
Between the Bytes
By Executech
We're bringing you the latest and greatest stories, tips, and ideas from some of the leading IT experts in the West. Get a better idea of how IT impacts and benefits your business. We'll discuss everything from the basics of networking, to cybersecurity, to working from home, new Softwares, and more.

Between the BytesMay 17, 2023

James Fair Guest Appearance: Data Leadership Lessons
One of our co-hosts, James Fair, joined Data Leadership Lessons as a special guest appearance. Here's a repost of the episode in full. Enjoy! "This week, our guest is James Fair. James is a Senior Vice President for Executech. With over 35 years of experience in IT, 30 years in Leadership, and a dozen years in the interpersonal workspace, James combines his love for IT and cybersecurity along with his passion for Leadership development. Our conversation is sure to have something (likely many things) new you can do to make your digital life safer."

James Fair's Guest Appearance: That Tech Show
One of our co-hosts, James Fair, joined That Tech Show as a special guest appearance. Here's a repost of the episode in full. Enjoy!
"This week, we’re talking with James Fair. A man with 35 years of experience under his belt, working his way up from IT support to Senior Vice President at Executech, but what’s probably most interesting is his work in Utah-based Feature Films for Families, a Mormon production company based in Salt Lake City, and his voice-over work."

Cybersecurity Requirements and IT Assessments: Staying Ahead in Today's Digital Landscape - With Lee Weech
Gary and Derik welcome Lee Weech, Director of Sales @ Executech, back to share insights on how businesses can determine whether to use in-house IT or outsource their IT needs. Lee provides examples of when each solution makes sense and emphasizes the importance of communication, collaboration, and a deep understanding of business needs.
The episode also covers new cybersecurity requirements for business insurance and the importance of proactively assessing and mitigating cyber risks. Lee explains what an IT assessment is and provides tips on how companies can avoid falling behind in their organization's technology by investing in training and development and having a clear IT roadmap.
Overall, this episode provides valuable insights for businesses seeking to optimize their IT solutions and ensure they have the right resources and strategies in place to stay competitive and secure in today's digital age.
Enjoy the show!

Login Credentials of SharePoint Users at Risk as a New Phishing Scam Evades Email Filters, Web Filters, and MFA
In this episode, Derik covers a recent phishing scam targeting SharePoint users. He explains how the scam works, and how it is able to bypass email filtering, web filtering, and MFA to steal login credentials.
Additionally, Derik provides tips and strategies from our cybersecurity team for preventing this type of attack and safeguarding your SharePoint account. By the end of this episode, you will have a clear understanding of the threat and the measures you can take to protect your organization.

Unveiling the American Dream: The Role of Banking In Our Pursuit of Happiness and How Finger Pointing and Misinformation Can Destroy It All - With Howard Headlee
In this week's episode, Gary & Derik interview Howard Headlee, President of the Utah Banker's Association, to discuss various banking-related topics.
The conversation delves into the unique landscape of banking in Utah, how Utah stacks up to the rest of the country, and the role banks play in the American dream. Howard also gives terrific insight into what it takes for people (specifically, your staff & coworkers) to be truly happy by explaining the difference between motivators and hygienes.
The episode also addresses the issues and misinformation that lead to the collapse of the Silicon Valley Bank and the potential impact on the banking industry. With Howard's profound insights and expertise, come gain valuable insights into the world of banking, the pursuit of happiness, and the challenges banks face in today's rapidly evolving technical & financial landscape.
Enjoy the show!

Massive Microsoft Exploit Gives Access to Personal Data and the Ability to Manipulate Bing Search Results - Microsoft Launches Security Copilot with Chat GPT
James, Gary, and Derik talk about the recent discovery of a dangerous Microsoft exploit. This exploit not only gave unauthorized access to thousands of Outlook accounts, but it also gave access to personal information via Teams as well as the ability to manipulate Bing search results.
This news broke right around the time Microsoft announced the launch of Security Copilot, a partnership with Chat GPT that will assist cybersecurity professionals in both locating and preventing cyberattacks more effectively. Is this the start of the AI vs Cybersecurity war?
Enjoy the show!

What is the Cloud and Why Should You Care? - The Basics of Cloud Computing and Backup
James, Gary, and Derik get back to the very basics of cloud computing and backup in this episode. Because it can be such a vague and ambiguous term, we want to lay out exactly
What it is Why a company would use it How hard is the transition How would a company get startedThis episode should help get anyone started on their research into cloud, no matter how new you are to the subject. For more information, be sure to check out our Ultimate Guide to Cloud as well!
Enjoy the show!

DoD Communications Security Concerns, Ongoing China Issues, and Banning TikTok - With Jim Christensen, CEO @ Lochbox
Gary and Derik talk with Jim Christensen, CEO @ Lochbox, about how his company handles communications security for the DoD, their push to make comms security a compliance requirement for 3rd party government contractors, and why it should be a much larger concern for companies across the US as a whole.
Lochbox is the result of over 30 years of experience in the secure communications space with their parent company Callware. Callware’s experience developing solutions for the dynamic compliance needs of the Department of Defense taught them the necessity of communication security for standard operations as well as pre/post-cyber attack
Gary, Derik, and Jim also talk about the continued cybersecurity concerns involving China, banning TikTok, and other cybersecurity concerns facing US companies in 2023.
Enjoy the show!

Live Replay: Preparing for the Worst
FEI Utah and Executech got together live for this informative meeting where James navigates through the cyber risks facing businesses in 2023. Get a breakdown of a real risk register for your business.
Understand the essential layers of cyber protection that will help prevent an attack and the key planning steps and tools you should put in place to react and recover from a cyber incident.
If you'd like to see the visuals that accompanied the presentation, check out the recording on LinkedIn or YouTube!

How Safe is Your Data? MFA Bypasses & The Dark Side of AI Development
Gary and Derik welcome back Chet Wisniewski, Principal Research Scientist at Sophos, in this episode as they explore the latest developments in AI and the challenges it presents for cybersecurity.
We discuss the impact (or lack thereof) of AI on various aspects of our daily lives, how bad AI is at coding malware, what it actually can do well, and the latest cybersecurity risk to start making headlines - MFA bypasses.
Join us to learn more about this exciting and sometimes daunting world with the insights of Chet Wisniewski.

Cybersecurity in 2023
Join us as James, Gary, and Derik talk about what to expect on the cybersecurity front this year.
James also covers Executech's next cybersecurity initiatives and how other organizations can implement these measures as well.
Enjoy the show!

