Tech Insights with Alisha Christian

Mercury IT

In today's rapidly evolving tech landscape, staying informed is more important than ever. "Tech Insights" by Mercury IT is your go-to podcast for expert analysis, industry trends, and actionable insights from top technology professionals.Whether you're interested in cybersecurity, IT infrastructure, emerging technologies, or digital transformation, this podcast covers it all. Tune in to stay ahead of the curve and navigate the complexities of the tech world with confidence. 

الحلقات

  1. ١ سبتمبر

    When Algorithms Meet Shadows: The Hidden Business Impact of AI

    The AI revolution is here, and it's already reshaping how businesses operate—whether you're aware of it or not. In this eye-opening conversation with cybersecurity expert Chris Haigh, we explore the startling reality that approximately 70% of employees are currently using AI tools without their company's knowledge or approval. We dive deep into the cybersecurity implications of this "shadow AI" phenomenon and why it represents a significant risk to your business. When employees feed company proprietary information or personally identifiable data into free AI models, this sensitive information can be used to train the models, potentially making it accessible to others. Even with paid versions of tools like ChatGPT, your data might still be training models unless you specifically change the default settings—a crucial tip that many business leaders miss. The discussion examines AI's dual nature as both a potential security threat—enabling more convincing phishing attempts—and a powerful tool for enhancing security operations. Before implementing AI solutions, businesses need thorough preparatory work including proper data classification, permission settings, and information governance. Without these foundations, AI tools might inadvertently expose sensitive information or bypass security controls. While most executives (78%) acknowledge that AI will be necessary for business growth, only 48% believe their organisations are prepared—and even that figure likely overestimates actual readiness. Chris outlines essential elements of an AI strategy that business leaders should prioritise developing before year-end, including auditing current usage, implementing appropriate policies, and providing adequate training. Register for Chris's upcoming live event on AI readiness to receive practical advice on building an AI strategy.  Access the free AI readiness assessment tool, and an AI usage policy template for your business here Don't wait until you're falling behind—now is the time to understand and prepare for AI's transformative impact on your organisation.

    ٢٨ من الدقائق
  2. ٥ أغسطس

    Deepfakes & Zero-Days: Cybersecurity’s Darkest Threats!

    The cybersecurity landscape is evolving at breakneck speed, demanding ever-greater vigilance from organisations of all sizes. Our latest deep dive with cybersecurity expert Chris reveals three critical threats that will shape the digital battlefield in 2025. We begin by dissecting the SharePoint zero-day crisis that sent shockwaves through the security community. This sophisticated attack targeted on-premises SharePoint servers, allowing Chinese threat actors to bypass authentication protocols and compromise systems across universities, critical infrastructure, and government agencies worldwide. The incident highlights a sobering reality: even with perfect patch management and compliance, zero-day vulnerabilities can still leave you exposed. Chris emphasises that while robust defence is essential, having a well-rehearsed resilience plan is equally crucial when faced with inevitable breaches.  Supply chain vulnerabilities emerge as another significant concern through our analysis of the Allianz vendor breach. The discussion reveals how third-party security failures can directly impact your business operations and reputation. Chris delivers a wake-up call about vendor assessment, noting that under Australian law, you remain responsible for notifying customers of data breaches even when they occur through external suppliers. For smaller businesses, we explore how certifications like SMB 1001 offer an accessible framework for both demonstrating and verifying security compliance. Perhaps most alarming is the rapid evolution of AI-powered threats. Chris demonstrates how deepfake technology has become remarkably accessible, with voice cloning now requiring just three minutes of audio to create convincing replicas. While large organisations may be primary targets for sophisticated deepfake attacks, AI-enhanced phishing presents an immediate danger to businesses of all sizes. We explore how criminals are bypassing multi-factor authentication through methods like device code flow, which exploits legitimate Microsoft authentication processes. Have you evaluated your vendor security requirements or tested your incident response plan recently? Join us to discover practical steps for strengthening your cybersecurity posture against these emerging threats before they find the weaknesses in your defences.

    ٣٧ من الدقائق
  3. ٢ يوليو

    Women in Tech: Breaking Barriers, Building Careers

    Sally-Ann brings three decades of tech industry wisdom to this enlightening conversation about her journey from 1980s London to her current role as Mercury IT's Chief Sales Officer. Drawing from eight years with the company and her extensive career, she offers a candid look at how the industry has transformed, especially for women in technology leadership.    The conversation explores how Mercury IT functions as a Managed Security Service Provider (MSSP), positioning itself as more than just technical support—they become trusted advisors embedded within client organisations. Sally-Ann articulates how this approach creates business value through strategic technology implementation that solves real-world challenges. Her passion for helping clients shines through as she describes Mercury IT's ability to scale alongside growing businesses, from supporting startups to enterprises with hundreds of employees.    Cybersecurity emerges as a central theme throughout the discussion. Sally-Ann doesn't mince words when emphasising that cyber threats are inevitable in today's landscape: "It's not a question of if, it's when." She highlights how Mercury IT's dedicated cyber division provides specialised expertise that most organisations couldn't assemble internally, creating a compelling case for the integrated MSSP model.   What makes this episode particularly valuable is Sally-Ann's leadership insights. She shares her management philosophy of leading by example and nurturing talent, having helped team members transition from administrative roles to successful sales careers. Her advice for aspiring tech professionals is refreshingly practical: trust your instincts, find a mentor, and commit to continuous learning. As artificial intelligence transforms the industry, she emphasises the importance of staying adaptable and forward-thinking.   Connect with Sally-Ann on LinkedIn to learn more about Mercury IT's services or to discuss your organisation's technology challenges. Her willingness to mentor others and share her extensive experience makes her an excellent resource for anyone navigating the rapidly evolving world of business technology.

