FortMesa
FortMesa
  • Видео 423
  • Просмотров 14 031
Cybersecurity Basics: Helping Businesses Stay Ahead of Threats
Marvin Bee from MB Systems focuses on educating clients about cybersecurity, using a clear and practical method to help them understand the risks they face. His approach ensures businesses recognize the importance of timely protection to safeguard their operations and data.
Watch the whole episode about what 'reasonable' cybersecurity standards mean and how to protect against cyber incidents effectively: ruclips.net/user/liveJFi_1CtAfVM?feature=share
Subscribe to weekly livestreams:
land.fortmesa.com/fortmesa-msp-cyber-roundtable
Visit FortMesa at:
fortmesa.com/
#msp #cybersecurity #itservices #leftofboom #rightofboom
#managedservices #msp #msphackers #cybersecurity
#cybersecurityforbeginners #n...
Просмотров: 2

Видео

Why Businesses Can't Ignore 'Left of Boom' Risks
Просмотров 54 часа назад
Marvin Bee from MB Systems and Christopher Regan, PLS, CIPP/US, an IAPP Privacy Law Specialist, emphasize that many business owners remain unaware of the potential risks associated with "Left of Boom." They explain how addressing these risks introduces new costs businesses haven’t previously accounted for, focusing on helping owners understand the importance of proactive security measures and w...
What is Left of Boom?
Просмотров 44 часа назад
Matthew Fisch from FortMesa explains "Left of Boom" as the proactive side of security-everything you do to prevent an incident before it happens. Borrowed from military strategy, it highlights actions like preparation, detection, and risk mitigation to stay ahead of threats and avoid the "boom," or critical event. Watch the whole episode about what 'reasonable' cybersecurity standards mean and ...
Becoming the Trusted IT Advisor: The Key Role for MSPs in Guiding Businesses
Просмотров 314 дней назад
Frank Gurnee from Nodeware talks about The trusted advisor role is key for managed service providers, combining proactive and reactive IT expertise to guide businesses effectively, just as if you were their dedicated IT person. Watch the full episode about What Does It Mean to Be an MSP in 2025? Here: ruclips.net/user/live8oT55DH1V_U?si=-DDd9o0EBqdv41sx Subscribe to weekly livestreams: land.for...
How Cybersecurity Became a Business Foundation
Просмотров 714 дней назад
Matthew Fisch from FortMesa discusses how cybersecurity has evolved from an optional consideration to a critical foundation for every business. He explores the journey of identifying the right cybersecurity needs, the role of standardized frameworks in guiding strategies, and the key actions executives must prioritize to achieve real results. Discover actionable insights for MSPs as they balanc...
How Cybersecurity Transforms Small MSPs
Просмотров 614 дней назад
Frank Gurnee from Nodeware talks about how cybersecurity transforms small MSPs and vendor partnerships can help small businesses scale into major players through cybersecurity innovation. Watch the full episode about What Does It Mean to Be an MSP in 2025? Here: ruclips.net/user/live8oT55DH1V_U?si=-DDd9o0EBqdv41sx Subscribe to weekly livestreams: land.fortmesa.com/fortmesa-msp-cyber-roundtable ...
MSPs Deserve Better: The 10% Rule Transforming Detection Accuracy Standards
Просмотров 928 дней назад
Matthew Fisch from FortMesa, Rob Carselle from First Tracks Technology, James Markley from Virtumarc and Raffi Jamgotchian from Triada Networks highlight the critical feedback MSPs are giving to detection vendors: if more than 10% of investigations result in false positives or noise, the detection is no longer valuable. They discuss how this benchmark is reshaping expectations for detection acc...
Redefining IT Response: Why SLAs Matter More Than Promises
Просмотров 1228 дней назад
Matthew Fisch from FortMesa and Alberto Ramos-Izquierdo from RIZQ discuss a pivotal shift in the IT industry: focusing on defining and delivering clear SLAs for response rather than simply claiming response capabilities. They explore how security best practices emphasize that no one should receive alarms directly to their inbox-every piece of telemetry should be carefully tuned to meet precise ...
The Evolution of EDR Solutions
Просмотров 7Месяц назад
The Evolution of EDR Solutions
How POS Systems Secure Retail Payments
Просмотров 18Месяц назад
How POS Systems Secure Retail Payments
2025 PCI DSS Updates Explained
Просмотров 29Месяц назад
2025 PCI DSS Updates Explained
The Role of an Information Security Offices (Sometimes CISO)
Просмотров 26Месяц назад
The Role of an Information Security Offices (Sometimes CISO)
Understanding the Bigger Picture of Cyber Insurance Claims
Просмотров 3Месяц назад
Understanding the Bigger Picture of Cyber Insurance Claims
How Warranties and Cyber Insurance Protect Against Costly Breaches
Просмотров 14Месяц назад
How Warranties and Cyber Insurance Protect Against Costly Breaches
What is the Risk Ownership Chain?
Просмотров 7Месяц назад
What is the Risk Ownership Chain?
How Simulations Uncover Cybersecurity Weaknesses
Просмотров 102 месяца назад
How Simulations Uncover Cybersecurity Weaknesses
First Awareness Mode to Drive User Action
Просмотров 12 месяца назад
First Awareness Mode to Drive User Action
Security Stakeholder Roles
Просмотров 72 месяца назад
Security Stakeholder Roles
Zero Trust is More Than a Network Concept
Просмотров 72 месяца назад
Zero Trust is More Than a Network Concept
Session Tickets & Authentication
Просмотров 82 месяца назад
Session Tickets & Authentication
What is DMARC? Understanding the Email Security Protocol
Просмотров 142 месяца назад
What is DMARC? Understanding the Email Security Protocol
Why MSP Competition is Less Than You Think | Insights & Stats
Просмотров 72 месяца назад
Why MSP Competition is Less Than You Think | Insights & Stats
Stand Out as an MSP: Building Competitive Advantage
Просмотров 82 месяца назад
Stand Out as an MSP: Building Competitive Advantage
1/3 Secrets to Scale Your MSP: Build an Unbeatable Advantage
Просмотров 142 месяца назад
1/3 Secrets to Scale Your MSP: Build an Unbeatable Advantage
New in CIS v8.1: Key Updates and New Asset Classes
Просмотров 263 месяца назад
New in CIS v8.1: Key Updates and New Asset Classes
A Flexible Approach to Frameworks like CIS v8.1
Просмотров 63 месяца назад
A Flexible Approach to Frameworks like CIS v8.1
What is reversible and irreversible encryption
Просмотров 283 месяца назад
What is reversible and irreversible encryption
Why Trusted Advisors Are Essential for Client Success
Просмотров 33 месяца назад
Why Trusted Advisors Are Essential for Client Success
2 Key Exercises to Grow Your Channel with Trusted Advice
3 месяца назад
2 Key Exercises to Grow Your Channel with Trusted Advice
What is a Side-Channel Attack
Просмотров 173 месяца назад
What is a Side-Channel Attack

