15 episodes

When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked!

UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best practices that give the highest RIO.

UnHacked Phoenix IT Advisors

    • Technology

When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked!

UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best practices that give the highest RIO.

    15. The War Room - Surviving Cyber Attacks

    15. The War Room - Surviving Cyber Attacks

    In a very literal sense, without the proper formula for cyber security, your business is likely to suffer an attack from which you may never recover. This episode could save the life of your business. 

    • 1 hr 24 min
    14. Internet of Things (IoT) - Is Your Fridge a Member of the Russian Mafia?

    14. Internet of Things (IoT) - Is Your Fridge a Member of the Russian Mafia?

    • 1 hr 1 min
    13. Passwords? Haven't we heard it all? Well... no

    13. Passwords? Haven't we heard it all? Well... no

    I like to say, "If cybersecurity protections aren't a giant pain in the ass, you're probably not doing it right." Passwords come to mind. Super long, super complex, never use the same one twice, and change it every 30 - 90 days. That's a pain in the ass right there! 
    But... Here's why it's important and how to keep it simple (well, simple-ish).

    • 54 min
    12. Keystroke Loggers: Is Your Janitor The Problem?

    12. Keystroke Loggers: Is Your Janitor The Problem?

    Your janitor has keys to your office and is expected to enter the building when nobody's home. What if they were paid to plant spy equipment on your computers? True story! How do you protect against that?!?! Well... we'll tell you exactly how!

    • 51 min
    11. Make It Happen To Somebody Else

    11. Make It Happen To Somebody Else

    The sad reality of cybercrime (and crime in general) is that there will always be criminals. Like I was taught when I worked as an armed guard for an armored car company: our goal is not to eradicate crime, our goal is simply to make it happen to somebody else. Cybercriminals WILL steal money. The question is: will it be YOU? Don't be low hanging fruit. Listen to this episode as we teach you how to "Make It Happen To Somebody Else".

    • 44 min
    10. The Russians Are Coming! and what to do about it

    10. The Russians Are Coming! and what to do about it

    In most episodes we talk about the devastating financial and emotional cost of a breach. This time, as far as public record goes, "The company does not expect the incident to have a material impact".
    A Russian state-sponsored attack on HPE (Hewlett Packard Enterprise) "targeted 'a small percentage of HPE mailboxes' used by staff in cybersecurity...." Hmmmmm. Ok...?
    Well, public record is what it is. That said, what can we learn? Take a listen and we'll break it down for you!

    • 40 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
The Neuron: AI Explained
The Neuron
TED Radio Hour
NPR
Dwarkesh Podcast
Dwarkesh Patel