    ١٧ من الدقائق
  4. ٤ يونيو

    Cybersecurity Made Simple: SMB 1001 for Your Business

    Chris Haig, our Chief Information Security Officer, explains the new SMB 1001 certification designed specifically for small to medium businesses in Australia.  This affordable, user-friendly certification provides a practical approach to cybersecurity with different levels of protection that build upon each other like karate belts. • SMB 1001 was developed by CyberCert and Dynamic Standards International to address the gap in security certifications for SMBs, who make up about 90% of Australian businesses • Traditional security certifications like ISO 27001 are too complex and resource-intensive for small businesses • The certification follows a tiered approach - Bronze ($95/year), Silver ($195/year), Gold ($395/year), Platinum and Diamond • Bronze certification requires meeting just six basic security controls, while Silver has 14 standards and pre-qualifies businesses for cybersecurity insurance • The process is simple: businesses self-assess with help from their MSP, tick off requirements in an easy-to-use dashboard, and have a director sign off • Certified businesses can display the SMB 1001 badge on websites and email signatures, providing a competitive advantage • The certification is dynamic and updated annually to stay current with evolving cybersecurity threats • Government support is growing with initiatives like free Bronze certification through the Cyber Wardens training program Visit the CyberWarden website or contact Mercury IT to start your SMB 1001 certification journey and protect your business with this Australian-made standard that's now going global.

    ٢٦ من الدقائق
  5. ٧ مايو

    Beyond Prevention: Building Cyber Resilience

    Cyber threats continue to evolve at an alarming rate, and for small to medium businesses without dedicated security teams, the landscape can feel overwhelming. Mercury IT's Chief Information Security Officer, Chris Haigh, cuts through the complexity to deliver practical guidance that business owners can immediately implement to protect their operations. The conversation opens with a frank discussion about why cybersecurity feels so complicated for smaller enterprises. Chris explains how the challenge isn't necessarily any single security element, but rather understanding how multiple tools, policies, and training programs fit together to create comprehensive protection. He shares how managed service providers can bundle these solutions to match varying budgets while removing the burden of managing dozens of vendors independently. Ransomware emerges as the most disruptive threat currently facing businesses of all sizes. Chris recounts a revealing case study where proper preparation allowed a client to recover within 24 hours, while less prepared businesses suffered two weeks of downtime following similar attacks. "Every day is money," he reminds listeners, highlighting how preparation dramatically reduces both financial and operational impact. The most compelling insights focus on the shift toward cyber resilience rather than just prevention. Chris advocates for detailed incident response planning and regular tabletop exercises that simulate attacks, allowing teams to practice their responses before a real crisis occurs. His approach to communication during breaches is particularly valuable, emphasising speed, honesty, and proactive messaging to preserve customer trust. Perhaps most surprising is the revelation that many small businesses remain unaware of their compliance obligations under Australia's Notifiable Data Breach scheme and recent ransomware payment disclosure laws. With regulators increasingly taking action against organisations for cybersecurity failures, understanding these requirements has never been more important. Connect with Chris on LinkedIn to receive his exclusive questionnaire for evaluating your IT provider's security capabilities and start strengthening your business's cyber defences today.

    ٢٥ من الدقائق
  6. ٨ أبريل

    Data Hygiene: Essential Tips for Business Security!

    Your digital spring cleaning is long overdue. When was the last time you thought about what happens to all those customer records from 2015? Or those staff CSV exports you created for the Christmas party three years ago? Data hygiene might sound like a mundane topic, but as our cybersecurity expert Martin reveals, it's the cornerstone of modern business security. The fundamental principles are refreshingly straightforward: don't keep data you shouldn't keep, and keep safe the data you do need. Yet most organisations fail spectacularly at both. From businesses collecting birth dates they don't need to companies discovering they're notifying the families of deceased customers about data breaches affecting information that should have been deleted years ago, the consequences can range from embarrassing to legally problematic. Throughout our conversation, Martin shares practical wisdom that businesses of any size can implement immediately. Learn why your recruitment process might be leaking sensitive data through carelessly discarded resumés, discover how to systematically tackle digital clutter with 15-minute daily cleanups, and understand why temporary data exports might be your biggest blind spot. With the rise of AI tools accessing your business data, clean information isn't just about security—it's about effectiveness. Whether you're just starting your data hygiene journey or looking to refine existing practices, this episode provides the actionable insights you need to protect your business and your customers. Ready to transform your approach to data management? Listen now, then visit the Mercury IT website to connect with Martin and his team for personalised guidance on implementing robust data hygiene practices in your organisation.

