Tech Insights with Alisha Christian

Mercury IT

In today's rapidly evolving tech landscape, staying informed is more important than ever. "Tech Insights" by Mercury IT is your go-to podcast for expert analysis, industry trends, and actionable insights from top technology professionals.Whether you're interested in cybersecurity, IT infrastructure, emerging technologies, or digital transformation, this podcast covers it all. Tune in to stay ahead of the curve and navigate the complexities of the tech world with confidence. 

  1. ٢ ديسمبر

    From Fake Stores to AI Scams: Your Holiday Cyber Safety Guide

    The festive rush is a gift to scammers: more shopping, more parcels, more “urgent” messages. We unpack the most common cons hitting inboxes and phones right now and show you how a short pause and a few simple checks can save your money and identity. From fake storefronts promoted through social ads to parcel “held at customs” texts, we explain how to verify senders, match domains, and trace your original order details so you never have to click blind. We also dive into charity impersonations that mimic trusted brands and campaign tools. You’ll learn a safer donation flow that bypasses risky links altogether, plus quick ways to spot hidden URLs and domain tricks on desktop and mobile. At work and at home, gift card scams remain a favourite: we outline the classic “CEO request,” the two-step verification that kills it, and why retailers warn customers at checkout. For tax season, we break down ATO-themed lures that play on your expectations and emotions, and we share a simple system to catch fraudulent credit checks early with credit file alerts. Scammers are levelling up with AI: voice-cloned calls and realistic video can sound and look like someone you love. We offer a practical defence you can set up at dinner tonight—a family code word—and we close with three cyber habits that outperform any gadget: keep devices and apps updated, use unique long passwords with a manager, and enable MFA or passkeys everywhere. If you’ve ever wondered what to do after you accidentally click, we cover that too: scans, resets, and when to call a pro. If this helped you feel more prepared for the holiday season, follow the show, share it with someone who needs a friendly heads-up, and leave a quick review to help others find us. Since recording the free credit service is no longer available. If you are still interested in protecting your credit identity visit here for more info

    ٣٦ من الدقائق
  2. ٤ نوفمبر

    Building A Cyber Career: Training, Mentors, And Real-World Lessons

    Curiosity, clear thinking, and a calm plan can beat even the smartest phishing email. We sit down with Trent, a cybersecurity analyst at Mercury IT, to map a practical path from the help desk to a rewarding security career, showing how real client problems, steady mentorship, and daily learning build the right instincts. If you’ve ever wondered whether certifications or degrees matter more than experience, or how AI is reshaping both attacks and defences, this conversation offers a grounded, human take. Trent shares why working the help desk was an underrated superpower: it reveals how systems behave, how people really click, and where gaps hide in plain sight. We dive into internal training and phishing simulations that catch staff on those Monday mornings and Friday afternoons, not to trick them, but to build habits that last. From translating jargon for clients to designing controls that aren’t “doom and gloom,” Trent explains how trust and empathy strengthen security far more than fear ever could. We also explore concrete steps for breaking into cyber: pick one certification aligned with your tools, pair it with hands-on practice, and seek out mentors who explain without talking down. Trent outlines how AI now powers convincing social engineering—and how defenders use automation to remove repetitive tasks and focus on higher-value analysis and incident response. For small businesses who still think they’re invisible, we walk through why size offers no safety and how preparedness beats panic every time. If this resonates, follow the show, share it with a teammate who needs a nudge toward better habits, and leave a review with the one security tip you think every business should adopt next.

    ١٩ من الدقائق
  3. ٨ أكتوبر

    Ransomware, MFA & AI Risks: What Leaders Must Know

    Think backups will save you from ransomware? We pull back the curtain on how modern extortion really works, why downtime drags on for weeks, how reputational damage multiplies the cost, and where legal obligations kick in long after systems are back online. From there, we dig into the new reality of MFA: the gaps left in non‑Microsoft apps, fatigue attacks that turn push prompts into an open door, and adversary‑in‑the‑middle kits that steal tokens and skip MFA entirely. The fix is clear and achievable: move to phishing‑resistant MFA with hardware keys or passkeys, and bring your SaaS ecosystem under SSO and policy. Shadow IT and SaaS sprawl are the quiet risks most teams underestimate. Sales, marketing and developers adopt brilliant tools on free plans, often outside governance and logging. We share a simple approach to discover what’s in use, standardise on enterprise features, and set guardrails that protect data without slowing people down. AI sits at the centre of this shift. Staff are already using it, so we talk through practical policies, training, and why a paid, enterprise-grade platform is worth it for privacy and productivity. If you’re building bots or agents, you’ll hear how prompt injection bypasses guardrails, why targeted AI red‑teaming matters, and how to scope projects small to avoid the 95% failure trap. Regulation is rising too. We walk through the Notifiable Data Breach scheme, the SOCI Act for critical infrastructure, and sector standards for finance plus what “defensible position” really means for directors. Documentation, rehearsed response plans, and board‑level ownership turn abstract risk into action. Our aim is to give leaders a concise, workable plan: migrate to phishing‑resistant MFA, map and secure your SaaS supply chain, adopt safe AI with clear rules, and build evidence you can stand behind. If this helped clarify your next steps, subscribe, share it with your leadership team, and leave a quick review. Got a gap you want us to unpack next? Tell us and we’ll cover it.

