity initiatives and how other organizations can implement these measures as well.  Enjoy the show! 2023-02-2431 minBetween the BytesBetween the BytesWhat is Between the Bytes?Welcome to Between the Bytes by Executech, where we discuss cybersecurity, tech news, business, and leadership with specialists from all over. Our goal is to keep listeners informed and up to date on technology and cybersecurity trends to help keep their organizations secure. We want to help you train your staff in the most simple yet effective manner possible, prioritize IT/cyber inside your organization, and stay in the know with the latest cyber news and tech updates. So, whether you're a veteran or novice when it comes to cybersecurity & technology, we've got some great...2023-02-1001 minBetween the BytesBetween the BytesTech Troubleshooting & Cringe-Worthy IT Tickets - With Kody OgdenDerik welcomes Kody back for a fun follow-up to his first time on the show.  Kody is the Director of Technical Operations @ Executech, and he joins us to provide some excellent DIY troubleshooting tips you can try before reaching out to tech support.  Technology has improved our lives, but that doesn't mean it hasn't made each and every one of us look foolish a few times as well. Kody and Derik talk about some cringe-worthy tech support tickets and experiences they've had in the past.  Enjoy the show! 2023-01-1832 minBetween the BytesBetween the BytesMicrosoft NCE Migration - With Tyler SissonGary & Derik welcome Tyler Sisson for the first time on the show. Tyler is a Cloud Engineer here @ Executech.  Tyler joins the show to talk about Microsoft's upcoming NCE (New Commerce Experience) migration.  Microsoft's Office 365 comes in several packages based on what you want, how many employees you have, and (with this migration) how you want to pay. With all these options paired with Microsoft's apparent love for renaming their products, things can get a bit overwhelming. Tyler's years of experience with Microsoft and Azure make untangling this migration much easier to understand. As...2023-01-1126 minBetween the BytesBetween the BytesBuilding a Department from Scratch & How To Work With IT Support - with Kody OgdenGary and Derik welcome Kody Ogden, Director of Technical Operations @ Executech, for the first time on the show! Kody has been with Executech for over 5 years now and has built our help desk department from the ground up.  Kody joins us to talk about how he manages his team, the growing pains of building a new department inside a company, and how he and his team have achieved such high customer satisfaction ratings (99% in 2022).  Kody also covers some dos and don'ts of working with IT support.  Enjoy the show! 2022-12-0134 minSecurity UnfilteredSecurity UnfilteredEpisode 78 - James Fair - Sr VP of IT Services at ExecutechSend us a textIn this episode I talk with James Fair who is the Sr VP of IT Services at Executech.  We had a fantastic conversation and I hope you enjoy it! If you enjoy this podcast please leave a review and share it. James's Links:LinkedIn: https://www.linkedin.com/in/jamesmfairWebsite: https://www.executech.com/Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: http...2022-11-2145 minBetween the BytesBetween the BytesWhat is an IT Assessment?This was one of our most listened-to episodes from last year.  Gary & Derik welcome Lee, Director of Sales at Executech, for the first time on the show. Lee has been with Executech for almost 5 years now and has been a part of countless IT Assessments with new & potential clients. We invited Lee to talk about what an IT Assessment is, when it's a good time to get one done, and what to look for in an MSP - both before and after they perform one for your organization. Think your organization is in n...2022-11-1618 minBetween the BytesBetween the BytesRepost: IT War StoriesAs with most service industries, those who work them long enough end up with some pretty incredible stories. In this episode of Between the Bytes, we've got some great tales about highs, lows, and even embarrassing situations. Join Gary & Derik as they talk with two of our most senior technicians about their time and experiences in the field of IT.2022-10-2623 minBetween the BytesBetween the BytesLive Replay: Mac vs. PCCoke vs. Pepsi, Mcdonald's vs. Burger King, Under Armour vs. Nike, Mac vs. PC.  These are questions that have been deeply ingrained into our culture. The answer to any of these (even if you don't pick sides) can shed light on your personality, start a heated debate, or create irreparable rifts among friends and family. James, Gary, and Derik have decided to put their friendship to the test and try to discuss the age-old question - Mac or PC?2022-10-2040 minBetween the BytesBetween the BytesLive Replay: What's Most Important in Cybersecurity?Between the Bytes is LIVE every Tuesday in October @ 10:40 am MST for Cybersecurity Awareness Month!  When it comes to cybersecurity, layers of protection are vital. So, where do we start? All the areas that need protection, monitoring, and training can become quite a mountain of information. James, Gary, and Derik cover the most important places to focus on and some relatively simple actions to take that produce a high yield for your organization's security.2022-10-1431 minBetween the BytesBetween the BytesTech Tune-Ups & Protecting Your Data with Darren SchmidtDerik & Gary welcome Darren Schmidt, Managed Services Team Lead @ Executech Sacramento, to talk about the importance of keeping your tech and cybersecurity up-to-date, how to accomplish that, and the actual cost to an organization that falls behind.  Darren's extensive background leads to some great tips and ways of putting the importance of IT into perspective. We also get his thoughts on the state of hospitals and other medical facilities across the U.S. and how their lack of cyber protection hurts patient care.  Enjoy the show! 2022-10-0736 minBetween the BytesBetween the BytesLive Replay: Apple vs. AndroidDerik, Gary, and James battle it out to try and decide which is better: Apple or Android, overpriced or mediocre, perfectionist or innovator, blue text bubbles or green. Derik, a mindless Apple cultist, tries to convince Gary, a giddy Android fanboy, of his incorrect life choices; all while James tries to keep things somewhat on topic. They talk about the latest Apple product announcements and how they stack up against Android's products. 