What is Between the Bytes?
Welcome to Between the Bytes by Executech, where we discuss cybersecurity, tech news, business, and leadership with specialists from all over. Our goal is to keep listeners informed and up to date on technology and cybersecurity trends to help keep their organizations secure.
We want to help you train your staff in the most simple yet effective manner possible, prioritize IT/cyber inside your organization, and stay in the know with the latest cyber news and tech updates.
So, whether you're a veteran or novice when it comes to cybersecurity & technology, we've got some great stuff for you here!

Royal Mail Ransomware
Gary, James, and Derik talk about a few news stories in this episode, as well as some cost-saving tips for organizations to strengthen budgets without weakening security.
The Royal Mail in the UK was recently hit hard with ransomware, causing a downtime in overseas shipping for almost a week. They cover this as well as yet another T-Mobile attack (making 8 major hacks since 2018) that affected around 37 million accounts.
Enjoy the show!

Healthcare Reimagined with Canary Speech and AI
Gary and Derik welcome a new guest, Henry O'Connell, Co-Founder and CEO @ Canary Speech.
Canary Speech works toward improving the quality of care and quality of life in healthcare with their AI engine that uses vocal biomarker technology. Canary's patented technology screens for mood, stress, and energy levels using a single 20-second audio clip.
Henry joins us to talk about Canary, AI's role in the world today, how far AI has come, and his thoughts on leadership.
Enjoy the show!

Tech Troubleshooting & Cringe-Worthy IT Tickets - With Kody Ogden
Derik welcomes Kody back for a fun follow-up to his first time on the show.
Kody is the Director of Technical Operations @ Executech, and he joins us to provide some excellent DIY troubleshooting tips you can try before reaching out to tech support.
Technology has improved our lives, but that doesn't mean it hasn't made each and every one of us look foolish a few times as well. Kody and Derik talk about some cringe-worthy tech support tickets and experiences they've had in the past.
Enjoy the show!

Microsoft NCE Migration - With Tyler Sisson
Gary & Derik welcome Tyler Sisson for the first time on the show. Tyler is a Cloud Engineer here @ Executech.
Tyler joins the show to talk about Microsoft's upcoming NCE (New Commerce Experience) migration.
Microsoft's Office 365 comes in several packages based on what you want, how many employees you have, and (with this migration) how you want to pay. With all these options paired with Microsoft's apparent love for renaming their products, things can get a bit overwhelming. Tyler's years of experience with Microsoft and Azure make untangling this migration much easier to understand.
As always, be sure to reach out to your IT specialist if you have any questions. We're always here to help!
Enjoy the show!

LastPass Security Breach - What went wrong. Next steps. Action Items.
In this episode, James, Gary, and Derik discuss the recent security issues with LastPass and the importance of updating passwords and taking other precautions to protect your account.
They discuss the potential consequences of not taking these steps and offer tips on how to ensure the security of your online accounts.
Enjoy the show!

Building a Department from Scratch & How To Work With IT Support - with Kody Ogden
Gary and Derik welcome Kody Ogden, Director of Technical Operations @ Executech, for the first time on the show!
Kody has been with Executech for over 5 years now and has built our help desk department from the ground up.
Kody joins us to talk about how he manages his team, the growing pains of building a new department inside a company, and how he and his team have achieved such high customer satisfaction ratings (99% in 2022).
Kody also covers some dos and don'ts of working with IT support.
Enjoy the show!

MFA Attacks & Taylor Swift DDoS
The cryptocurrency exchange company, FTX, lost over $470 million in a recent cyber attack and filed for bankruptcy. Later investigation found records of fraud, causing more headaches for their CEO.
James, Gary, and Derik also talk about MFA issues, red flags appearing when your credentials have been compromised, and Ticketmaster's accidental, self-imposed DDoS attack following Talor Swift's concert announcement.
Enjoy the show!

What is an IT Assessment?
This was one of our most listened-to episodes from last year.
Gary & Derik welcome Lee, Director of Sales at Executech, for the first time on the show. Lee has been with Executech for almost 5 years now and has been a part of countless IT Assessments with new & potential clients.
We invited Lee to talk about what an IT Assessment is, when it's a good time to get one done, and what to look for in an MSP - both before and after they perform one for your organization.
Think your organization is in need of a free IT Assessment? We're happy to help with that and any other questions/concerns you may have regarding Managed IT, Cybersecurity, and Cloud services! Just click here.

YouTuber Calls for DDoS Attacks on Russia
In this episode, Derik, Gary, and James talk about a handful of articles in the news:
YouTuber shows his followers how to execute a DDoS attack and encourages them to use it against Russian websites More information is released showing just how serious the social engineering attack on Uber was A list of over 500 sets of credentials for sale is listed for $4 millionEnjoy the show!

Live Replay: Advanced Cybersecurity
To round out our weekly live episodes for Cybersecurity Awareness month, James, Gary, and Derik dove deeper into what it takes to truly protect your organization.
They covered MDM (Mobile Device Management) and MAM (Mobile Application Management) for organizations to stay secure while their employees use mobile devices (sometimes personal) and work applications.
They also covered more detail on how firewalls work, what to look for, and why they're so vital for every organization to have.
Enjoy the show!

Repost: IT War Stories
As with most service industries, those who work them long enough end up with some pretty incredible stories. In this episode of Between the Bytes, we've got some great tales about highs, lows, and even embarrassing situations.
Join Gary & Derik as they talk with two of our most senior technicians about their time and experiences in the field of IT.

Live Replay: Mac vs. PC
Coke vs. Pepsi, Mcdonald's vs. Burger King, Under Armour vs. Nike, Mac vs. PC.
These are questions that have been deeply ingrained into our culture. The answer to any of these (even if you don't pick sides) can shed light on your personality, start a heated debate, or create irreparable rifts among friends and family.
James, Gary, and Derik have decided to put their friendship to the test and try to discuss the age-old question - Mac or PC?

Live Replay: What's Most Important in Cybersecurity?
Between the Bytes is LIVE every Tuesday in October @ 10:40 am MST for Cybersecurity Awareness Month!
When it comes to cybersecurity, layers of protection are vital. So, where do we start? All the areas that need protection, monitoring, and training can become quite a mountain of information.
James, Gary, and Derik cover the most important places to focus on and some relatively simple actions to take that produce a high yield for your organization's security.

Tech Tune-Ups & Protecting Your Data with Darren Schmidt
Derik & Gary welcome Darren Schmidt, Managed Services Team Lead @ Executech Sacramento, to talk about the importance of keeping your tech and cybersecurity up-to-date, how to accomplish that, and the actual cost to an organization that falls behind.
Darren's extensive background leads to some great tips and ways of putting the importance of IT into perspective. We also get his thoughts on the state of hospitals and other medical facilities across the U.S. and how their lack of cyber protection hurts patient care.
Enjoy the show!

