Skip to main content
Spotify for Podcasters
Between the Bytes

Between the Bytes

By Executech

Technology Insights, Cybersecurity Tips and Updates, Leadership Discussions

We're bringing you the latest and greatest stories, tips, and ideas from some of the leading IT experts in the West. Get a better idea of how IT impacts and benefits your business. We'll discuss everything from the basics of networking, to cybersecurity, to working from home, new Softwares, and more.
Available on
Google Podcasts Logo
Overcast Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

James Fair Guest Appearance: Data Leadership Lessons

Between the BytesMay 17, 2023

00:00
44:39
James Fair Guest Appearance: Data Leadership Lessons
May 17, 202344:39
James Fair's Guest Appearance: That Tech Show
May 10, 202348:22
Cybersecurity Requirements and IT Assessments: Staying Ahead in Today's Digital Landscape - With Lee Weech

Cybersecurity Requirements and IT Assessments: Staying Ahead in Today's Digital Landscape - With Lee Weech

Gary and Derik welcome Lee Weech, Director of Sales @ Executech, back to share insights on how businesses can determine whether to use in-house IT or outsource their IT needs. Lee provides examples of when each solution makes sense and emphasizes the importance of communication, collaboration, and a deep understanding of business needs.

The episode also covers new cybersecurity requirements for business insurance and the importance of proactively assessing and mitigating cyber risks. Lee explains what an IT assessment is and provides tips on how companies can avoid falling behind in their organization's technology by investing in training and development and having a clear IT roadmap.

Overall, this episode provides valuable insights for businesses seeking to optimize their IT solutions and ensure they have the right resources and strategies in place to stay competitive and secure in today's digital age.

Enjoy the show!

May 05, 202333:12
Login Credentials of SharePoint Users at Risk as a New Phishing Scam Evades Email Filters, Web Filters, and MFA

Login Credentials of SharePoint Users at Risk as a New Phishing Scam Evades Email Filters, Web Filters, and MFA

In this episode, Derik covers a recent phishing scam targeting SharePoint users. He explains how the scam works, and how it is able to bypass email filtering, web filtering, and MFA to steal login credentials.

Additionally, Derik provides tips and strategies from our cybersecurity team for preventing this type of attack and safeguarding your SharePoint account. By the end of this episode, you will have a clear understanding of the threat and the measures you can take to protect your organization.

Apr 26, 202308:41
Unveiling the American Dream: The Role of Banking In Our Pursuit of Happiness and How Finger Pointing and Misinformation Can Destroy It All - With Howard Headlee

Unveiling the American Dream: The Role of Banking In Our Pursuit of Happiness and How Finger Pointing and Misinformation Can Destroy It All - With Howard Headlee

In this week's episode, Gary & Derik interview Howard Headlee, President of the Utah Banker's Association, to discuss various banking-related topics.

The conversation delves into the unique landscape of banking in Utah, how Utah stacks up to the rest of the country, and the role banks play in the American dream. Howard also gives terrific insight into what it takes for people (specifically, your staff & coworkers) to be truly happy by explaining the difference between motivators and hygienes.

The episode also addresses the issues and misinformation that lead to the collapse of the Silicon Valley Bank and the potential impact on the banking industry. With Howard's profound insights and expertise, come gain valuable insights into the world of banking, the pursuit of happiness, and the challenges banks face in today's rapidly evolving technical & financial landscape.

Enjoy the show!

Apr 21, 202337:06
Massive Microsoft Exploit Gives Access to Personal Data and the Ability to Manipulate Bing Search Results - Microsoft Launches Security Copilot with Chat GPT

Massive Microsoft Exploit Gives Access to Personal Data and the Ability to Manipulate Bing Search Results - Microsoft Launches Security Copilot with Chat GPT

James, Gary, and Derik talk about the recent discovery of a dangerous Microsoft exploit. This exploit not only gave unauthorized access to thousands of Outlook accounts, but it also gave access to personal information via Teams as well as the ability to manipulate Bing search results.

This news broke right around the time Microsoft announced the launch of Security Copilot, a partnership with Chat GPT that will assist cybersecurity professionals in both locating and preventing cyberattacks more effectively. Is this the start of the AI vs Cybersecurity war?

Enjoy the show!

Apr 12, 202318:43
What is the Cloud and Why Should You Care? - The Basics of Cloud Computing and Backup
Apr 05, 202325:43
DoD Communications Security Concerns, Ongoing China Issues, and Banning TikTok - With Jim Christensen, CEO @ Lochbox

DoD Communications Security Concerns, Ongoing China Issues, and Banning TikTok - With Jim Christensen, CEO @ Lochbox

Gary and Derik talk with Jim Christensen, CEO @ Lochbox, about how his company handles communications security for the DoD, their push to make comms security a compliance requirement for 3rd party government contractors, and why it should be a much larger concern for companies across the US as a whole.