2022-09-2040 minBetween the BytesBetween the BytesLastPass & Human ErrorGary, James, and Derik discuss how simple human error exposed an organization that's quite literally built on digital security.  LastPass fell victim to a recent cyberattack by compromised credentials, giving the attackers access to some vital proprietary code.2022-09-1414 minBetween the BytesBetween the BytesApple Thieves & Twitter WhistleblowersGary, James, & Derik talk about the major vulnerability Apple's last update resolved. The vulnerability affected everything from iPhone to Mac, and they cover how it works and why it's such a big deal. They also talk about Twitter's ex-employee turned whistleblower and the resulting fallout from his alarming claims.  Enjoy the show! 2022-09-0820 minBetween the BytesBetween the BytesHow Falling for a Simple Lie can Jeopardize Your OrganizationWe are excited to welcome Chet Wisniewski, Principal Research Scientist @ Sophos, back to the show in this episode! Chet joins us to talk about social engineering, hacker conventions, the dos & don'ts of staff training, and much more!  Learn how social engineering uses the six principles of influence to make people fall for seemingly simple lies, how an attack works, and how reporting paired with communication is the most effective way to prevent data breaches inside an organization.  Enjoy the show! 2022-09-0328 minBetween the BytesBetween the BytesTexting 9-11, Russian Electronic Warfare, and Carrier PigeonsGary, James, and Derik break down another handful of articles from around the world: Major updates across Apple & Microsoft to fix a number of vulnerabilities The U.S. rolling out a texting feature for 9-11 emergency services city by city Russia's electronic warfare against Ukraine  Carrier pigeon beats internet upload speeds in South Africa Another $200 million loss in cryptocurrency from a bridge vulnerability  Enjoy the show! 2022-08-2519 minBetween the BytesBetween the BytesBonus Short: Hands in the Cookie JarChet Wisniewski, Principal Research Scientist @ Sophos, talks about how the theft of (website) cookies can give attackers access to your login credentials across a number of websites and for longer than you might think.  If you'd like to read the article mentioned in the episode, just click here! 2022-08-2304 minBetween the BytesBetween the BytesFacebook Steals Medical Info, Voyeuristic Cops, and Apple's Vendetta Against MarketingDerik & Gary are back to talk about marketing! They cover various news articles, from Facebook being sued for tracking confidential medical information, China stealing TikTok user data, authorities wanting to access your cameras in 'emergency situations' without a warrant, to the effect Apple's vendetta has had on Facebook ad revenue and small businesses around the world.  Enjoy the show! 2022-08-1728 minBetween the BytesBetween the BytesA Masterclass in Team BuildingDerik welcomes back Executech's training department, Ben Reese & Christian Arnold, to continue the conversation about personalities in the workplace.  Derik, Ben, and Christian talk about how different personality types can bring positive contrast to a team, the gaps created by having too many similar personalities on a team, and how to overcome weaknesses or friction from either scenario.  We hope you enjoy this masterclass in creating a high-powered team inside your organization! 2022-08-0423 minBetween the BytesBetween the BytesPegasus Citizen Surveillance, $100k Bug Bounties, and Pictures from SpaceIn this episode, Derik, Gary, and James talk about a handful of articles in the news: Use of Deepfakes to Ace FBI Job Interviews Defense Department Offering $110k in Bug Bounties Pegasus Spyware & Citizen Surveillance Vegas and their MSG Sphere  JWST First Images To read the article on learning how to read URLs to prevent phishing scams, click here.  Enjoy the show! 2022-07-2836 minBetween the BytesBetween the BytesThe Truth Behind Cyber Attacks - with Chet WisniewskiIn this episode, Derik & Gary talk with Chet Wisniewski, Principal Research Scientist @ Sophos.  Chet has been in cybersecurity for around 30 years, and that level of seniority in the field offers some great perspectives. He joins us to talk about what individuals (and organizations) should really be focusing on when it comes to protecting their data, how cyber attacks have evolved over the past 30 years, current cybersecurity trends and what's on the horizon, and simple mistakes people make that leave them wide open for attack. Enjoy the show! 2022-07-2039 minBetween the BytesBetween the BytesMaking Finance a Competitive Advantage - Special Guest: Joe HolbrookIn this episode, Gary & Derik are joined by Joe Holbrook, Founder & CEO of Kings Peak Tax Consulting. Kings Peak specializes in unique and in-depth areas that can save businesses a lot while partnering with the organization's current CPA.  Joe joins to talk about some key areas to take advantage of before they go away next year, starting his own business, leading people across multiple states & countries, and a lot more.  Enjoy the show! 2022-07-1231 minBetween the BytesBetween the BytesIT Nerd + Business Leader - Special Guest: Kayden HickenGary & Derik are joined by Kayden Hicken, GM @ Executech Phoenix.  Kayden talks about how growing up working a large dairy farm, being involved in the family businesses, and his fascination with IT took him from Executech technician to Executech General Manager.  This episode gives great insight into personal development from any level and how Kayden manages to maintain such a strong team in Phoenix.  Enjoy the show! 2022-07-0830 minBetween the BytesBetween the BytesVerizon Data Breach Report - 2022James, Gary, and Derik break down the Verizon Data Breach Report: Biggest threats & how some of them work Industries hit the hardest Cyber risks for small businesses Simple (but effective) steps to help prevent data breaches Other best practices  If you'd like to look at the report, here's the executive summary. Enjoy the show! 2022-06-2922 minBetween the BytesBetween the BytesMicrosoft Follina VulnerabilityA new Microsoft Office vulnerability dubbed “Follina” could allow cyber attackers to gain control of impacted systems. Gary and James talk about what that means, what you can do, and how collaboration is helping combat this and other attacks.2022-06-1719 minBetween the BytesBetween the BytesBuilding Culture and Growing as a Leader - Special Guest: Joe Bird, GMDerik & Gary welcome Joe Bird, GM of Executech's Seattle location, in this episode. Joe gives us fantastic insight into leadership in an unfamiliar industry, culture building inside a hybrid office, and his approach to fast and effective personal development. Joe also walks us through his experience running companies overseas and how he ended up with us here at Executech.  