    ٤٠ من الدقائق
  4. ١ سبتمبر

    When Algorithms Meet Shadows: The Hidden Business Impact of AI

    The AI revolution is here, and it's already reshaping how businesses operate—whether you're aware of it or not. In this eye-opening conversation with cybersecurity expert Chris Haigh, we explore the startling reality that approximately 70% of employees are currently using AI tools without their company's knowledge or approval. We dive deep into the cybersecurity implications of this "shadow AI" phenomenon and why it represents a significant risk to your business. When employees feed company proprietary information or personally identifiable data into free AI models, this sensitive information can be used to train the models, potentially making it accessible to others. Even with paid versions of tools like ChatGPT, your data might still be training models unless you specifically change the default settings—a crucial tip that many business leaders miss. The discussion examines AI's dual nature as both a potential security threat—enabling more convincing phishing attempts—and a powerful tool for enhancing security operations. Before implementing AI solutions, businesses need thorough preparatory work including proper data classification, permission settings, and information governance. Without these foundations, AI tools might inadvertently expose sensitive information or bypass security controls. While most executives (78%) acknowledge that AI will be necessary for business growth, only 48% believe their organisations are prepared—and even that figure likely overestimates actual readiness. Chris outlines essential elements of an AI strategy that business leaders should prioritise developing before year-end, including auditing current usage, implementing appropriate policies, and providing adequate training. Register for Chris's upcoming live event on AI readiness to receive practical advice on building an AI strategy.  Access the free AI readiness assessment tool, and an AI usage policy template for your business here Don't wait until you're falling behind—now is the time to understand and prepare for AI's transformative impact on your organisation.

    ٢٨ من الدقائق
  5. ٥ أغسطس

    Deepfakes & Zero-Days: Cybersecurity’s Darkest Threats!

    The cybersecurity landscape is evolving at breakneck speed, demanding ever-greater vigilance from organisations of all sizes. Our latest deep dive with cybersecurity expert Chris reveals three critical threats that will shape the digital battlefield in 2025. We begin by dissecting the SharePoint zero-day crisis that sent shockwaves through the security community. This sophisticated attack targeted on-premises SharePoint servers, allowing Chinese threat actors to bypass authentication protocols and compromise systems across universities, critical infrastructure, and government agencies worldwide. The incident highlights a sobering reality: even with perfect patch management and compliance, zero-day vulnerabilities can still leave you exposed. Chris emphasises that while robust defence is essential, having a well-rehearsed resilience plan is equally crucial when faced with inevitable breaches.  Supply chain vulnerabilities emerge as another significant concern through our analysis of the Allianz vendor breach. The discussion reveals how third-party security failures can directly impact your business operations and reputation. Chris delivers a wake-up call about vendor assessment, noting that under Australian law, you remain responsible for notifying customers of data breaches even when they occur through external suppliers. For smaller businesses, we explore how certifications like SMB 1001 offer an accessible framework for both demonstrating and verifying security compliance. Perhaps most alarming is the rapid evolution of AI-powered threats. Chris demonstrates how deepfake technology has become remarkably accessible, with voice cloning now requiring just three minutes of audio to create convincing replicas. While large organisations may be primary targets for sophisticated deepfake attacks, AI-enhanced phishing presents an immediate danger to businesses of all sizes. We explore how criminals are bypassing multi-factor authentication through methods like device code flow, which exploits legitimate Microsoft authentication processes. Have you evaluated your vendor security requirements or tested your incident response plan recently? Join us to discover practical steps for strengthening your cybersecurity posture against these emerging threats before they find the weaknesses in your defences.