Lochbox is the result of over 30 years of experience in the secure communications space with their parent company Callware. Callware’s experience developing solutions for the dynamic compliance needs of the Department of Defense taught them the necessity of communication security for standard operations as well as pre/post-cyber attack


Gary, Derik, and Jim also talk about the continued cybersecurity concerns involving China, banning TikTok, and other cybersecurity concerns facing US companies in 2023.


Enjoy the show!

Apr 03, 202340:60
Live Replay: Preparing for the Worst

Live Replay: Preparing for the Worst

FEI Utah and Executech got together live for this informative meeting where James navigates through the cyber risks facing businesses in 2023. Get a breakdown of a real risk register for your business.


Understand the essential layers of cyber protection that will help prevent an attack and the key planning steps and tools you should put in place to react and recover from a cyber incident.


If you'd like to see the visuals that accompanied the presentation, check out the recording on LinkedIn or YouTube!

Mar 28, 202332:48
How Safe is Your Data? MFA Bypasses & The Dark Side of AI Development 

How Safe is Your Data? MFA Bypasses & The Dark Side of AI Development 

Gary and Derik welcome back Chet Wisniewski, Principal Research Scientist at Sophos, in this episode as they explore the latest developments in AI and the challenges it presents for cybersecurity.

We discuss the impact (or lack thereof) of AI on various aspects of our daily lives, how bad AI is at coding malware, what it actually can do well, and the latest cybersecurity risk to start making headlines - MFA bypasses.

Join us to learn more about this exciting and sometimes daunting world with the insights of Chet Wisniewski.

Mar 20, 202346:30
Cybersecurity in 2023

Cybersecurity in 2023

Join us as James, Gary, and Derik talk about what to expect on the cybersecurity front this year. 

James also covers Executech's next cybersecurity initiatives and how other organizations can implement these measures as well. 

Enjoy the show! 

Feb 23, 202331:55
What is Between the Bytes?

What is Between the Bytes?

Welcome to Between the Bytes by Executech, where we discuss cybersecurity, tech news, business, and leadership with specialists from all over. Our goal is to keep listeners informed and up to date on technology and cybersecurity trends to help keep their organizations secure.

We want to help you train your staff in the most simple yet effective manner possible, prioritize IT/cyber inside your organization, and stay in the know with the latest cyber news and tech updates.

So, whether you're a veteran or novice when it comes to cybersecurity & technology, we've got some great stuff for you here!

Feb 10, 202301:11
Royal Mail Ransomware

Royal Mail Ransomware

Gary, James, and Derik talk about a few news stories in this episode, as well as some cost-saving tips for organizations to strengthen budgets without weakening security. 

The Royal Mail in the UK was recently hit hard with ransomware, causing a downtime in overseas shipping for almost a week. They cover this as well as yet another T-Mobile attack (making 8 major hacks since 2018) that affected around 37 million accounts. 

Enjoy the show! 

Feb 08, 202321:20
Healthcare Reimagined with Canary Speech and AI

Healthcare Reimagined with Canary Speech and AI

Gary and Derik welcome a new guest, Henry O'Connell, Co-Founder and CEO @ Canary Speech

Canary Speech works toward improving the quality of care and quality of life in healthcare with their AI engine that uses vocal biomarker technology. Canary's patented technology screens for mood, stress, and energy levels using a single 20-second audio clip. 

Henry joins us to talk about Canary, AI's role in the world today, how far AI has come, and his thoughts on leadership. 

Enjoy the show! 

Jan 26, 202340:12
Tech Troubleshooting & Cringe-Worthy IT Tickets - With Kody Ogden

Tech Troubleshooting & Cringe-Worthy IT Tickets - With Kody Ogden

Derik welcomes Kody back for a fun follow-up to his first time on the show. 

Kody is the Director of Technical Operations @ Executech, and he joins us to provide some excellent DIY troubleshooting tips you can try before reaching out to tech support. 

Technology has improved our lives, but that doesn't mean it hasn't made each and every one of us look foolish a few times as well. Kody and Derik talk about some cringe-worthy tech support tickets and experiences they've had in the past. 

Enjoy the show! 

Jan 18, 202332:14
Microsoft NCE Migration - With Tyler Sisson

Microsoft NCE Migration - With Tyler Sisson

Gary & Derik welcome Tyler Sisson for the first time on the show. Tyler is a Cloud Engineer here @ Executech. 

Tyler joins the show to talk about Microsoft's upcoming NCE (New Commerce Experience) migration. 

Microsoft's Office 365 comes in several packages based on what you want, how many employees you have, and (with this migration) how you want to pay. With all these options paired with Microsoft's apparent love for renaming their products, things can get a bit overwhelming. Tyler's years of experience with Microsoft and Azure make untangling this migration much easier to understand.

As always, be sure to reach out to your IT specialist if you have any questions. We're always here to help! 

Enjoy the show! 

Jan 11, 202326:09
LastPass Security Breach - What went wrong. Next steps. Action Items.