Enjoy the show! 2022-06-0934 minBetween the BytesBetween the BytesThe Death of Passwords?Key leaders in the tech world like Google, Apple, and Microsoft have announced their commitment to expanding support for FIDO. By doing this, they take a big step towards turning phone verification a primary method for accessing accounts and making passwords a thing of the past.  James, Gary, and Derik talk about the pros, cons, and hurdles to overcome in order to turn something like this into the new standard.  Enjoy the show! 2022-06-0220 minBetween the BytesBetween the BytesCybersecurity & Compliance Best Practices with John ZanniWe're bringing you the audio-only version of our recent webinar about cybersecurity, compliance, and cyber insurance. Our featured panelists are Tyler Rasmussen, VP of Cybersecurity at Executech, and John Zanni, CEO at Acronis SCS. The conversation revolves around the perspective of cities and towns, but the thoughts and advice apply to any compliance or regulation required industry.  Main topics we cover: The latest trends in cybersecurity Security in the hybrid environment Common overlooked pieces of compliance Why cyber insurance is so important So preventative measures you can take Link to o...2022-05-2451 minBetween the BytesBetween the BytesLeveraging Personality Tests For Employees & CoworkersIn this episode, Gary & Derik talk about personalities in the workplace with Executech's training department. This episode is the first part of a miniseries we'll be doing with our training department over the next few months.  Ben Rees (Training Manager) and Christian Arnold (Training Team Lead) have been using personality tests like Strengths Finder and Myers Briggs for new techs at Executech with excellent results. Find out why it's important, what information comes from them, success stories, and how it can help your leadership and your entire organization.  Enjoy the show! 2022-05-1817 minBetween the BytesBetween the BytesA Declaration for the Future of the InternetThe U.S., European Union, and 32 other non-EU countries recently signed The Declaration for the Future of the Internet. Derik, James, and Gary cover what the document is, its goals, possible outcomes, shortcomings, and a lot more!  Enjoy the show! 2022-05-1121 minBetween the BytesBetween the BytesThe Role of PR in Cybersecurity | Special Guest: Mark Fredrickson - SnappConner PRIn this episode, Gary & Derik welcome a special guest to the podcast for the first time. Mark Fredrickson, President of SnappConner PR, brings interesting insights on how a PR firm can (and should) be involved in helping organizations in their response to a cyberattack.  Mark walks us through why it's essential to work with a PR firm to assist in creating an incident response plan and how an organization can work with a PR firm to build a fortress around their brand. We also delve into Mark's leadership insight and how he came to be the president o...2022-05-0427 minBetween the BytesBetween the BytesCryptocurrency & Their $1 Billion Bridge ProblemDerik and Gary went LIVE to talk with James Fair about cryptocurrency and their billion-dollar bridge problem. A "bridge" is a service that connects one blockchain to another so that value can be sent between them. Lately, bridges have continually been exposed as a significant gap in security, resulting in the loss of over $1 billion in little more than a year. James, Derik, and Gary break down what's going on, the overall impact, and what could be done to prevent this and recoup some (if any) losses.2022-04-2625 minBetween the BytesBetween the BytesNew Cyber Updates: MFA Bombing & Spring4 ShellWe welcome Tyler Rasmussen, VP of Cybersecurity @ Executech, to talk about the latest cybersecurity news & updates. This episode focuses on MFA Bombing, the method rumored to have caused the Okta breach recently, and the Spring4 Shell vulnerability.  Enjoy the show! 2022-04-1909 minBetween the BytesBetween the BytesIs Your Phone Spamming Itself?In this episode, Derik, Gary, and James talk about a handful of recent stories in the IT & Cybersecurity world. We cover some great topics from super-powered, $2,000 GPUs to spam texts that appear to come from your own number. Enjoy the show! 2022-04-0715 minBetween the BytesBetween the BytesMarketers Review Products & Tools for BusinessesIn this episode, Gary & Derik welcome our newest member to the Executech marketing team, Latasha Darden!  It's no secret that businesses use many software products to keep things moving day-to-day. Today, we talk about products we use daily, what we love, what drives us crazy, and the risks of different departments or individuals finding their own products to fill needs for their roles. Articles Mentioned:  What is Shadow IT?2022-03-2931 minBetween the BytesBetween the BytesOkta Breach puts Businesses on High AlertGary & Derik welcome back Tyler Rasmussen, VP of Cybersecurity, to talk about the Okta breach. In this episode, we'll cover who Okta is, what happened, how it could have been prevented, and cybersecurity rules every organization (and individual) should follow. Enjoy the show! 2022-03-2413 minBetween the BytesBetween the BytesCryptocurrency: An Executive Order from The White HouseThe White House released their "Executive Order on Ensuring Responsible Development of Digital Assets," A long title for a very long document full of concerns around cryptocurrency, plans for the US to create their own cryptocurrency, and calls to action (with deadlines) to the Department of the Treasury to start researching cryptocurrencies. If you'd like to read the lengthy article, you can do so here: The White House. Or, spare yourself the anguish, and listen as Derik, Gary, and James talk about what's in the article and what it could mean for the...2022-03-1619 minBetween the BytesBetween the BytesToyota Ransomware & Russia's Cyber WarIn this episode, Derik and James talk about a handful of cybersecurity news stories from around the world.  