Live Replay: Apple vs. Android
Derik, Gary, and James battle it out to try and decide which is better: Apple or Android, overpriced or mediocre, perfectionist or innovator, blue text bubbles or green.
Derik, a mindless Apple cultist, tries to convince Gary, a giddy Android fanboy, of his incorrect life choices; all while James tries to keep things somewhat on topic.
They talk about the latest Apple product announcements and how they stack up against Android's products.

LastPass & Human Error
Gary, James, and Derik discuss how simple human error exposed an organization that's quite literally built on digital security.
LastPass fell victim to a recent cyberattack by compromised credentials, giving the attackers access to some vital proprietary code.

Apple Thieves & Twitter Whistleblowers
Gary, James, & Derik talk about the major vulnerability Apple's last update resolved. The vulnerability affected everything from iPhone to Mac, and they cover how it works and why it's such a big deal. They also talk about Twitter's ex-employee turned whistleblower and the resulting fallout from his alarming claims.
Enjoy the show!

How Falling for a Simple Lie can Jeopardize Your Organization
We are excited to welcome Chet Wisniewski, Principal Research Scientist @ Sophos, back to the show in this episode! Chet joins us to talk about social engineering, hacker conventions, the dos & don'ts of staff training, and much more!
Learn how social engineering uses the six principles of influence to make people fall for seemingly simple lies, how an attack works, and how reporting paired with communication is the most effective way to prevent data breaches inside an organization.
Enjoy the show!

Texting 9-11, Russian Electronic Warfare, and Carrier Pigeons
Gary, James, and Derik break down another handful of articles from around the world:
Major updates across Apple & Microsoft to fix a number of vulnerabilities The U.S. rolling out a texting feature for 9-11 emergency services city by city Russia's electronic warfare against Ukraine Carrier pigeon beats internet upload speeds in South Africa Another $200 million loss in cryptocurrency from a bridge vulnerabilityEnjoy the show!

Bonus Short: Hands in the Cookie Jar
Chet Wisniewski, Principal Research Scientist @ Sophos, talks about how the theft of (website) cookies can give attackers access to your login credentials across a number of websites and for longer than you might think.
If you'd like to read the article mentioned in the episode, just click here!

Facebook Steals Medical Info, Voyeuristic Cops, and Apple's Vendetta Against Marketing
Derik & Gary are back to talk about marketing! They cover various news articles, from Facebook being sued for tracking confidential medical information, China stealing TikTok user data, authorities wanting to access your cameras in 'emergency situations' without a warrant, to the effect Apple's vendetta has had on Facebook ad revenue and small businesses around the world.
Enjoy the show!

A Masterclass in Team Building
Derik welcomes back Executech's training department, Ben Reese & Christian Arnold, to continue the conversation about personalities in the workplace.
Derik, Ben, and Christian talk about how different personality types can bring positive contrast to a team, the gaps created by having too many similar personalities on a team, and how to overcome weaknesses or friction from either scenario.
We hope you enjoy this masterclass in creating a high-powered team inside your organization!

Pegasus Citizen Surveillance, $100k Bug Bounties, and Pictures from Space
In this episode, Derik, Gary, and James talk about a handful of articles in the news:
Use of Deepfakes to Ace FBI Job Interviews Defense Department Offering $110k in Bug Bounties Pegasus Spyware & Citizen Surveillance Vegas and their MSG Sphere JWST First ImagesTo read the article on learning how to read URLs to prevent phishing scams, click here.
Enjoy the show!

The Truth Behind Cyber Attacks - with Chet Wisniewski
In this episode, Derik & Gary talk with Chet Wisniewski, Principal Research Scientist @ Sophos.
Chet has been in cybersecurity for around 30 years, and that level of seniority in the field offers some great perspectives.
He joins us to talk about what individuals (and organizations) should really be focusing on when it comes to protecting their data, how cyber attacks have evolved over the past 30 years, current cybersecurity trends and what's on the horizon, and simple mistakes people make that leave them wide open for attack.
Enjoy the show!

Making Finance a Competitive Advantage - Special Guest: Joe Holbrook
In this episode, Gary & Derik are joined by Joe Holbrook, Founder & CEO of Kings Peak Tax Consulting. Kings Peak specializes in unique and in-depth areas that can save businesses a lot while partnering with the organization's current CPA.
Joe joins to talk about some key areas to take advantage of before they go away next year, starting his own business, leading people across multiple states & countries, and a lot more.
Enjoy the show!

IT Nerd + Business Leader - Special Guest: Kayden Hicken
Gary & Derik are joined by Kayden Hicken, GM @ Executech Phoenix.
Kayden talks about how growing up working a large dairy farm, being involved in the family businesses, and his fascination with IT took him from Executech technician to Executech General Manager.
This episode gives great insight into personal development from any level and how Kayden manages to maintain such a strong team in Phoenix.
Enjoy the show!

Verizon Data Breach Report - 2022
James, Gary, and Derik break down the Verizon Data Breach Report:
Biggest threats & how some of them work Industries hit the hardest Cyber risks for small businesses Simple (but effective) steps to help prevent data breaches Other best practicesIf you'd like to look at the report, here's the executive summary.
Enjoy the show!

Microsoft Follina Vulnerability
A new Microsoft Office vulnerability dubbed “Follina” could allow cyber attackers to gain control of impacted systems. Gary and James talk about what that means, what you can do, and how collaboration is helping combat this and other attacks.

Building Culture and Growing as a Leader - Special Guest: Joe Bird, GM
Derik & Gary welcome Joe Bird, GM of Executech's Seattle location, in this episode. Joe gives us fantastic insight into leadership in an unfamiliar industry, culture building inside a hybrid office, and his approach to fast and effective personal development. Joe also walks us through his experience running companies overseas and how he ended up with us here at Executech.
Enjoy the show!

The Death of Passwords?
Key leaders in the tech world like Google, Apple, and Microsoft have announced their commitment to expanding support for FIDO. By doing this, they take a big step towards turning phone verification a primary method for accessing accounts and making passwords a thing of the past.
James, Gary, and Derik talk about the pros, cons, and hurdles to overcome in order to turn something like this into the new standard.
Enjoy the show!