LastPass Security Breach - What went wrong. Next steps. Action Items.

In this episode, James, Gary, and Derik discuss the recent security issues with LastPass and the importance of updating passwords and taking other precautions to protect your account.

They discuss the potential consequences of not taking these steps and offer tips on how to ensure the security of your online accounts.

Enjoy the show! 

Dec 29, 202212:48
Building a Department from Scratch & How To Work With IT Support - with Kody Ogden

Building a Department from Scratch & How To Work With IT Support - with Kody Ogden

Gary and Derik welcome Kody Ogden, Director of Technical Operations @ Executech, for the first time on the show!

Kody has been with Executech for over 5 years now and has built our help desk department from the ground up. 

Kody joins us to talk about how he manages his team, the growing pains of building a new department inside a company, and how he and his team have achieved such high customer satisfaction ratings (99% in 2022). 

Kody also covers some dos and don'ts of working with IT support. 

Enjoy the show! 

Dec 01, 202234:01
MFA Attacks & Taylor Swift DDoS

MFA Attacks & Taylor Swift DDoS

The cryptocurrency exchange company, FTX, lost over $470 million in a recent cyber attack and filed for bankruptcy. Later investigation found records of fraud, causing more headaches for their CEO.

James, Gary, and Derik also talk about MFA issues, red flags appearing when your credentials have been compromised, and Ticketmaster's accidental, self-imposed DDoS attack following Talor Swift's concert announcement. 

Enjoy the show! 

Nov 28, 202230:07
What is an IT Assessment?
Nov 16, 202218:02
YouTuber Calls for DDoS Attacks on Russia

YouTuber Calls for DDoS Attacks on Russia

In this episode, Derik, Gary, and James talk about a handful of articles in the news:

YouTuber shows his followers how to execute a DDoS attack and encourages them to use it against Russian websites More information is released showing just how serious the social engineering attack on Uber was A list of over 500 sets of credentials for sale is listed for $4 million 

Enjoy the show! 

Nov 11, 202223:52
Live Replay: Advanced Cybersecurity

Live Replay: Advanced Cybersecurity

To round out our weekly live episodes for Cybersecurity Awareness month, James, Gary, and Derik dove deeper into what it takes to truly protect your organization.

They covered MDM (Mobile Device Management) and MAM (Mobile Application Management) for organizations to stay secure while their employees use mobile devices (sometimes personal) and work applications.

They also covered more detail on how firewalls work, what to look for, and why they're so vital for every organization to have.

Enjoy the show! 

Nov 03, 202230:15
Repost: IT War Stories

Repost: IT War Stories

As with most service industries, those who work them long enough end up with some pretty incredible stories. In this episode of Between the Bytes, we've got some great tales about highs, lows, and even embarrassing situations.

Join Gary & Derik as they talk with two of our most senior technicians about their time and experiences in the field of IT.

Oct 26, 202223:57
Live Replay: Mac vs. PC

Live Replay: Mac vs. PC

Coke vs. Pepsi, Mcdonald's vs. Burger King, Under Armour vs. Nike, Mac vs. PC. 

These are questions that have been deeply ingrained into our culture. The answer to any of these (even if you don't pick sides) can shed light on your personality, start a heated debate, or create irreparable rifts among friends and family.

James, Gary, and Derik have decided to put their friendship to the test and try to discuss the age-old question - Mac or PC?

Oct 19, 202240:16
Live Replay: What's Most Important in Cybersecurity?

Live Replay: What's Most Important in Cybersecurity?

Between the Bytes is LIVE every Tuesday in October @ 10:40 am MST for Cybersecurity Awareness Month! 

When it comes to cybersecurity, layers of protection are vital. So, where do we start? All the areas that need protection, monitoring, and training can become quite a mountain of information.

James, Gary, and Derik cover the most important places to focus on and some relatively simple actions to take that produce a high yield for your organization's security.

Oct 13, 202231:55
Tech Tune-Ups & Protecting Your Data with Darren Schmidt

Tech Tune-Ups & Protecting Your Data with Darren Schmidt

Derik & Gary welcome Darren Schmidt, Managed Services Team Lead @ Executech Sacramento, to talk about the importance of keeping your tech and cybersecurity up-to-date, how to accomplish that, and the actual cost to an organization that falls behind. 

Darren's extensive background leads to some great tips and ways of putting the importance of IT into perspective. We also get his thoughts on the state of hospitals and other medical facilities across the U.S. and how their lack of cyber protection hurts patient care. 

Enjoy the show! 

Oct 06, 202236:15
Live Replay: Apple vs. Android

Live Replay: Apple vs. Android

Derik, Gary, and James battle it out to try and decide which is better: Apple or Android, overpriced or mediocre, perfectionist or innovator, blue text bubbles or green.

Derik, a mindless Apple cultist, tries to convince Gary, a giddy Android fanboy, of his incorrect life choices; all while James tries to keep things somewhat on topic.