Japan shuts down a number of Toyota factories in response to ransomware A major microchip manufacturer in the U.S. hit with ransomware Russia, Ukraine, and the U.S. - What could happen on the cyber front? Google continues their MFA crusade  Enjoy the show! 2022-03-0824 minBetween the BytesBetween the BytesInside Executech's Training DepartmentGary & Derik welcome back Ben Reese, training manager at Executech. Ben talks about the different types of training he'll run for employees and clients. In that same vein, Ben talks about the importance of soft skills training, how to help the training stick, the importance of personality tests, and a lot more. Enjoy the show! 2022-03-0421 minBetween the BytesBetween the BytesLive Tech Q&A with James FairIn this episode, Between the Bytes went live while Gary & Derik asked James questions from across the internet. We span a variety of topics, from basic IT to some slightly more advanced questions. CPU vs GPU vs RAM vs Processors Picking the right computer for your needs AMD Ryzen vs Intel Core i7 vs Apple M1 Processors Easy was to trigger your IT support Basic cybersecurity "https://" vs "http://" And a whole lot more!  Enjoy the show! 2022-02-2534 minBetween the BytesBetween the BytesRepost: Cybersecurity Tips for the Remote Work ModelOur subject matter expert, James Fair, joined ePresence as a guest speaker recently. This is a repost of their podcast episode. You can find more ePresence here!2022-02-1832 minBetween the BytesBetween the BytesRepost: Risk Management ShowOur subject matter expert, James Fair, joined The Risk Management Show as a guest speaker recently. This is a repost of their podcast episode.  You can find more of The Risk Management Show here!2022-02-1122 minBetween the BytesBetween the BytesCryptocurrency & Blockchain | Pt. 3 | Final PartDerik, Gary, and James jump back into the conversation about cryptocurrency, blockchain, and NFTs in this 3rd & final part of our series. In this episode, we answer any questions that came through from the first two episodes of the series, talk about wallets for cryptocurrency, and the environmental impact cryptocurrencies have had since the beginning. Be sure to check out the first 2 parts of this series to get the full picture of cryptocurrencies, blockchain, and NFTs. We hope you enjoy the show!2022-02-0827 minBetween the BytesBetween the BytesCryptocurrency & Blockchain Explained | Pt. 2Derik, Gary, and James jump back into the conversation about cryptocurrency, blockchain, and NFTs in this 2nd part of our 3-part series. In case you missed it, we talked about where it all started for blockchain and cryptocurrency in the first part of the series. In this episode, we dive into how cryptocurrency mining works, the ups and downs cryptocurrencies like Bitcoin have had since inception, and dive into NFTs.  We hope you enjoy the show!2022-01-3133 minBetween the BytesBetween the BytesCryptocurrency & Blockchain Explained | Pt. 1It's no question that blockchain, NFTs, and several cryptocurrencies have been a big topic worldwide for some time now. Derik & Gary decided to bring in our subject matter expert, James Fair, to give us a crash course in this ever-expanding maze of technology. Over the course of 3 episodes, we'll cover: Where it all started How blockchain enabled the creation of Bitcoin How blockchain can support supply chain industries How blockchain can be an answer for cybersecurity How Bitcoin mining works How some other cryptocurrencies came to be What is an NFT And a lot more! ...2022-01-2624 minBetween the BytesBetween the BytesIT, Administration, & Company CultureGary and Derik welcome a new voice to the podcast, Sandra Smith, Chief Administrative Officer @ Executech! Having been with Executech for over 10 years, Sandra brings some serious expertise when it comes to HR, back-office, and administrative functions of an organization. She joins us to talk about how IT can help an organization's administrative staff. Maintain a positive culture while working remotely Improve efficiency in back-office processes Safeguard against cybercrimes Build policies to get the most out of your IT Maintain excellent communication with a remote staff We cover a lot more in this episode; we...2022-01-1325 minBetween the BytesBetween the BytesWhat Exactly is a VPN?With the large movement of people working from home, the need and usage of VPNs has skyrocketed. Derik and Gary welcome back James Fair to talk about what a VPN is, how it works, when you should use one, and some alternatives to them that provide similar services.  As always, if your organization has questions about getting VPNs for your remote staff, cybersecurity, or managed IT in general, just reach out here!2022-01-0819 minBetween the BytesBetween the Bytes2021 Ends with a Major VulnerabilityNothing says "Merry Christmas" like a major vulnerability that leaves an alarming number of applications, websites, and organizations at risk.  In this episode, Derik and Gary talk to Tyler Rasmussen, VP of Cybersecurity, about the Log4j/Log4Shell vulnerability. Tyler explains how it works, who's affected, and how to help mitigate the risks. 2021-12-3118 minBetween the BytesBetween the BytesHow the Pros Tackle the Biggest Cyber Issues Today - Webinar ReplayIn this episode, join us for a webinar replay as we welcome guests from the Sacramento Kings, Executech, and Acronis to discuss critical cybersecurity and data protection issues. Takeaways: • Learn about the biggest digital threats facing businesses today • Understand why all businesses are at risk of cyber attacks • Techniques for adapting to ever-changing technology environments • Best practices and tools for securing your data • How any business can follow the Kings in stepping up their digital protection2021-12-0347 minBetween the BytesBetween the BytesFrontline Tales - IT War StoriesAs with most service industries, those who work them long enough end up with some pretty incredible stories. We've got some great tales about highs, lows, and even embarrassing situations in this episode of Between the Bytes. Join Gary & Derik as they talk with two of our most