Cybersecurity & Compliance Best Practices with John Zanni
We're bringing you the audio-only version of our recent webinar about cybersecurity, compliance, and cyber insurance. Our featured panelists are Tyler Rasmussen, VP of Cybersecurity at Executech, and John Zanni, CEO at Acronis SCS.
The conversation revolves around the perspective of cities and towns, but the thoughts and advice apply to any compliance or regulation required industry.
Main topics we cover:
The latest trends in cybersecurity Security in the hybrid environment Common overlooked pieces of compliance Why cyber insurance is so important So preventative measures you can takeLink to our webinar all about cybersecurity insurance: https://www.executech.com/insights/the-basics-of-cybersecurity-insurance/
Book a meeting with us to talk about cyber concerns: https://info.executech.com/cyber-lunch

Leveraging Personality Tests For Employees & Coworkers
In this episode, Gary & Derik talk about personalities in the workplace with Executech's training department. This episode is the first part of a miniseries we'll be doing with our training department over the next few months.
Ben Rees (Training Manager) and Christian Arnold (Training Team Lead) have been using personality tests like Strengths Finder and Myers Briggs for new techs at Executech with excellent results. Find out why it's important, what information comes from them, success stories, and how it can help your leadership and your entire organization.
Enjoy the show!

A Declaration for the Future of the Internet
The U.S., European Union, and 32 other non-EU countries recently signed The Declaration for the Future of the Internet. Derik, James, and Gary cover what the document is, its goals, possible outcomes, shortcomings, and a lot more!
Enjoy the show!

The Role of PR in Cybersecurity | Special Guest: Mark Fredrickson - SnappConner PR
In this episode, Gary & Derik welcome a special guest to the podcast for the first time. Mark Fredrickson, President of SnappConner PR, brings interesting insights on how a PR firm can (and should) be involved in helping organizations in their response to a cyberattack.
Mark walks us through why it's essential to work with a PR firm to assist in creating an incident response plan and how an organization can work with a PR firm to build a fortress around their brand. We also delve into Mark's leadership insight and how he came to be the president of SnappConner PR.
We hope you enjoy the show!

Cryptocurrency & Their $1 Billion Bridge Problem
Derik and Gary went LIVE to talk with James Fair about cryptocurrency and their billion-dollar bridge problem.
A "bridge" is a service that connects one blockchain to another so that value can be sent between them. Lately, bridges have continually been exposed as a significant gap in security, resulting in the loss of over $1 billion in little more than a year.
James, Derik, and Gary break down what's going on, the overall impact, and what could be done to prevent this and recoup some (if any) losses.

New Cyber Updates: MFA Bombing & Spring4 Shell
We welcome Tyler Rasmussen, VP of Cybersecurity @ Executech, to talk about the latest cybersecurity news & updates. This episode focuses on MFA Bombing, the method rumored to have caused the Okta breach recently, and the Spring4 Shell vulnerability.
Enjoy the show!

Is Your Phone Spamming Itself?
In this episode, Derik, Gary, and James talk about a handful of recent stories in the IT & Cybersecurity world. We cover some great topics from super-powered, $2,000 GPUs to spam texts that appear to come from your own number.
Enjoy the show!

Marketers Review Products & Tools for Businesses
In this episode, Gary & Derik welcome our newest member to the Executech marketing team, Latasha Darden!
It's no secret that businesses use many software products to keep things moving day-to-day. Today, we talk about products we use daily, what we love, what drives us crazy, and the risks of different departments or individuals finding their own products to fill needs for their roles.
Articles Mentioned:

Okta Breach puts Businesses on High Alert
Gary & Derik welcome back Tyler Rasmussen, VP of Cybersecurity, to talk about the Okta breach. In this episode, we'll cover who Okta is, what happened, how it could have been prevented, and cybersecurity rules every organization (and individual) should follow. Enjoy the show!

Cryptocurrency: An Executive Order from The White House
The White House released their "Executive Order on Ensuring Responsible Development of Digital Assets,"
A long title for a very long document full of concerns around cryptocurrency, plans for the US to create their own cryptocurrency, and calls to action (with deadlines) to the Department of the Treasury to start researching cryptocurrencies.
If you'd like to read the lengthy article, you can do so here: The White House.
Or, spare yourself the anguish, and listen as Derik, Gary, and James talk about what's in the article and what it could mean for the future of crypto and everyone involved.

Toyota Ransomware & Russia's Cyber War
In this episode, Derik and James talk about a handful of cybersecurity news stories from around the world.
Japan shuts down a number of Toyota factories in response to ransomware A major microchip manufacturer in the U.S. hit with ransomware Russia, Ukraine, and the U.S. - What could happen on the cyber front? Google continues their MFA crusadeEnjoy the show!

Inside Executech's Training Department
Gary & Derik welcome back Ben Reese, training manager at Executech. Ben talks about the different types of training he'll run for employees and clients. In that same vein, Ben talks about the importance of soft skills training, how to help the training stick, the importance of personality tests, and a lot more. Enjoy the show!

Live Tech Q&A with James Fair
In this episode, Between the Bytes went live while Gary & Derik asked James questions from across the internet. We span a variety of topics, from basic IT to some slightly more advanced questions.
CPU vs GPU vs RAM vs Processors Picking the right computer for your needs AMD Ryzen vs Intel Core i7 vs Apple M1 Processors Easy was to trigger your IT support Basic cybersecurity "https://" vs "http://" And a whole lot more!Enjoy the show!

Repost: Cybersecurity Tips for the Remote Work Model
Our subject matter expert, James Fair, joined ePresence as a guest speaker recently. This is a repost of their podcast episode.
You can find more ePresence here!

Repost: Risk Management Show
Our subject matter expert, James Fair, joined The Risk Management Show as a guest speaker recently. This is a repost of their podcast episode.
You can find more of The Risk Management Show here!

Cryptocurrency & Blockchain | Pt. 3 | Final Part
Derik, Gary, and James jump back into the conversation about cryptocurrency, blockchain, and NFTs in this 3rd & final part of our series.
In this episode, we answer any questions that came through from the first two episodes of the series, talk about wallets for cryptocurrency, and the environmental impact cryptocurrencies have had since the beginning. Be sure to check out the first 2 parts of this series to get the full picture of cryptocurrencies, blockchain, and NFTs.
We hope you enjoy the show!

Cryptocurrency & Blockchain Explained | Pt. 2
Derik, Gary, and James jump back into the conversation about cryptocurrency, blockchain, and NFTs in this 2nd part of our 3-part series.
In case you missed it, we talked about where it all started for blockchain and cryptocurrency in the first part of the series. In this episode, we dive into how cryptocurrency mining works, the ups and downs cryptocurrencies like Bitcoin have had since inception, and dive into NFTs.
We hope you enjoy the show!