They talk about the latest Apple product announcements and how they stack up against Android's products. 

Sep 19, 202240:52
LastPass & Human Error

LastPass & Human Error

Gary, James, and Derik discuss how simple human error exposed an organization that's quite literally built on digital security. 

LastPass fell victim to a recent cyberattack by compromised credentials, giving the attackers access to some vital proprietary code.

Sep 14, 202214:06
Apple Thieves & Twitter Whistleblowers

Apple Thieves & Twitter Whistleblowers

Gary, James, & Derik talk about the major vulnerability Apple's last update resolved. The vulnerability affected everything from iPhone to Mac, and they cover how it works and why it's such a big deal. They also talk about Twitter's ex-employee turned whistleblower and the resulting fallout from his alarming claims. 

Enjoy the show! 

Sep 08, 202220:44
How Falling for a Simple Lie can Jeopardize Your Organization

How Falling for a Simple Lie can Jeopardize Your Organization

We are excited to welcome Chet Wisniewski, Principal Research Scientist @ Sophos, back to the show in this episode! Chet joins us to talk about social engineering, hacker conventions, the dos & don'ts of staff training, and much more! 

Learn how social engineering uses the six principles of influence to make people fall for seemingly simple lies, how an attack works, and how reporting paired with communication is the most effective way to prevent data breaches inside an organization. 

Enjoy the show! 

Sep 02, 202228:53
Texting 9-11, Russian Electronic Warfare, and Carrier Pigeons

Texting 9-11, Russian Electronic Warfare, and Carrier Pigeons

Gary, James, and Derik break down another handful of articles from around the world:

Major updates across Apple & Microsoft to fix a number of vulnerabilities The U.S. rolling out a texting feature for 9-11 emergency services city by city Russia's electronic warfare against Ukraine  Carrier pigeon beats internet upload speeds in South Africa Another $200 million loss in cryptocurrency from a bridge vulnerability 

Enjoy the show! 

Aug 25, 202219:27
Bonus Short: Hands in the Cookie Jar
Aug 23, 202204:28
Facebook Steals Medical Info, Voyeuristic Cops, and Apple's Vendetta Against Marketing

Facebook Steals Medical Info, Voyeuristic Cops, and Apple's Vendetta Against Marketing

Derik & Gary are back to talk about marketing! They cover various news articles, from Facebook being sued for tracking confidential medical information, China stealing TikTok user data, authorities wanting to access your cameras in 'emergency situations' without a warrant, to the effect Apple's vendetta has had on Facebook ad revenue and small businesses around the world. 

Enjoy the show! 

Aug 17, 202228:29
A Masterclass in Team Building

A Masterclass in Team Building

Derik welcomes back Executech's training department, Ben Reese & Christian Arnold, to continue the conversation about personalities in the workplace. 

Derik, Ben, and Christian talk about how different personality types can bring positive contrast to a team, the gaps created by having too many similar personalities on a team, and how to overcome weaknesses or friction from either scenario. 

We hope you enjoy this masterclass in creating a high-powered team inside your organization! 

Aug 04, 202223:50
Pegasus Citizen Surveillance, $100k Bug Bounties, and Pictures from Space
Jul 27, 202236:34
The Truth Behind Cyber Attacks - with Chet Wisniewski

The Truth Behind Cyber Attacks - with Chet Wisniewski

In this episode, Derik & Gary talk with Chet Wisniewski, Principal Research Scientist @ Sophos. 

Chet has been in cybersecurity for around 30 years, and that level of seniority in the field offers some great perspectives.

He joins us to talk about what individuals (and organizations) should really be focusing on when it comes to protecting their data, how cyber attacks have evolved over the past 30 years, current cybersecurity trends and what's on the horizon, and simple mistakes people make that leave them wide open for attack.

Enjoy the show! 

Jul 19, 202239:53
Making Finance a Competitive Advantage - Special Guest: Joe Holbrook

Making Finance a Competitive Advantage - Special Guest: Joe Holbrook

In this episode, Gary & Derik are joined by Joe Holbrook, Founder & CEO of Kings Peak Tax Consulting. Kings Peak specializes in unique and in-depth areas that can save businesses a lot while partnering with the organization's current CPA. 

Joe joins to talk about some key areas to take advantage of before they go away next year, starting his own business, leading people across multiple states & countries, and a lot more. 

Enjoy the show! 

Jul 12, 202231:22
IT Nerd + Business Leader - Special Guest: Kayden Hicken

IT Nerd + Business Leader - Special Guest: Kayden Hicken

Gary & Derik are joined by Kayden Hicken, GM @ Executech Phoenix. 

Kayden talks about how growing up working a large dairy farm, being involved in the family businesses, and his fascination with IT took him from Executech technician to Executech General Manager. 

This episode gives great insight into personal development from any level and how Kayden manages to maintain such a strong team in Phoenix. 

Enjoy the show! 