    ٣٧ من الدقائق
  6. ٢ يوليو

    Women in Tech: Breaking Barriers, Building Careers

    Sally-Ann brings three decades of tech industry wisdom to this enlightening conversation about her journey from 1980s London to her current role as Mercury IT's Chief Sales Officer. Drawing from eight years with the company and her extensive career, she offers a candid look at how the industry has transformed, especially for women in technology leadership.    The conversation explores how Mercury IT functions as a Managed Security Service Provider (MSSP), positioning itself as more than just technical support—they become trusted advisors embedded within client organisations. Sally-Ann articulates how this approach creates business value through strategic technology implementation that solves real-world challenges. Her passion for helping clients shines through as she describes Mercury IT's ability to scale alongside growing businesses, from supporting startups to enterprises with hundreds of employees.    Cybersecurity emerges as a central theme throughout the discussion. Sally-Ann doesn't mince words when emphasising that cyber threats are inevitable in today's landscape: "It's not a question of if, it's when." She highlights how Mercury IT's dedicated cyber division provides specialised expertise that most organisations couldn't assemble internally, creating a compelling case for the integrated MSSP model.   What makes this episode particularly valuable is Sally-Ann's leadership insights. She shares her management philosophy of leading by example and nurturing talent, having helped team members transition from administrative roles to successful sales careers. Her advice for aspiring tech professionals is refreshingly practical: trust your instincts, find a mentor, and commit to continuous learning. As artificial intelligence transforms the industry, she emphasises the importance of staying adaptable and forward-thinking.   Connect with Sally-Ann on LinkedIn to learn more about Mercury IT's services or to discuss your organisation's technology challenges. Her willingness to mentor others and share her extensive experience makes her an excellent resource for anyone navigating the rapidly evolving world of business technology.

    ١٧ من الدقائق
  7. ٤ يونيو

    Cybersecurity Made Simple: SMB 1001 for Your Business

    Chris Haig, our Chief Information Security Officer, explains the new SMB 1001 certification designed specifically for small to medium businesses in Australia.  This affordable, user-friendly certification provides a practical approach to cybersecurity with different levels of protection that build upon each other like karate belts. • SMB 1001 was developed by CyberCert and Dynamic Standards International to address the gap in security certifications for SMBs, who make up about 90% of Australian businesses • Traditional security certifications like ISO 27001 are too complex and resource-intensive for small businesses • The certification follows a tiered approach - Bronze ($95/year), Silver ($195/year), Gold ($395/year), Platinum and Diamond • Bronze certification requires meeting just six basic security controls, while Silver has 14 standards and pre-qualifies businesses for cybersecurity insurance • The process is simple: businesses self-assess with help from their MSP, tick off requirements in an easy-to-use dashboard, and have a director sign off • Certified businesses can display the SMB 1001 badge on websites and email signatures, providing a competitive advantage • The certification is dynamic and updated annually to stay current with evolving cybersecurity threats • Government support is growing with initiatives like free Bronze certification through the Cyber Wardens training program Visit the CyberWarden website or contact Mercury IT to start your SMB 1001 certification journey and protect your business with this Australian-made standard that's now going global.

    ٢٦ من الدقائق
  8. ٧ مايو

    Beyond Prevention: Building Cyber Resilience

    Cyber threats continue to evolve at an alarming rate, and for small to medium businesses without dedicated security teams, the landscape can feel overwhelming. Mercury IT's Chief Information Security Officer, Chris Haigh, cuts through the complexity to deliver practical guidance that business owners can immediately implement to protect their operations. The conversation opens with a frank discussion about why cybersecurity feels so complicated for smaller enterprises. Chris explains how the challenge isn't necessarily any single security element, but rather understanding how multiple tools, policies, and training programs fit together to create comprehensive protection. He shares how managed service providers can bundle these solutions to match varying budgets while removing the burden of managing dozens of vendors independently. Ransomware emerges as the most disruptive threat currently facing businesses of all sizes. Chris recounts a revealing case study where proper preparation allowed a client to recover within 24 hours, while less prepared businesses suffered two weeks of downtime following similar attacks. "Every day is money," he reminds listeners, highlighting how preparation dramatically reduces both financial and operational impact. The most compelling insights focus on the shift toward cyber resilience rather than just prevention. Chris advocates for detailed incident response planning and regular tabletop exercises that simulate attacks, allowing teams to practice their responses before a real crisis occurs. His approach to communication during breaches is particularly valuable, emphasising speed, honesty, and proactive messaging to preserve customer trust. Perhaps most surprising is the revelation that many small businesses remain unaware of their compliance obligations under Australia's Notifiable Data Breach scheme and recent ransomware payment disclosure laws. With regulators increasingly taking action against organisations for cybersecurity failures, understanding these requirements has never been more important. Connect with Chris on LinkedIn to receive his exclusive questionnaire for evaluating your IT provider's security capabilities and start strengthening your business's cyber defences today.

    ٢٥ من الدقائق

حول

In today's rapidly evolving tech landscape, staying informed is more important than ever. "Tech Insights" by Mercury IT is your go-to podcast for expert analysis, industry trends, and actionable insights from top technology professionals.Whether you're interested in cybersecurity, IT infrastructure, emerging technologies, or digital transformation, this podcast covers it all. Tune in to stay ahead of the curve and navigate the complexities of the tech world with confidence.