senior technicians about their time and experiences in the field of IT.2021-11-2523 minSecure Talk PodcastSecure Talk PodcastSecurity Managed Services with James Fair, SVP of Technical Operations at ExecutechJames Fair, SVP of Technical Operations at Executech talks about managed services for cyber security, and shares his views on security best practices and mentoring and motivation. https://www.executech.com/2021-11-2333 minBetween the BytesBetween the BytesWhat Makes A Great IT Consultant?What makes a great IT Consultant? Technical skills? Personal skills? A mastery of turning things off and then back on again? Or is it some combination of all of these things? In this episode, Gary & Derik welcome James Fair and Ben Rees to talk about IT Consultants. We cover what technical and personal skills we look for, how Executech trains in both of those areas, and how both traits can be either roadblocks or opportunities for growth inside the company.2021-11-1725 minBetween the BytesBetween the BytesThe White House: Cybersecurity In SchoolsHacking, malware, and ransomware have skyrocketed in the US over the past two years, and most industries have felt the pain and stress as a result. Two sectors have felt this pain more than others, however - healthcare and schools.  Recently, The White House passed a bill requiring research on how hard cybercrimes are hitting schools across the US. In this episode, Gary & Derik talk details with James Fair. - How long will the research take? - What training will be provided? - How will t...2021-11-1020 minBetween the BytesBetween the BytesWhite Hat, Black Hat. Red Hat, Grey Hat.White Hat hackers find vulnerabilities inside an organization's technological infrastructure to help the organization stay in front of the more nefarious players in the world of cybersecurity.  In this episode, Derik welcomes James and Tyler to talk about these "hackers for good," bug bounty programs, and the other colors of hats hackers may wear. 2021-11-0415 minBetween the BytesBetween the BytesKeys to a Great IT RoadmapGary & James discuss the importance of IT Roadmaps for your organization, who should be involved in creating one, and what should be included.  An IT Roadmap is precisely what it sounds like: it's a visual representation of the future of your technology and systems. IT Roadmaps allow businesses to take advantage of the infrastructure and systems already in place while still planning how to improve and innovate in the future. A well-maintained, customized, and strategic technology setup isn't something that just happens. It's something that businesses and technology experts map out and plan for.2021-10-2920 minBetween the BytesBetween the BytesCredential leaks, angry hackers, & MFA (whether you like it or not).Microsoft leaks thousands of user credentials, Apple upsets a White-Hat hacker, and Google turns on MFA for thousands without asking. Derik, Gary, and James cover a handful of recent cybersecurity news stories in this episode of Between The Bytes. 2021-10-1822 minBetween the BytesBetween the BytesAre they listening? How Facebook manages to be a little creepy with their ad timing.Most all of us have experienced it before; we talk about a particular product and see ads for that product as soon as a few minutes later on Facebook or Instagram. The timing can be very uncanny and maybe even a little creepy. So, Facebook has to be listening to your conversations, right? In this episode, Gary and Derik talk about how platforms like Facebook & Google know so much about you, whether or not it's something to worry about, and other (more significant) cybersecurity threats that can spawn from social media. 2021-10-0137 minBetween the BytesBetween the BytesCMMC: Understanding & Implementing Cybersecurity Best Practices - Webinar ReplayIn this episode, we're listening in on a recent webinar Executech did with one of our partners, Arctic Wolf. Join Brad Hanly, Systems Engineer @ Arctic Wolf & James Wright, Technical Director @ Executech, as they dive into the Cybersecurity Maturity Model Certification (CMMC) to discuss the most common questions we have heard, including: • What is CMMC, and how it applies to your organization?  • How to take action to assess your risk and secure your organization  • What changes may be required to prepare for CMMC?  • What is an actionable plan for an organizatio...2021-09-2037 minBetween the BytesBetween the BytesPreparing Your IT for an Emergency - Webinar ReplayIn this special episode of Between The Bytes, we've pulled the audio from our Emergency Preparedness webinar to make it available to everyone! Executech partnered with Acronis and the League of Oregon Cities to talk about different types of disasters, how they can affect your IT, and how to best prepare for these types of situations. Speakers: James Fair - Sr VP of IT Services @ Executech Tyler Rasumsen - VP of Cybersecurity @ Executech James Slabey - Sr. Director @ Acronis Biren Jajal - DR Specialist @ Acronis ...2021-09-2047 minBetween the BytesBetween the BytesWhat is an IT Assessment?In this episode, Gary & Derik welcome Lee, Director of Sales at Executech, for the first time on the show. Lee has been with Executech for almost 4 years now, and has been a part of countless IT Assessments with new & potential customers.  We invited Lee to talk about what an IT Assessment is, when it's a good time to get one done, and what to look for in an MSP both before and after they perform one for your organization.  Think your organization is in need of an IT Assessment? We're happy to help with that an...2021-09-0918 minBetween the BytesBetween the BytesWindows 365: PCs In The CloudIn this episode, Gary & Derik welcome Jeff Palazzo - VP of Cloud Services at Executech. Jeff joins us to talk about Windows 365, a new and exciting service from Microsoft.  Windows 365 is a new service that will let businesses access Cloud PCs from anywhere, streaming a version of Windows 10 or, soon, Windows 11. Jeff walks us through how it works, who it's made for, and what we can expect! 