Jul 07, 202230:16
Verizon Data Breach Report - 2022
Jun 29, 202222:30
Microsoft Follina Vulnerability

Microsoft Follina Vulnerability

A new Microsoft Office vulnerability dubbed “Follina” could allow cyber attackers to gain control of impacted systems. Gary and James talk about what that means, what you can do, and how collaboration is helping combat this and other attacks.

Jun 17, 202219:20
Building Culture and Growing as a Leader - Special Guest: Joe Bird, GM

Building Culture and Growing as a Leader - Special Guest: Joe Bird, GM

Derik & Gary welcome Joe Bird, GM of Executech's Seattle location, in this episode. Joe gives us fantastic insight into leadership in an unfamiliar industry, culture building inside a hybrid office, and his approach to fast and effective personal development. Joe also walks us through his experience running companies overseas and how he ended up with us here at Executech. 

Enjoy the show! 

Jun 09, 202234:16
The Death of Passwords?

The Death of Passwords?

Key leaders in the tech world like Google, Apple, and Microsoft have announced their commitment to expanding support for FIDO. By doing this, they take a big step towards turning phone verification a primary method for accessing accounts and making passwords a thing of the past. 

James, Gary, and Derik talk about the pros, cons, and hurdles to overcome in order to turn something like this into the new standard. 

Enjoy the show! 

Jun 02, 202220:30
Cybersecurity & Compliance Best Practices with John Zanni

Cybersecurity & Compliance Best Practices with John Zanni

We're bringing you the audio-only version of our recent webinar about cybersecurity, compliance, and cyber insurance. Our featured panelists are Tyler Rasmussen, VP of Cybersecurity at Executech, and John Zanni, CEO at Acronis SCS.

The conversation revolves around the perspective of cities and towns, but the thoughts and advice apply to any compliance or regulation required industry. 

Main topics we cover:

The latest trends in cybersecurity Security in the hybrid environment Common overlooked pieces of compliance Why cyber insurance is so important So preventative measures you can take


Link to our webinar all about cybersecurity insurance: https://www.executech.com/insights/the-basics-of-cybersecurity-insurance/

Book a meeting with us to talk about cyber concerns: https://info.executech.com/cyber-lunch

May 24, 202251:55
Leveraging Personality Tests For Employees & Coworkers

Leveraging Personality Tests For Employees & Coworkers

In this episode, Gary & Derik talk about personalities in the workplace with Executech's training department. This episode is the first part of a miniseries we'll be doing with our training department over the next few months. 

Ben Rees (Training Manager) and Christian Arnold (Training Team Lead) have been using personality tests like Strengths Finder and Myers Briggs for new techs at Executech with excellent results. Find out why it's important, what information comes from them, success stories, and how it can help your leadership and your entire organization. 

Enjoy the show! 

May 18, 202217:52
A Declaration for the Future of the Internet

A Declaration for the Future of the Internet

The U.S., European Union, and 32 other non-EU countries recently signed The Declaration for the Future of the Internet. Derik, James, and Gary cover what the document is, its goals, possible outcomes, shortcomings, and a lot more! 

Enjoy the show! 

May 11, 202221:52
The Role of PR in Cybersecurity | Special Guest: Mark Fredrickson - SnappConner PR

The Role of PR in Cybersecurity | Special Guest: Mark Fredrickson - SnappConner PR

In this episode, Gary & Derik welcome a special guest to the podcast for the first time. Mark Fredrickson, President of SnappConner PR, brings interesting insights on how a PR firm can (and should) be involved in helping organizations in their response to a cyberattack. 

Mark walks us through why it's essential to work with a PR firm to assist in creating an incident response plan and how an organization can work with a PR firm to build a fortress around their brand. We also delve into Mark's leadership insight and how he came to be the president of SnappConner PR. 

We hope you enjoy the show! 

May 04, 202227:04
Cryptocurrency & Their $1 Billion Bridge Problem

Cryptocurrency & Their $1 Billion Bridge Problem

Derik and Gary went LIVE to talk with James Fair about cryptocurrency and their billion-dollar bridge problem.

A "bridge" is a service that connects one blockchain to another so that value can be sent between them. Lately, bridges have continually been exposed as a significant gap in security, resulting in the loss of over $1 billion in little more than a year.

James, Derik, and Gary break down what's going on, the overall impact, and what could be done to prevent this and recoup some (if any) losses.

Apr 26, 202225:42
New Cyber Updates: MFA Bombing & Spring4 Shell

New Cyber Updates: MFA Bombing & Spring4 Shell

We welcome Tyler Rasmussen, VP of Cybersecurity @ Executech, to talk about the latest cybersecurity news & updates. This episode focuses on MFA Bombing, the method rumored to have caused the Okta breach recently, and the Spring4 Shell vulnerability. 

Enjoy the show! 

Apr 18, 202209:56
Is Your Phone Spamming Itself?

Is Your Phone Spamming Itself?