Комментарии

  • @StiffyIniga
    @StiffyIniga День назад

    Thank you for the clear explanation.

  • @hernandez152
    @hernandez152 13 дней назад

    You said that starlink is completely in the space, so why starlink installed 2 big satellites in Puerto Rico for? One is in Toa Baja near the capital and the other one is in the south side of the island in Ponce.

  • @stevenwarrener8533
    @stevenwarrener8533 22 дня назад

    Will live streaming still work well on starlink in PR??

  • @jupun_
    @jupun_ Месяц назад

    merci fréro pour l'exposé

  • @marlonramanan9112
    @marlonramanan9112 2 месяца назад

    Good video. Thanks for this. I also have to say that I agree with your opinion of doing more Cybersecurity for less $. For example, leverage your RMM and do scripts that execute CIS safeguards as much as possible. Yes, vendors can do software that does the same thing and more.. But it all adds up $$$!

  • @DrCoolZomboi
    @DrCoolZomboi 10 месяцев назад

    e

  • @juan3175
    @juan3175 10 месяцев назад

    Promo sm

  • @ellis6067
    @ellis6067 10 месяцев назад

    I would like to see such a sales series created. 😊

  • @pierreanyansi
    @pierreanyansi 11 месяцев назад

    Thanks guys this was a great show

  • @discjosh23
    @discjosh23 11 месяцев назад

    As a security professional that also came from a restaurant industry , this was an awesome episode!

  • @FortMesa
    @FortMesa Год назад

    Recap links: YUBICO www.yubico.com/product/yubikey-5-series/yubikey-5-nfc/ Amy Babinchak President of National Society of IT Service Providers nsitsp.org Director of ThirdTier thirdtier.net

  • @JeffCaplan313
    @JeffCaplan313 Год назад

    You gotta read the vulnerability finding details... Someone is either going to be updating an application or protocol with a patch/update. Or they're making a change to a configuration item, which will force a newer version to be used or by disabling a system or service. Also, need to consider that the scanning tool might be reporting a false positive, depending on the details and what it's parsing to identify a finding. Otherwise, all other excuses for not making a change require other mitigating products as wrappers or sieves which protect *that* dev from making the requested change, only to introduce vulnerabilities elsewhere in the system.

  • @janeczkamarkert4277
    @janeczkamarkert4277 Год назад

    🌺 Promo'SM