2021-09-0122 minBetween the BytesBetween the BytesYou Should Be Running Simulated Phishing AttacksRecently, Ben and his team executed a mock phishing attack inside the company to test our employees. Ben sent out a series of emails that mirrored standard phishing emails sent from cybercriminals using Sophos and their plug-and-play phishing test tools. We talk about how the test went, what cybercriminals will use against you to make it more likely to miss any red flags, and the psychology behind what makes phishing attacks so effective. If you'd like to learn more about reading URLs and preventing falling for phishing scams yourself, check out our blog here! 2021-08-2513 minBetween the BytesBetween the BytesMobile Device Management - Keeping Your Company's Data SafeIn this episode, Derik welcomes back Tyler Rasmussen, VP of Cybersecurity at Executech. Tyler joins us to talk about Mobile Device Management (MDM).  Many employees use mobile devices (cellphones, tablets, personal laptops, etc.) to access their organization's assets in the office, or on home/public WiFi networks. Tyler gives some best practices to secure devices, applications, and information across the mobile and personal devices of your employees.  The best practices Derik and Tyler discuss range from simple to advanced. As always, if you have any questions about MDM, Managed IT, or Cybersecurity, just let us kn...2021-08-1218 minBetween the BytesBetween the BytesHow To Create an Incident Response PlanIn this episode, Gary, Derik, and James talk about Incident Response. - What is it? - Why is it important? - How do you create one for your organization? With the rapid increase of cyberattacks worldwide, unfortunately, the idea of your organization falling victim is becoming a matter of when, not if it will happen. This growing threat is why layers of cybersecurity are important, but not the final solution. Creating an incident response plan for your organization is a must; and it's the best way to help your organization be...2021-08-0520 minBetween the BytesBetween the BytesRansomware: How to combat it at a large scaleRansomware has been on an aggressive rise across the US over the past 18 months. In this episode, Gary, James, and Derik talk about an article published by The Verge.  The article offers up a few different ways to bring a stop to ransomware, but each has its own unique set of issues. We hope you enjoy it!  An excellent incident response plan is a must to ensure your organization is ready for the worst-case scenario. If you need help creating and implementing one for your business, let us know! 2021-07-2921 minBetween the BytesBetween the BytesMicrosoft's Print NightmareIn this episode of Between the Bytes, we introduce a new voice to the podcast! Derik Parkinson is a specialist on the Executech Marketing Team. Derik welcomes back James Fair, Sr. Vice President of Technical Operations at Executech, to help dive into Microsoft's Print Nightmare. A 'proof of concept' article unknowingly exposes a significant vulnerability for Microsoft. After almost 2 months, the issue has yet to be fixed when publishing this episode. Find out what it is, what's at risk, and what can be done about it in this episode of Between the Bytes! ...2021-07-2711 minBetween the BytesBetween the BytesThe Kaseya Breach: Who, How, Why, and What's NextIt's one the largest breaches in cybersecurity history and THE largest ransom ever posted - the Kaseya Breach. In this episode we bring back our VP of Cybersecurity, Tyler Rasmussen to talk about Kaseya. We talk about who they are, what the attack was, how it happened and how it could have been prevented. As always, we're also leaving you with several key security tips on keeping your business data safe. If you have questions about cybersecurity or want to ensure you have the essential layers of cyber protection to...2021-07-1432 minBetween the BytesBetween the BytesWindows 11 is Here! Feature Breakdown and Reactions from IT ExpertsMicrosoft recently announced their latest operating system - Windows 11. In this episode of Between the Bytes we invite James Fair, Sr. Vice President of Technical Operations at Executech to talk about some of the new, standout features, what he likes and doesn't like, system requirements and more.  It also wouldn't be an episode of Between the Bytes without a tip and insight for your business - especially about cybersecurity. Stay tuned to the end to hear about the importance of patching. Learn more about the Windows 11 reveal here.  Worried about th...2021-07-0122 minBetween the BytesBetween the BytesKSL Classifieds Scam, Social Media Phishing, and George PattonWe brought on a special guest this episode to talk about a new phishing scam on the rise for classified websites - including KSL. Welcome Brandon Barnedt, Sr. Vice President of Pacific Region! Brandon shares his brush with a KSL scammer, stories from the frontlines of IT and cybersecurity, and why he's a fan of General George Patton's leadership style. Check it out! Learn more about the ins and outs of cybersecurity with our Ultimate Guide to Cybersecurity. 2021-06-0817 minBetween the BytesBetween the BytesWhite House Cybersecurity Executive Order: Overview, Breakdown, and ThoughtsPresident Biden recently signed a new executive ordered that announced and mandated new cybersecurity measures to be taken by federal agencies. What are the new measures? How does it impact the private sector? What does it all mean? In this episode we breakdown the executive order and tackle these questions. We also talk about the great tactics the Federal government has and will use to stay secure that SMBs can implement today. Read more about the Executive Order here. Have questions about cybersecurity? Need help getting secure? Let's talk cyber. 2021-05-1916 minBetween the BytesBetween the BytesHafnium & the Microsoft Exchange Hack - Everything you need to knowIn this episode of Between the Bytes we invite a new and special guest to explain the Hafnium hack. Welcome to Tyler Rasmussen, the VP of Cybersecurity at Executech. Tyler breaks down all the ins and outs of the hack including: What is Microsoft Exchange? Who/what is Hafnium? What was the breach? Who was impacted? How to clean up after the breach How to (hopefully) prevent/mitigate future attacks We reference a link to a Microsoft blog with guidance on how to clean up your possibly infected exchange servers. Read it here. 2021-03-2327 minBetween the BytesBetween the Bytes2021 Cybersecurity Outlook for BusinessWe brought together a panel of cybersecurity experts to discuss all things cyber in 2021 and beyond. Here are a few of the subjects we talked about: SolarWinds Hack Impact of 2020 on cybersecurity Cyber threats on the horizon Key steps to protect your data *This episode orginialled aired as a webinar as has been reformatted for podcast format.  