In this episode, Derik, Gary, and James talk about a handful of recent stories in the IT & Cybersecurity world. We cover some great topics from super-powered, $2,000 GPUs to spam texts that appear to come from your own number.

Enjoy the show! 

Apr 07, 202215:05
Marketers Review Products & Tools for Businesses
Mar 29, 202231:15
Okta Breach puts Businesses on High Alert

Okta Breach puts Businesses on High Alert

Gary & Derik welcome back Tyler Rasmussen, VP of Cybersecurity, to talk about the Okta breach. In this episode, we'll cover who Okta is, what happened, how it could have been prevented, and cybersecurity rules every organization (and individual) should follow. Enjoy the show! 

Mar 24, 202213:54
Cryptocurrency: An Executive Order from The White House
Mar 16, 202219:56
Toyota Ransomware & Russia's Cyber War

Toyota Ransomware & Russia's Cyber War

In this episode, Derik and James talk about a handful of cybersecurity news stories from around the world. 

Japan shuts down a number of Toyota factories in response to ransomware A major microchip manufacturer in the U.S. hit with ransomware Russia, Ukraine, and the U.S. - What could happen on the cyber front? Google continues their MFA crusade 

Enjoy the show! 

Mar 08, 202224:10
Inside Executech's Training Department

Inside Executech's Training Department

Gary & Derik welcome back Ben Reese, training manager at Executech. Ben talks about the different types of training he'll run for employees and clients. In that same vein, Ben talks about the importance of soft skills training, how to help the training stick, the importance of personality tests, and a lot more. Enjoy the show! 

Mar 03, 202221:60
Live Tech Q&A with James Fair

Live Tech Q&A with James Fair

In this episode, Between the Bytes went live while Gary & Derik asked James questions from across the internet. We span a variety of topics, from basic IT to some slightly more advanced questions.

CPU vs GPU vs RAM vs Processors Picking the right computer for your needs AMD Ryzen vs Intel Core i7 vs Apple M1 Processors Easy was to trigger your IT support Basic cybersecurity "https://" vs "http://" And a whole lot more! 

Enjoy the show! 

Feb 25, 202234:26
Repost: Cybersecurity Tips for the Remote Work Model
Feb 18, 202232:40
Repost: Risk Management Show
Feb 11, 202222:12
Cryptocurrency & Blockchain | Pt. 3 | Final Part

Cryptocurrency & Blockchain | Pt. 3 | Final Part

Derik, Gary, and James jump back into the conversation about cryptocurrency, blockchain, and NFTs in this 3rd & final part of our series.

In this episode, we answer any questions that came through from the first two episodes of the series, talk about wallets for cryptocurrency, and the environmental impact cryptocurrencies have had since the beginning. Be sure to check out the first 2 parts of this series to get the full picture of cryptocurrencies, blockchain, and NFTs.

We hope you enjoy the show!

Feb 08, 202227:24
Cryptocurrency & Blockchain Explained | Pt. 2

Cryptocurrency & Blockchain Explained | Pt. 2

Derik, Gary, and James jump back into the conversation about cryptocurrency, blockchain, and NFTs in this 2nd part of our 3-part series.

In case you missed it, we talked about where it all started for blockchain and cryptocurrency in the first part of the series. In this episode, we dive into how cryptocurrency mining works, the ups and downs cryptocurrencies like Bitcoin have had since inception, and dive into NFTs. 

We hope you enjoy the show!

Jan 31, 202233:13
Cryptocurrency & Blockchain Explained | Pt. 1

Cryptocurrency & Blockchain Explained | Pt. 1

It's no question that blockchain, NFTs, and several cryptocurrencies have been a big topic worldwide for some time now.

Derik & Gary decided to bring in our subject matter expert, James Fair, to give us a crash course in this ever-expanding maze of technology. Over the course of 3 episodes, we'll cover:

Where it all started How blockchain enabled the creation of Bitcoin How blockchain can support supply chain industries How blockchain can be an answer for cybersecurity How Bitcoin mining works How some other cryptocurrencies came to be What is an NFT And a lot more!

We hope you enjoy the show! 

Jan 26, 202224:40
IT, Administration, & Company Culture

IT, Administration, & Company Culture

Gary and Derik welcome a new voice to the podcast, Sandra Smith, Chief Administrative Officer @ Executech!

Having been with Executech for over 10 years, Sandra brings some serious expertise when it comes to HR, back-office, and administrative functions of an organization. She joins us to talk about how IT can help an organization's administrative staff.

Maintain a positive culture while working remotely Improve efficiency in back-office processes Safeguard against cybercrimes Build policies to get the most out of your IT Maintain excellent communication with a remote staff

We cover a lot more in this episode; we hope you enjoy it!

Jan 13, 202225:44
What Exactly is a VPN?
Jan 08, 202219:26
2021 Ends with a Major Vulnerability

2021 Ends with a Major Vulnerability

Nothing says "Merry Christmas" like a major vulnerability that leaves an alarming number of applications, websites, and organizations at risk. 