Cryptocurrency & Blockchain Explained | Pt. 1
It's no question that blockchain, NFTs, and several cryptocurrencies have been a big topic worldwide for some time now.
Derik & Gary decided to bring in our subject matter expert, James Fair, to give us a crash course in this ever-expanding maze of technology. Over the course of 3 episodes, we'll cover:
Where it all started How blockchain enabled the creation of Bitcoin How blockchain can support supply chain industries How blockchain can be an answer for cybersecurity How Bitcoin mining works How some other cryptocurrencies came to be What is an NFT And a lot more!We hope you enjoy the show!

IT, Administration, & Company Culture
Gary and Derik welcome a new voice to the podcast, Sandra Smith, Chief Administrative Officer @ Executech!
Having been with Executech for over 10 years, Sandra brings some serious expertise when it comes to HR, back-office, and administrative functions of an organization. She joins us to talk about how IT can help an organization's administrative staff.
Maintain a positive culture while working remotely Improve efficiency in back-office processes Safeguard against cybercrimes Build policies to get the most out of your IT Maintain excellent communication with a remote staffWe cover a lot more in this episode; we hope you enjoy it!

What Exactly is a VPN?
With the large movement of people working from home, the need and usage of VPNs has skyrocketed. Derik and Gary welcome back James Fair to talk about what a VPN is, how it works, when you should use one, and some alternatives to them that provide similar services.
As always, if your organization has questions about getting VPNs for your remote staff, cybersecurity, or managed IT in general, just reach out here!

2021 Ends with a Major Vulnerability
Nothing says "Merry Christmas" like a major vulnerability that leaves an alarming number of applications, websites, and organizations at risk.
In this episode, Derik and Gary talk to Tyler Rasmussen, VP of Cybersecurity, about the Log4j/Log4Shell vulnerability. Tyler explains how it works, who's affected, and how to help mitigate the risks.

How the Pros Tackle the Biggest Cyber Issues Today - Webinar Replay
In this episode, join us for a webinar replay as we welcome guests from the Sacramento Kings, Executech, and Acronis to discuss critical cybersecurity and data protection issues.
Takeaways:
• Learn about the biggest digital threats facing businesses today
• Understand why all businesses are at risk of cyber attacks
• Techniques for adapting to ever-changing technology environments
• Best practices and tools for securing your data
• How any business can follow the Kings in stepping up their digital protection

Frontline Tales - IT War Stories
As with most service industries, those who work them long enough end up with some pretty incredible stories. We've got some great tales about highs, lows, and even embarrassing situations in this episode of Between the Bytes. Join Gary & Derik as they talk with two of our most senior technicians about their time and experiences in the field of IT.

What Makes A Great IT Consultant?
What makes a great IT Consultant? Technical skills? Personal skills? A mastery of turning things off and then back on again? Or is it some combination of all of these things?
In this episode, Gary & Derik welcome James Fair and Ben Rees to talk about IT Consultants. We cover what technical and personal skills we look for, how Executech trains in both of those areas, and how both traits can be either roadblocks or opportunities for growth inside the company.

The White House: Cybersecurity In Schools
Hacking, malware, and ransomware have skyrocketed in the US over the past two years, and most industries have felt the pain and stress as a result. Two sectors have felt this pain more than others, however - healthcare and schools.
Recently, The White House passed a bill requiring research on how hard cybercrimes are hitting schools across the US. In this episode, Gary & Derik talk details with James Fair.
- How long will the research take?
- What training will be provided?
- How will this affect teachers and other staff?
- Who will be in charge of making sure it happens?
- And a lot more!

White Hat, Black Hat. Red Hat, Grey Hat.
White Hat hackers find vulnerabilities inside an organization's technological infrastructure to help the organization stay in front of the more nefarious players in the world of cybersecurity.
In this episode, Derik welcomes James and Tyler to talk about these "hackers for good," bug bounty programs, and the other colors of hats hackers may wear.

Keys to a Great IT Roadmap
Gary & James discuss the importance of IT Roadmaps for your organization, who should be involved in creating one, and what should be included.
An IT Roadmap is precisely what it sounds like: it's a visual representation of the future of your technology and systems.
IT Roadmaps allow businesses to take advantage of the infrastructure and systems already in place while still planning how to improve and innovate in the future. A well-maintained, customized, and strategic technology setup isn't something that just happens. It's something that businesses and technology experts map out and plan for.

Credential leaks, angry hackers, & MFA (whether you like it or not).
Microsoft leaks thousands of user credentials, Apple upsets a White-Hat hacker, and Google turns on MFA for thousands without asking. Derik, Gary, and James cover a handful of recent cybersecurity news stories in this episode of Between The Bytes.

Are they listening? How Facebook manages to be a little creepy with their ad timing.
Most all of us have experienced it before; we talk about a particular product and see ads for that product as soon as a few minutes later on Facebook or Instagram. The timing can be very uncanny and maybe even a little creepy. So, Facebook has to be listening to your conversations, right?
In this episode, Gary and Derik talk about how platforms like Facebook & Google know so much about you, whether or not it's something to worry about, and other (more significant) cybersecurity threats that can spawn from social media.

CMMC: Understanding & Implementing Cybersecurity Best Practices - Webinar Replay
In this episode, we're listening in on a recent webinar Executech did with one of our partners, Arctic Wolf.
Join Brad Hanly, Systems Engineer @ Arctic Wolf & James Wright, Technical Director @ Executech, as they dive into the Cybersecurity Maturity Model Certification (CMMC) to discuss the most common questions we have heard, including:
• What is CMMC, and how it applies to your organization?
• How to take action to assess your risk and secure your organization
• What changes may be required to prepare for CMMC?
• What is an actionable plan for an organization to begin this process?
The CMMC can be daunting at times and is required for any organization doing business with the federal government (including 3rd parties). If your organization needs help around the certification, Executech is offering an in-depth CMMC Assessment. Register here!

Preparing Your IT for an Emergency - Webinar Replay
In this special episode of Between The Bytes, we've pulled the audio from our Emergency Preparedness webinar to make it available to everyone!
Executech partnered with Acronis and the League of Oregon Cities to talk about different types of disasters, how they can affect your IT, and how to best prepare for these types of situations.
Speakers:
James Fair - Sr VP of IT Services @ Executech
Tyler Rasumsen - VP of Cybersecurity @ Executech
James Slabey - Sr. Director @ Acronis
Biren Jajal - DR Specialist @ Acronis
Executech takes pride in our emergency preparedness and in-depth incident response plans. If your organization wants to learn more and better prepare for emergencies, reach out to us here!