If you'd like to learn more about keeping your business safe, check out executech.com/cybersecurity2021-03-0451 minBetween the BytesBetween the Bytes[Rundown] 10 Ways to Improve Your PC's Performance & SpeedIs your computer taking longer to boot up? Does it seem to be slowing down? Does it freeze or cause problems? In this short-form Rundown episode, we're covering the top 10 steps you can take to improve the performance of your PC. This podcast comes from one of our most visited blog posts of the past 3 years.  Here's a teaser of some of the steps you can take right now: Delete old programs Purge your cookies Upgrade your RAM and more! 2021-02-0505 minBetween the BytesBetween the BytesJourney to Azure for ISVs: Part 5 - You’re in the cloud, now what? Ongoing maintenance and management in AzureIn the final installment of our Journey to Azure for Independent Software Vendors, we bring together Jeff Palazzo and Alex Hughes to discuss the future of your application and business now that you’re in the cloud. We discuss items like; setting yourself up for success, maintaining proper guardrails, DevOps, and more. 0:00 - 2:50: Empowering your team in Azure 2:50 - 5:00: Managed processes and procedures 5:00 - 7:00: Building the landing zone and setting up guardrails 7:00 - 8:20: Infrastructure as code - or your cloud environment built like a city 8:30 - 9:30: Ensuring that things are trackable and visible 9:30 - 10:50: Getting your ducks in a...2020-12-2426 minBetween the BytesBetween the BytesJourney to Azure for ISVs: Part 4 - The process of moving to the cloudWelcome to our fourth episode of Journey to Azure for ISVs. In this episode, we breakdown the step-by-step process of what moving your software, app, or infrastructure to the cloud actually looks likes. We discuss the rough timelines of each step and the key factors in making a cloud migration project successful. 0:00 - 2:00 - Introducing Alex Hughes, Cloud Engineer/Architect  2:00 - 3:40 - The Cloud Adoption Framework - planning and aligning business outcomes 3:40 - 5:00 - Common approaches to migration 5:00 - 6:00 - Starting with why 6:00 - 9:00 - Digital Inventory and the "5 Rs" of Rationalization - Rehosting, Refactoring, Rearchitecting, Rebuliding, Replacing 9:00...2020-12-2430 minBetween the BytesBetween the BytesJourney to Azure for ISVs: Part 3 - What's so great about Azure?Welcome to our third episode in the Journey to Azure for ISVs series. In this episode, we're going deep on all of the reasons why an ISV would pick Azure over some of the other cloud providers. We'll talk about specific comparison points, share some stories, and as always, nerd out about the cloud.  0:00 - 2:00: Azure's innovations and your ability to innovate 2:10 - 5:20: Considerations about data power 5:20 - 7:50: If Azure were a car, what kind would it be? 8:00 - 14:30: The path to market and the Marketplace application store 15:00 - 20:00: Cost comparison of Microsoft Azure 20:00 - 26:00: Clarification around provisioning a...2020-12-2430 minBetween the BytesBetween the BytesJourney to Azure for ISVs: Part 2 - What are the key business considerations for a move to the cloud?Welcome back to our second part in our series of Journey to Azure for Independent Software Vendors (ISVs). In this episode, we're going to talk in-depth about the business considerations for moving the cloud. What should you examine in your technical infrastructures, financial models, business vision, and beyond before moving to the cloud? 0:00 - 3:50 - Should your app move to the cloud? - Does the market demand it?  3:50 - 5:45 - Why is the SaaS model so pervasive? 5:50 - 13:00 - What is your business vision and roadmap? - Discussion on financial considerations, revenue models, planning, capital expenditures, etc.  13:00 - 16:30...2020-12-2437 minBetween the BytesBetween the BytesJourney to Azure for ISVs: Part 1 - Why the Cloud? Why now?Introducing our series on moving to the cloud - Journey to Azure! In this series of episodes, we'll talk about all the benefits, hesitations, hows, whats, and whys of moving to the cloud for Independent Software Vendors. The first episode is an overview of the general benefits the cloud brings to ISV businesses. 0:00 - 5:00 - Host introduction, about Executech 5:00 - 8:50 - Why you WOULDN'T move to the cloud. 9:00 - 16:45 - Discussion on the major benefits of the cloud to businesses 17:00 - 18:00 - Does the cloud work if I use a SaaS model already? 18:00 - 20:00...2020-12-2421 minBetween the BytesBetween the BytesSolar Winds Hack - Overview of what we know and how it impacts youNews of the Solar Winds hacks on government and private sector systems has been sweeping the media. In this episode of Between the Bytes, we invite special guest Chris Nokes, CTO of Executech to explain the what, who, why, and how of the attack. If you're interested in learning how to protect your organization from cyber threats, visit www.executech.com/cyber. 2020-12-2319 minBetween the BytesBetween the Bytes[Rundown] 15/15 Common Cyber Threats in 2020 and Beyond - Part 3Our third episode covering 15 common types of cyber threats and attacks and how to prevent them. In this episode we're covering the final 5: Ransomware Cryptojacking Water Hole Attack Drive-By Attack Trojan Virus Read the full article on common cybersecurity threats here. 2020-12-2309 minBetween the BytesBetween the Bytes[Rundown] 10/15 Common Cyber Threats in 2020 and Beyond - Part 2Our second episode covering 15 common types of cyber threats and attacks and how to prevent them. In this episode we're covering the next 5: Zero-Day Exploits Cross-Site Attack SQL Injection Man in the Middle Attack Social Engineering Read the full article on common cybersecurity threats here. YouTube Video on using social engineering to gain access to an account with just a phone call. 2020-12-0109 minBetween the BytesBetween the Bytes[Rundown] 5/15 Common Cyber Threats in 2020 and BeyondJoin us for a series of short-form episodes covering 15 common cyber threats. In this episode we're covering the first 5:  Malware Password Theft Traffic Interception Phishing Attacks DDoS Read the full article on common cybersecurity threats here. 2020-11-1014 minBetween the BytesBetween the Bytes[Rundown: Short Form Episode] Cybersecurity Concerns for Manufacturers (and all businesses)We're back and we're introducing an alternative form of episodes - Rundowns. In a Rundown episode, we'll cover a popular technology topic in a short, fast, and digestible format. We'll still have longer episodes mixed in from our webinars, events, and interviews as well. In this episode of Tech Topics Rundown, we cover 5 biggest cyber threats that manufacturing companies face. But it's not just manufacturers that face these risks, all companies should pay attention to these security risks.  