UnHacked - Cybersecurity Made Simple for Small Businesses

Phoenix IT Advisors

When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best practices that give the highest ROI.

  1. 5H AGO

    82. Your IT Company Is Probably Not Patching Your Systems — Here's How to Catch Them

    Hosts:Justin Shelley — Phoenix IT Advisors | https://www.phoenixitadvisors.com/ Note: Co-hosts Mario Zaki and Bryan Lachapelle are absent this episode — they're representing their firms at a trade show in Dallas. Did you know there are 130+ new cybersecurity vulnerabilities discovered every single day? That's nearly 50,000 last year alone — and the number is growing exponentially, fueled in part by AI-powered attacks. In this solo episode, Justin Shelley breaks down one of the most overlooked and mismanaged areas of cybersecurity for small and mid-sized businesses: patch and vulnerability management. Most business owners assume their IT company is handling it. Most of the time, they're wrong. In this episode, Justin covers: What patching actually is — and why it's far more complex than "set it and forget it"The CVE list — the publicly available database of known vulnerabilities and why it should terrify youZero-day vulnerabilities — what they are and why they're especially dangerousThe reactive spiral of death — the real reason your IT company may be dropping the ball (and it's not because they don't care)The reboot problem — why something as simple as restarting a computer is one of the biggest obstacles to keeping your business secureLegacy systems and blind spots — Windows 10, old software, browsers, firewalls, and all the things that aren't getting patched even when you think they areTwo specific questions you should be asking your IT company right now — and what to do if they can't answer themJustin also shares a personal story about a client breach caused by an outdated version of Microsoft Office — one that nearly destroyed that business and ended a client relationship — to illustrate just how real and costly this problem is. This is episode 8 of the Cybersecurity Basics series. If you haven't already, go back and listen to the previous episodes on frameworks, identity and access management, endpoint security, backups, email phishing, and network security. 🎯 Free Resource: Want to know if your business is actually protected? Visit unhackmybusiness.com for show notes, the full video recording, and to schedule your free cybersecurity risk assessment with Phoenix IT Advisors — no matter where you're located.

    28 min
  2. 6D AGO

    81. The Digital Wild West: How the Death of the Network Perimeter Is Leaving Your Business Wide Open

    Hosts:Justin Shelley — Phoenix IT Advisors | https://www.phoenixitadvisors.com/Bryan Lachapelle — B4 Networks | https://www.b4networks.ca/ Your firewall is not enough anymore — and your IT team may not be telling you that. In Episode 81 of UnHacked, Justin and Bryan dig into one of the most misunderstood concepts in cybersecurity: the network perimeter. It used to be simple. Put a firewall on the edge of your network, install antivirus, done. But that world is gone. Today, your data lives in Microsoft 365, SharePoint, Dropbox, cloud apps your HR manager signed up for last Tuesday, your employee's home network, the guest Wi-Fi at your office, and the IoT thermostat down the hall. The "perimeter" is everywhere — which means it has to be protected everywhere. In this episode, you'll learn: Why the traditional firewall is still necessary — but nowhere near sufficientHow cloud platforms like Microsoft 365 require their own security layer (and what that actually looks like)The hidden danger of VPN tunnels drilled through your firewall during the remote work eraWhy your guest Wi-Fi might not actually be a guest networkWhat shadow IT is and why an employee could be walking out the door with your entire company's data right now — legally, and invisiblyThe single most important first step to securing any business: knowing what you actually havePlus, Justin shares the one question every business owner should ask their IT person — and warns that most of the time, the answer they get back will tell them everything they need to know about how exposed they really are. This is Episode 7 in the UnHacked Cybersecurity Basics mini-series. 🔐 Want to know how secure your business really is? Visit https://www.phoenixitadvisors.com/ and mention UnHacked to schedule a free cybersecurity risk assessment.

    29 min
  3. MAR 13

    80. Your Employees Are the Vulnerability: The Truth About Email Scams, Phishing, and the Human Risk You're Ignoring

    Hosts:Justin Shelley — Phoenix IT Advisors | https://www.phoenixitadvisors.com/Mario Zaki — Mazteck IT | https://www.mazteck.com/Bryan Lachapelle — B4 Networks | https://www.b4networks.ca/ What does it take to lose $50,000 in a single email? Not much. A spoofed address. A busy CFO. A wire transfer that clears before anyone realizes what happened. In Episode 80 of UnHacked, Justin Shelley, Mario Zaki, and Bryan Lachapelle dig deep into one of the most financially devastating threats facing businesses today: Business Email Compromise (BEC). This is Episode 6 of their ongoing 12-part series on Security Basics, and this one hits close to home for every business owner who relies on email to run their company — which is all of them. The guys break down exactly how BEC attacks work in two primary forms: lookalike domains designed to trick you letter by letter, and fully compromised email inboxes where a hacker is literally sitting inside your vendor's or employee's account, reading everything and waiting for the right moment to strike. Using AI, attackers can now download entire mailboxes, study communication patterns, and pick up mid-conversation with chilling accuracy. But the scariest part of this episode isn't the technology — it's the human element. From new employees targeted on LinkedIn within days of posting about their new job, to companies that actively silenced their own IT teams who flagged security gaps (and paid dearly for it), the hosts make a compelling case that people — not software — are both the biggest vulnerability and the most powerful defense a company has. You'll learn: The two types of Business Email Compromise and why one is nearly impossible to stop with technology aloneThe one phone call that could have saved a $50,000 wire transfer — and why most companies don't make itWhy punishing employees who report mistakes is one of the most dangerous things a company can doHow attackers use LinkedIn to target new hires and exploit their eagerness to impress leadershipWhat "zero trust" really means in the context of email — and how to build it into your team's daily behaviorHow to report lookalike domains and get them taken downWhy a culture of security awareness is more valuable than any software tool you can buyThis episode is a wake-up call. Email is not safe by default. Your vendors can be compromised. Your new hires are being targeted. And if you don't have written policies and a culture that rewards vigilance, no firewall in the world will save you.

    42 min

Ratings & Reviews

5
out of 5
2 Ratings

About

When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best practices that give the highest ROI.

You Might Also Like