What is an IT Assessment?
In this episode, Gary & Derik welcome Lee, Director of Sales at Executech, for the first time on the show. Lee has been with Executech for almost 4 years now, and has been a part of countless IT Assessments with new & potential customers.
We invited Lee to talk about what an IT Assessment is, when it's a good time to get one done, and what to look for in an MSP both before and after they perform one for your organization.
Think your organization is in need of an IT Assessment? We're happy to help with that and any other questions/concerns you may have regarding Managed IT, Cybersecurity, and Cloud services! Just click here.

Windows 365: PCs In The Cloud
In this episode, Gary & Derik welcome Jeff Palazzo - VP of Cloud Services at Executech. Jeff joins us to talk about Windows 365, a new and exciting service from Microsoft.
Windows 365 is a new service that will let businesses access Cloud PCs from anywhere, streaming a version of Windows 10 or, soon, Windows 11. Jeff walks us through how it works, who it's made for, and what we can expect!

You Should Be Running Simulated Phishing Attacks
Recently, Ben and his team executed a mock phishing attack inside the company to test our employees. Ben sent out a series of emails that mirrored standard phishing emails sent from cybercriminals using Sophos and their plug-and-play phishing test tools.
We talk about how the test went, what cybercriminals will use against you to make it more likely to miss any red flags, and the psychology behind what makes phishing attacks so effective.
If you'd like to learn more about reading URLs and preventing falling for phishing scams yourself, check out our blog here!
If you'd like to run a phishing test and cybersecurity training inside your organization, we're happy to help!

Mobile Device Management - Keeping Your Company's Data Safe
In this episode, Derik welcomes back Tyler Rasmussen, VP of Cybersecurity at Executech. Tyler joins us to talk about Mobile Device Management (MDM).
Many employees use mobile devices (cellphones, tablets, personal laptops, etc.) to access their organization's assets in the office, or on home/public WiFi networks. Tyler gives some best practices to secure devices, applications, and information across the mobile and personal devices of your employees.
The best practices Derik and Tyler discuss range from simple to advanced. As always, if you have any questions about MDM, Managed IT, or Cybersecurity, just let us know here!

How To Create an Incident Response Plan
In this episode, Gary, Derik, and James talk about Incident Response.
- What is it?
- Why is it important?
- How do you create one for your organization?
With the rapid increase of cyberattacks worldwide, unfortunately, the idea of your organization falling victim is becoming a matter of when, not if it will happen. This growing threat is why layers of cybersecurity are important, but not the final solution. Creating an incident response plan for your organization is a must; and it's the best way to help your organization be prepared for the worst.
If you need help creating an incident response plan for your organization, we're happy to help! Just reach out here --> Free IT Assessment

Ransomware: How to combat it at a large scale
Ransomware has been on an aggressive rise across the US over the past 18 months. In this episode, Gary, James, and Derik talk about an article published by The Verge.
The article offers up a few different ways to bring a stop to ransomware, but each has its own unique set of issues. We hope you enjoy it!
An excellent incident response plan is a must to ensure your organization is ready for the worst-case scenario. If you need help creating and implementing one for your business, let us know!

Microsoft's Print Nightmare
In this episode of Between the Bytes, we introduce a new voice to the podcast! Derik Parkinson is a specialist on the Executech Marketing Team.
Derik welcomes back James Fair, Sr. Vice President of Technical Operations at Executech, to help dive into Microsoft's Print Nightmare. A 'proof of concept' article unknowingly exposes a significant vulnerability for Microsoft. After almost 2 months, the issue has yet to be fixed when publishing this episode.
Find out what it is, what's at risk, and what can be done about it in this episode of Between the Bytes!
If you have questions about cybersecurity or want to ensure you have the essential cyber protection layers to defend your business, get in touch! We can run a complimentary cybersecurity assessment.

The Kaseya Breach: Who, How, Why, and What's Next
It's one the largest breaches in cybersecurity history and THE largest ransom ever posted - the Kaseya Breach.
In this episode we bring back our VP of Cybersecurity, Tyler Rasmussen to talk about Kaseya. We talk about who they are, what the attack was, how it happened and how it could have been prevented.
As always, we're also leaving you with several key security tips on keeping your business data safe.
If you have questions about cybersecurity or want to ensure you have the essential layers of cyber protection to defend your business, get in touch! We can run a complimentary cybersecurity assessment.

Windows 11 is Here! Feature Breakdown and Reactions from IT Experts
Microsoft recently announced their latest operating system - Windows 11. In this episode of Between the Bytes we invite James Fair, Sr. Vice President of Technical Operations at Executech to talk about some of the new, standout features, what he likes and doesn't like, system requirements and more.
It also wouldn't be an episode of Between the Bytes without a tip and insight for your business - especially about cybersecurity. Stay tuned to the end to hear about the importance of patching.
Learn more about the Windows 11 reveal here.
Worried about the security of your organization? Not sure how to make IT work better for you? Need help getting Microsoft products up and running? Local IT help is just a phone call away.

KSL Classifieds Scam, Social Media Phishing, and George Patton
We brought on a special guest this episode to talk about a new phishing scam on the rise for classified websites - including KSL.
Welcome Brandon Barnedt, Sr. Vice President of Pacific Region! Brandon shares his brush with a KSL scammer, stories from the frontlines of IT and cybersecurity, and why he's a fan of General George Patton's leadership style.
Check it out!
Learn more about the ins and outs of cybersecurity with our Ultimate Guide to Cybersecurity.

White House Cybersecurity Executive Order: Overview, Breakdown, and Thoughts
President Biden recently signed a new executive ordered that announced and mandated new cybersecurity measures to be taken by federal agencies.
What are the new measures? How does it impact the private sector? What does it all mean? In this episode we breakdown the executive order and tackle these questions. We also talk about the great tactics the Federal government has and will use to stay secure that SMBs can implement today.
Read more about the Executive Order here.
Have questions about cybersecurity? Need help getting secure? Let's talk cyber.

Hafnium & the Microsoft Exchange Hack - Everything you need to know
In this episode of Between the Bytes we invite a new and special guest to explain the Hafnium hack.
Welcome to Tyler Rasmussen, the VP of Cybersecurity at Executech.
Tyler breaks down all the ins and outs of the hack including:
What is Microsoft Exchange? Who/what is Hafnium? What was the breach? Who was impacted? How to clean up after the breach How to (hopefully) prevent/mitigate future attacksWe reference a link to a Microsoft blog with guidance on how to clean up your possibly infected exchange servers. Read it here.
Learn more about Executech's managed cybersecurity services and how to start protecting your business.