    ١٦ من الدقائق
  7. ١٢ مارس

    Your Data Is More Valuable Than You Think: Why You Need the Essential Eight

    Cybersecurity isn't just for the big players anymore. In this enlightening conversation, cybersecurity experts Chris and Martin break down Australia's Essential 8 framework - revealing why these eight categories of technical controls have become the gold standard for business protection across the country. The duo dismantles the dangerous myth that small businesses aren't on hackers' radars. "They use a scattergun approach," explains Chris, detailing how automated phishing campaigns target millions simultaneously before compromised credentials are sold between criminal groups. This sobering reality check comes with a compelling comparison: most businesses wouldn't think twice about purchasing building insurance despite the low probability of a fire, yet many resist implementing cybersecurity measures despite the significantly higher likelihood of experiencing a data breach. Supply chain requirements are rapidly changing the game. Even small businesses are finding themselves subject to cybersecurity requirements flowing down from larger contracts, particularly those touching critical infrastructure or government services. As Martin notes, "You might not have realised your widget eventually ends up in critical infrastructure," highlighting the importance of understanding your full supply chain. For listeners just beginning their cybersecurity journey, the experts provide practical starting points: identify what data you have, where it's stored, and who has access to it. They recommend engaging with cybersecurity specialists to assess your current posture against frameworks like Essential 8, NIST, or ISO 27001, depending on your specific needs and risk profile. The conversation closes with personal security tips everyone should implement - from locking down social media accounts to using different passwords across services. Check "Have I Been Pwned" to see if your credentials have already been compromised, and remember that proper data governance includes deleting information you no longer need. As Chris emphasises, "Every little point of data is a point of risk."

    ٣٦ من الدقائق
  8. ٦ فبراير

    2025 Tech Trends: From Agentic AI to Quantum Computing

    Uncover the technology trends that will define the year 2025, as we promise you a deep exploration into the future of artificial intelligence and beyond. Chris, our Chief Information Security Officer, and Martin, our Head of Cyber Security, guide us through the transformative journey of agentic AI, a groundbreaking technology that transcends traditional machine learning to serve as a digital assistant capable of complex problem-solving. As we dissect the possibilities and limitations of AI, you’ll gain insights into its role in sectors like sales and the critical need for verification to avoid misinformation. Our conversation broadens to the realm of business and cybersecurity, where emerging technologies like quantum computing are making waves. Learn about the revolutionary impact quantum advancements have on cryptography and the urgent need for quantum-secure methods. With references to NVIDIA's strides in enhancing computing power, and a spotlight on the intriguing future of spatial computing, we underscore the importance of keeping pace with technological evolution to stay competitive in today’s fast-moving world. Finally, we venture into the world of platform robots and neurological enhancements, exploring a future where technology significantly elevates quality of life. Discover the potential of robots beyond household chores, with ambitious goals of tackling complex tasks in industries like hospitality and aged care, particularly in Japan. Plus, we delve into the possibilities of rapid knowledge acquisition through neurological advancements, which could redefine education and healthcare, aiding individuals with conditions like dementia. This episode paints an optimistic vision of technology’s profound impact on human capabilities and well-being.

    ٣٦ من الدقائق
  9. ٠٣‏/٠٩‏/٢٠٢٤

    The True Cost of a Cyber Breach | Chris Haigh

    What is the true cost of a cyber breach? Today, we uncover the financial and emotional tolls that ransomware attacks can inflict on businesses. Join cybersecurity expert Chris Haigh as he shares compelling real-life examples, like the Robin Hood ransomware attack, and clears up common misconceptions about cyber insurance. Chris also provides practical, immediately actionable cybersecurity measures to protect both personal and business interests. Navigating the nuances of cybersecurity vulnerabilities and ransomware attacks can be overwhelming. Chris shares invaluable insights into the challenges of timely software patching and recounts a cautionary tale of a business breached despite being patched—a stark reminder of the complexity of cyber threats. The discussion also explores the decision-making process around involving insurance, the extensive time commitments, and costs of managing a ransomware incident, making it clear why assessing the full impact before taking action is crucial. Effective communication is pivotal during a cyber crisis. Learn from Chris Haigh why having a well-prepared and practiced communication strategy can save your business from chaos. Understand the importance of cyber resilience through regular practice and the implementation of cybersecurity frameworks like the Essential Eight. Don’t miss out on these critical insights—connect with Chris on LinkedIn to continue the conversation and safeguard your business from evolving cyber threats.

    ٥٧ من الدقائق

حول

In today's rapidly evolving tech landscape, staying informed is more important than ever. "Tech Insights" by Mercury IT is your go-to podcast for expert analysis, industry trends, and actionable insights from top technology professionals.Whether you're interested in cybersecurity, IT infrastructure, emerging technologies, or digital transformation, this podcast covers it all. Tune in to stay ahead of the curve and navigate the complexities of the tech world with confidence.