In this episode, Derik and Gary talk to Tyler Rasmussen, VP of Cybersecurity, about the Log4j/Log4Shell vulnerability. Tyler explains how it works, who's affected, and how to help mitigate the risks. 

Dec 31, 202118:19
How the Pros Tackle the Biggest Cyber Issues Today - Webinar Replay

How the Pros Tackle the Biggest Cyber Issues Today - Webinar Replay

In this episode, join us for a webinar replay as we welcome guests from the Sacramento Kings, Executech, and Acronis to discuss critical cybersecurity and data protection issues.

Takeaways:

• Learn about the biggest digital threats facing businesses today

• Understand why all businesses are at risk of cyber attacks

• Techniques for adapting to ever-changing technology environments

• Best practices and tools for securing your data

• How any business can follow the Kings in stepping up their digital protection

Dec 03, 202147:19
Frontline Tales - IT War Stories

Frontline Tales - IT War Stories

As with most service industries, those who work them long enough end up with some pretty incredible stories. We've got some great tales about highs, lows, and even embarrassing situations in this episode of Between the Bytes. Join Gary & Derik as they talk with two of our most senior technicians about their time and experiences in the field of IT.

Nov 24, 202123:57
What Makes A Great IT Consultant?

What Makes A Great IT Consultant?

What makes a great IT Consultant? Technical skills? Personal skills? A mastery of turning things off and then back on again? Or is it some combination of all of these things?

In this episode, Gary & Derik welcome James Fair and Ben Rees to talk about IT Consultants. We cover what technical and personal skills we look for, how Executech trains in both of those areas, and how both traits can be either roadblocks or opportunities for growth inside the company.

Nov 17, 202125:38
The White House: Cybersecurity In Schools

The White House: Cybersecurity In Schools

Hacking, malware, and ransomware have skyrocketed in the US over the past two years, and most industries have felt the pain and stress as a result. Two sectors have felt this pain more than others, however - healthcare and schools. 


Recently, The White House passed a bill requiring research on how hard cybercrimes are hitting schools across the US. In this episode, Gary & Derik talk details with James Fair.


- How long will the research take?

- What training will be provided?

- How will this affect teachers and other staff?

- Who will be in charge of making sure it happens?

- And a lot more! 

Nov 10, 202120:24
White Hat, Black Hat. Red Hat, Grey Hat.

White Hat, Black Hat. Red Hat, Grey Hat.

White Hat hackers find vulnerabilities inside an organization's technological infrastructure to help the organization stay in front of the more nefarious players in the world of cybersecurity. 


In this episode, Derik welcomes James and Tyler to talk about these "hackers for good," bug bounty programs, and the other colors of hats hackers may wear. 

Nov 04, 202115:56
Keys to a Great IT Roadmap

Keys to a Great IT Roadmap

Gary & James discuss the importance of IT Roadmaps for your organization, who should be involved in creating one, and what should be included. 

An IT Roadmap is precisely what it sounds like: it's a visual representation of the future of your technology and systems.

IT Roadmaps allow businesses to take advantage of the infrastructure and systems already in place while still planning how to improve and innovate in the future. A well-maintained, customized, and strategic technology setup isn't something that just happens. It's something that businesses and technology experts map out and plan for.

Oct 29, 202120:12
Credential leaks, angry hackers, & MFA (whether you like it or not).

Credential leaks, angry hackers, & MFA (whether you like it or not).

Microsoft leaks thousands of user credentials, Apple upsets a White-Hat hacker, and Google turns on MFA for thousands without asking. Derik, Gary, and James cover a handful of recent cybersecurity news stories in this episode of Between The Bytes. 

Oct 17, 202122:55
Are they listening? How Facebook manages to be a little creepy with their ad timing.

Are they listening? How Facebook manages to be a little creepy with their ad timing.

Most all of us have experienced it before; we talk about a particular product and see ads for that product as soon as a few minutes later on Facebook or Instagram. The timing can be very uncanny and maybe even a little creepy. So, Facebook has to be listening to your conversations, right?

In this episode, Gary and Derik talk about how platforms like Facebook & Google know so much about you, whether or not it's something to worry about, and other (more significant) cybersecurity threats that can spawn from social media. 

Oct 01, 202137:05
 CMMC: Understanding & Implementing Cybersecurity Best Practices - Webinar Replay
Sep 20, 202137:21
Preparing Your IT for an Emergency - Webinar Replay
Sep 20, 202147:06
What is an IT Assessment?
Sep 09, 202118:02
Windows 365: PCs In The Cloud

Windows 365: PCs In The Cloud

In this episode, Gary & Derik welcome Jeff Palazzo - VP of Cloud Services at Executech. Jeff joins us to talk about Windows 365, a new and exciting service from Microsoft. 