2021 Cybersecurity Outlook for Business
We brought together a panel of cybersecurity experts to discuss all things cyber in 2021 and beyond.
Here are a few of the subjects we talked about:
SolarWinds Hack Impact of 2020 on cybersecurity Cyber threats on the horizon Key steps to protect your data*This episode orginialled aired as a webinar as has been reformatted for podcast format.
If you'd like to learn more about keeping your business safe, check out executech.com/cybersecurity
![[Rundown] 10 Ways to Improve Your PC's Performance & Speed](https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded_episode400/3630149/3630149-1612481596081-38216eada3ff6.jpg)
[Rundown] 10 Ways to Improve Your PC's Performance & Speed
Is your computer taking longer to boot up? Does it seem to be slowing down? Does it freeze or cause problems?
In this short-form Rundown episode, we're covering the top 10 steps you can take to improve the performance of your PC. This podcast comes from one of our most visited blog posts of the past 3 years.
Here's a teaser of some of the steps you can take right now:
Delete old programs Purge your cookies Upgrade your RAM and more!
Journey to Azure for ISVs: Part 5 - You’re in the cloud, now what? Ongoing maintenance and management in Azure
In the final installment of our Journey to Azure for Independent Software Vendors, we bring together Jeff Palazzo and Alex Hughes to discuss the future of your application and business now that you’re in the cloud. We discuss items like; setting yourself up for success, maintaining proper guardrails, DevOps, and more.
0:00 - 2:50: Empowering your team in Azure 2:50 - 5:00: Managed processes and procedures 5:00 - 7:00: Building the landing zone and setting up guardrails 7:00 - 8:20: Infrastructure as code - or your cloud environment built like a city 8:30 - 9:30: Ensuring that things are trackable and visible 9:30 - 10:50: Getting your ducks in a row 11:00 - 14:00: What is governance, why its important 14:00 - 16:00: Executech’s managed cloud services overview 16:00 - 21:30: You focus on your core competencies, let the cloud facilitate 21:30 - 23:00: Proactive management in the cloud 23:00 - 25:00: The future opportunities and creativity in the cloud 25:00 - 27:00: ClosingWant to learn more about the Azure cloud? Not sure if the cloud is a good move for you, or even where to get started? Already in the cloud but worried you're not getting the most of it?
We're here to help!
Learn more and visit us at www.executech.com/azure

Journey to Azure for ISVs: Part 4 - The process of moving to the cloud
Welcome to our fourth episode of Journey to Azure for ISVs. In this episode, we breakdown the step-by-step process of what moving your software, app, or infrastructure to the cloud actually looks likes. We discuss the rough timelines of each step and the key factors in making a cloud migration project successful.
0:00 - 2:00 - Introducing Alex Hughes, Cloud Engineer/Architect 2:00 - 3:40 - The Cloud Adoption Framework - planning and aligning business outcomes 3:40 - 5:00 - Common approaches to migration 5:00 - 6:00 - Starting with why 6:00 - 9:00 - Digital Inventory and the "5 Rs" of Rationalization - Rehosting, Refactoring, Rearchitecting, Rebuliding, Replacing 9:00 - 10:30 - Which of the "Rs" is right for you and most common? 10:30 - 13:30 - Overview of timetables so far 13:30 - 16:00 - The importance of creating a "landing zone" in Azure 16:00 - 18:30 - The importance of a healthy and optimized cloud environment once you've migrated 18:30 - 20:00 - Timetables of the landing zone 20:00 - 25:00 - Making the move to the cloud! 25:00 - 26:45 - Summary and optimization 26:45 - 30:00 - What can you do to be ready for this process? Prepare for changeWant to learn more about the Azure cloud? Not sure if the cloud is a good move for you, or even where to get started? Already in the cloud but worried you're not getting the most of it?
We're here to help!
Learn more and visit us at www.executech.com/azure

Journey to Azure for ISVs: Part 3 - What's so great about Azure?
Welcome to our third episode in the Journey to Azure for ISVs series. In this episode, we're going deep on all of the reasons why an ISV would pick Azure over some of the other cloud providers. We'll talk about specific comparison points, share some stories, and as always, nerd out about the cloud.
0:00 - 2:00: Azure's innovations and your ability to innovate 2:10 - 5:20: Considerations about data power 5:20 - 7:50: If Azure were a car, what kind would it be? 8:00 - 14:30: The path to market and the Marketplace application store 15:00 - 20:00: Cost comparison of Microsoft Azure 20:00 - 26:00: Clarification around provisioning and how using Azure actually works 26:00 - 30:00: Comprehensive Microsoft supportPower of AI/Machine Learning Case Study Link
Learn more about Executech's Managed Azure Services

Journey to Azure for ISVs: Part 2 - What are the key business considerations for a move to the cloud?
Welcome back to our second part in our series of Journey to Azure for Independent Software Vendors (ISVs). In this episode, we're going to talk in-depth about the business considerations for moving the cloud. What should you examine in your technical infrastructures, financial models, business vision, and beyond before moving to the cloud?
0:00 - 3:50 - Should your app move to the cloud? - Does the market demand it? 3:50 - 5:45 - Why is the SaaS model so pervasive? 5:50 - 13:00 - What is your business vision and roadmap? - Discussion on financial considerations, revenue models, planning, capital expenditures, etc. 13:00 - 16:30 - How a consultant can help with the business operation consideration of the cloud 16:30 - 27:00 - How does your application/software function? Is it old? How is its performance? Does it scale? 27:00 - 34:00 - Can you keep up with change? Can easily can you add new features and innovate today? 34:00 - 37:00 - Summary of considerations: Market demand, company vision, current infrastructure, innovationWant to learn more about the Azure cloud? Not sure if the cloud is a good move for you, or even where to get started? Already in the cloud but worried you're not getting the most of it?
We're here to help!
Learn more and visit us at www.executech.com/azure

Journey to Azure for ISVs: Part 1 - Why the Cloud? Why now?
Introducing our series on moving to the cloud - Journey to Azure!
In this series of episodes, we'll talk about all the benefits, hesitations, hows, whats, and whys of moving to the cloud for Independent Software Vendors.
The first episode is an overview of the general benefits the cloud brings to ISV businesses.
0:00 - 5:00 - Host introduction, about Executech 5:00 - 8:50 - Why you WOULDN'T move to the cloud. 9:00 - 16:45 - Discussion on the major benefits of the cloud to businesses 17:00 - 18:00 - Does the cloud work if I use a SaaS model already? 18:00 - 20:00 - What is the benefit and impact to my customers and end-users if I move to the cloud? 20:00 - 21:00 - Preview of next episodeWant to learn more about the Azure cloud? Not sure if the cloud is a good move for you, or even where to get started? Already in the cloud but worried you're not getting the most of it?
We're here to help!
Learn more and visit us at www.executech.com/azure