Learn more about Executech: https://www.executech.com/about-us/ Have a burning IT question or n...2020-10-0908 minMeat & Potatoes PodcastMeat & Potatoes PodcastSilicon Slopes Live: DJ Dorff - ExecutechOur guest at today's Town Hall event is DJ Dorff, CEO of Executech. DJ’s first passion is for people and relationships, but he also loves technology. His past positions include business operations manager for Adobe, and founding an employee analytics company. DJ now leads Executech as CEO and has brought an increased focus on accountability, and data, while still staying true to his vision of building relationships and helping people. Listen to DJ's story and experience with Executech.2020-10-0329 minBetween the BytesBetween the BytesTechnology & Networking at Home - Our Favorite Hardware for WFHDo you need a firewall at home? How much does it cost to put Sophos on your employee's laptops? What's the best type of router for your home? In this week's episode of Between the Bytes, we'll discuss some of our favorite technology options for our home offices. As always, we'll touch on some security concerns and the steps you can take to make yourself more secure. Want to learn more about IT considerations for remote teams and working from home? Check out our webinar: https://www.executech.com/insight/webinar-it-considerations-for-your-home-office/2020-08-2612 minBetween the BytesBetween the BytesGone Phishing: What is Phishing and How to Protect YourselfIn our latest episode of Between the Bytes we bring a group of of Executech veterans together to discuss phishing. We cover the basics of what phishing or spear-phishing attempt is, how it's gotten worse over the years, and what you can do to protect yourself and your organization from malicious phishing attempts. To learn more about phishing scams targeted to Coronavirus worries, visit: https://www.executech.com/insight/coronavirus-phishing-scams-how-to-protect-your-information/ To request a free cybersecurity assessment or to get information on having a security consultant run a social engineering phishing test at your organization, visit...2020-08-0421 minBetween the BytesBetween the BytesWhy are passwords the worst? Password best practices and moreDo you still need to change your password every 90 days? What is a phishing scam? What is the Dark Web? We hit all of these questions on this insight-packed episode of Between the Bytes. Listen now! Register for our upcoming webinar on the Dark Web and get a complimentary Dark Web scan: https://my.demio.com/ref/erelIRVFGWNY4WcR Check to see if your personal account has ever been part of a public breach: https://haveibeenpwned.com/ Learn more about cybersecurity best practices and ways we help protect your business: https...2020-07-1512 minBetween the BytesBetween the BytesThe Low Down on Microsoft Teams: What we Like and Don't LikeIn this episode, we have an open discussion with Ben Rees, Technical Training Manager, and Jarom Plewe, Business Development about Microsoft Teams. We talk briefly about how Teams got started and we walk through some of the major features that we love most. We also talk about a few of the shortcomings and our wishlists for the future of Teams. Have some thoughts on Teams? Not sure how to use it? Check out this training webinar we did at the start of WFH: https://www.executech.com/insight/webinar-how-to-use-microsoft-teams/ Follow us to get...2020-06-3016 minBetween the BytesBetween the BytesHow to Use Technology to Cut Costs and Improve Efficiency in Your BusinessDuring this episode, the senior leadership at Executech will discuss how businesses can start reducing spend and improving productivity through technology.  The panel will discuss topics like; how to use the cloud to reduce hardware costs, how to improve business processes for greater efficiency, and the importance of maintaining good security measures during this time. For any IT support, cybersecurity or cloud questions, visit executech.com to learn more. 2020-06-2348 minBetween the BytesBetween the BytesDisaster Recovery: How to Prepare Your Business & Maintain ContinuityDoes your business have a disaster recovery plan in place? If not, now is the time. We define disaster recovery as having secondary technology, plan procedures, and trained personnel already in place and ready to respond to any potential, future, work-stopping event. In this episode of Between the Bytes, we'll discuss some of the common (and new) cybersecurity dangers that businesses face. We'll outline a variety of preventative measures you can take to protect your business and how to put together a disaster recovery plan. Our guest on this episode is James Fair: ...2020-06-1632 minBetween the BytesBetween the BytesHR Considerations for Remote TeamsIn this podcast, we'll talk about some of the best practices and tips for managing a remote team, including some things to watch out for and avoid.2020-06-1353 minBetween the BytesBetween the BytesAdapting Your IT in Times of Crisis: Three Real StoriesThree stories from three different disasters and crises in the past two years of Northern California's business community. Learn about how these local businesses leveraged IT to react quickly to disaster and change and the steps you can start taking to...2020-04-3029 minBetween the BytesBetween the BytesWorking from Home - Technology Considerations for Your Remote TeamThis episode of Between the Bytes we discuss the transition to working remotely and the technology considerations companies should have. We'll talk about:VPNsSecurityHardwareRemote Working ToolsAre you ready to work from home (WFH)? Learn more on the...2020-03-1814 min