Windows 365 is a new service that will let businesses access Cloud PCs from anywhere, streaming a version of Windows 10 or, soon, Windows 11. Jeff walks us through how it works, who it's made for, and what we can expect! 

Sep 01, 202122:13
You Should Be Running Simulated Phishing Attacks
Aug 25, 202113:46
Mobile Device Management - Keeping Your Company's Data Safe
Aug 12, 202118:31
How To Create an Incident Response Plan
Aug 05, 202120:31
Ransomware: How to combat it at a large scale

Ransomware: How to combat it at a large scale

Ransomware has been on an aggressive rise across the US over the past 18 months. In this episode, Gary, James, and Derik talk about an article published by The Verge

The article offers up a few different ways to bring a stop to ransomware, but each has its own unique set of issues. We hope you enjoy it! 

An excellent incident response plan is a must to ensure your organization is ready for the worst-case scenario. If you need help creating and implementing one for your business, let us know! 

Jul 29, 202121:49
Microsoft's Print Nightmare
Jul 26, 202111:32
The Kaseya Breach: Who, How, Why, and What's Next
Jul 14, 202132:11
Windows 11 is Here! Feature Breakdown and Reactions from IT Experts
Jul 01, 202122:02
KSL Classifieds Scam, Social Media Phishing, and George Patton
Jun 07, 202117:26
White House Cybersecurity Executive Order: Overview, Breakdown, and Thoughts
May 19, 202116:43
Hafnium & the Microsoft Exchange Hack - Everything you need to know
Mar 23, 202127:16
2021 Cybersecurity Outlook for Business
Mar 04, 202151:20
[Rundown] 10 Ways to Improve Your PC's Performance & Speed
Feb 04, 202105:40
Journey to Azure for ISVs: Part 5 - You’re in the cloud, now what? Ongoing maintenance and management in Azure
Dec 24, 202026:48
Journey to Azure for ISVs: Part 4 - The process of moving to the cloud
Dec 24, 202030:53
Journey to Azure for ISVs: Part 3 - What's so great about Azure?
Dec 24, 202030:21
Journey to Azure for ISVs: Part 2 - What are the key business considerations for a move to the cloud?
Dec 24, 202037:07
Journey to Azure for ISVs: Part 1 - Why the Cloud? Why now?
Dec 24, 202021:48
Solar Winds Hack - Overview of what we know and how it impacts you
Dec 23, 202019:05
[Rundown] 15/15 Common Cyber Threats in 2020 and Beyond - Part 3
Dec 23, 202009:18
[Rundown] 10/15 Common Cyber Threats in 2020 and Beyond - Part 2
Dec 01, 202009:34
[Rundown] 5/15 Common Cyber Threats in 2020 and Beyond
Nov 10, 202014:07
[Rundown: Short Form Episode] Cybersecurity Concerns for Manufacturers (and all businesses)

[Rundown: Short Form Episode] Cybersecurity Concerns for Manufacturers (and all businesses)

We're back and we're introducing an alternative form of episodes - Rundowns. In a Rundown episode, we'll cover a popular technology topic in a short, fast, and digestible format. We'll still have longer episodes mixed in from our webinars, events, and interviews as well.

In this episode of Tech Topics Rundown, we cover 5 biggest cyber threats that manufacturing companies face. But it's not just manufacturers that face these risks, all companies should pay attention to these security risks. 

Learn more about Executech: https://www.executech.com/about-us/

Have a burning IT question or need help? Get in touch: https://www.executech.com/free-assessment/

Oct 08, 202008:39
Technology & Networking at Home - Our Favorite Hardware for WFH
Aug 25, 202012:38
Gone Phishing: What is Phishing and How to Protect Yourself
Aug 04, 202021:47
Why are passwords the worst? Password best practices and more
Jul 14, 202012:53
The Low Down on Microsoft Teams: What we Like and Don't Like
Jun 30, 202016:47
How to Use Technology to Cut Costs and Improve Efficiency in Your Business
Jun 23, 202048:40
Disaster Recovery: How to Prepare Your Business & Maintain Continuity
Jun 16, 202032:09
HR Considerations for Remote Teams

HR Considerations for Remote Teams

In this podcast, we'll talk about some of the best practices and tips for managing a remote team, including some things to watch out for and avoid.

Jun 12, 202053:54
Adapting Your IT in Times of Crisis: Three Real Stories

Adapting Your IT in Times of Crisis: Three Real Stories

Three stories from three different disasters and crises in the past two years of Northern California's business community. Learn about how these local businesses leveraged IT to react quickly to disaster and change and the steps you can start taking to...
Apr 30, 202029:60
Working from Home - Technology Considerations for Your Remote Team

Working from Home - Technology Considerations for Your Remote Team

This episode of Between the Bytes we discuss the transition to working remotely and the technology considerations companies should have. We'll talk about:VPNsSecurityHardwareRemote Working ToolsAre you ready to work from home (WFH)? Learn more on the...
Mar 17, 202014:08