Solar Winds Hack - Overview of what we know and how it impacts you
News of the Solar Winds hacks on government and private sector systems has been sweeping the media.
In this episode of Between the Bytes, we invite special guest Chris Nokes, CTO of Executech to explain the what, who, why, and how of the attack.
If you're interested in learning how to protect your organization from cyber threats, visit www.executech.com/cyber.
![[Rundown] 15/15 Common Cyber Threats in 2020 and Beyond - Part 3](https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded_episode400/3630149/3630149-1608745146312-f3f0a0caa8de3.jpg)
[Rundown] 15/15 Common Cyber Threats in 2020 and Beyond - Part 3
Our third episode covering 15 common types of cyber threats and attacks and how to prevent them. In this episode we're covering the final 5:
Ransomware Cryptojacking Water Hole Attack Drive-By Attack Trojan VirusRead the full article on common cybersecurity threats here.
![[Rundown] 10/15 Common Cyber Threats in 2020 and Beyond - Part 2](https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded_episode400/3630149/3630149-1606857558809-7df7de08a5482.jpg)
[Rundown] 10/15 Common Cyber Threats in 2020 and Beyond - Part 2
Our second episode covering 15 common types of cyber threats and attacks and how to prevent them. In this episode we're covering the next 5:
Zero-Day Exploits Cross-Site Attack SQL Injection Man in the Middle Attack Social EngineeringRead the full article on common cybersecurity threats here.
YouTube Video on using social engineering to gain access to an account with just a phone call.
![[Rundown] 5/15 Common Cyber Threats in 2020 and Beyond](https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded_episode400/3630149/3630149-1605048654426-0c6dee5c9f68.jpg)
[Rundown] 5/15 Common Cyber Threats in 2020 and Beyond
Join us for a series of short-form episodes covering 15 common cyber threats. In this episode we're covering the first 5:
Malware Password Theft Traffic Interception Phishing Attacks DDoSRead the full article on common cybersecurity threats here.
![[Rundown: Short Form Episode] Cybersecurity Concerns for Manufacturers (and all businesses)](https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded_episode400/3630149/3630149-1602197011975-75a1603b942a8.jpg)
[Rundown: Short Form Episode] Cybersecurity Concerns for Manufacturers (and all businesses)
We're back and we're introducing an alternative form of episodes - Rundowns. In a Rundown episode, we'll cover a popular technology topic in a short, fast, and digestible format. We'll still have longer episodes mixed in from our webinars, events, and interviews as well.
In this episode of Tech Topics Rundown, we cover 5 biggest cyber threats that manufacturing companies face. But it's not just manufacturers that face these risks, all companies should pay attention to these security risks.
Learn more about Executech: https://www.executech.com/about-us/
Have a burning IT question or need help? Get in touch: https://www.executech.com/free-assessment/

Technology & Networking at Home - Our Favorite Hardware for WFH
Do you need a firewall at home? How much does it cost to put Sophos on your employee's laptops? What's the best type of router for your home?
In this week's episode of Between the Bytes, we'll discuss some of our favorite technology options for our home offices. As always, we'll touch on some security concerns and the steps you can take to make yourself more secure.
Want to learn more about IT considerations for remote teams and working from home? Check out our webinar: https://www.executech.com/insight/webinar-it-considerations-for-your-home-office/

Gone Phishing: What is Phishing and How to Protect Yourself
In our latest episode of Between the Bytes we bring a group of of Executech veterans together to discuss phishing. We cover the basics of what phishing or spear-phishing attempt is, how it's gotten worse over the years, and what you can do to protect yourself and your organization from malicious phishing attempts.
To learn more about phishing scams targeted to Coronavirus worries, visit: https://www.executech.com/insight/coronavirus-phishing-scams-how-to-protect-your-information/
To request a free cybersecurity assessment or to get information on having a security consultant run a social engineering phishing test at your organization, visit: https://www.executech.com/contact-us/

Why are passwords the worst? Password best practices and more
Do you still need to change your password every 90 days? What is a phishing scam? What is the Dark Web?
We hit all of these questions on this insight-packed episode of Between the Bytes. Listen now!
Register for our upcoming webinar on the Dark Web and get a complimentary Dark Web scan: https://my.demio.com/ref/erelIRVFGWNY4WcR
Check to see if your personal account has ever been part of a public breach: https://haveibeenpwned.com/
Learn more about cybersecurity best practices and ways we help protect your business: https://www.executech.com/cybersecurityservices/

The Low Down on Microsoft Teams: What we Like and Don't Like
In this episode, we have an open discussion with Ben Rees, Technical Training Manager, and Jarom Plewe, Business Development about Microsoft Teams.
We talk briefly about how Teams got started and we walk through some of the major features that we love most. We also talk about a few of the shortcomings and our wishlists for the future of Teams.
Have some thoughts on Teams? Not sure how to use it? Check out this training webinar we did at the start of WFH: https://www.executech.com/insight/webinar-how-to-use-microsoft-teams/
Follow us to get regular episodes on the latest tech trends, IT news, and tips!

How to Use Technology to Cut Costs and Improve Efficiency in Your Business
During this episode, the senior leadership at Executech will discuss how businesses can start reducing spend and improving productivity through technology.
The panel will discuss topics like; how to use the cloud to reduce hardware costs, how to improve business processes for greater efficiency, and the importance of maintaining good security measures during this time.
For any IT support, cybersecurity or cloud questions, visit executech.com to learn more.

Disaster Recovery: How to Prepare Your Business & Maintain Continuity
Does your business have a disaster recovery plan in place? If not, now is the time. We define disaster recovery as having secondary technology, plan procedures, and trained personnel already in place and ready to respond to any potential, future, work-stopping event.
In this episode of Between the Bytes, we'll discuss some of the common (and new) cybersecurity dangers that businesses face. We'll outline a variety of preventative measures you can take to protect your business and how to put together a disaster recovery plan.
Our guest on this episode is James Fair:
James has always had a passion for technology since a young age. He has been working in the professional technology industry now for over 20 years. Today, James leads the IT Services division at Executech as the Senior VP of IT Services. James is an expert in all things business technology including network infrastructure and cybersecurity. James has overseen the successful implementation of cybersecurity best practices and protections at dozens of organizations across the West.
Get a free Disaster Recovery checklist for your business at: https://www.executech.com/insight/disaster-recovery-plan-checklist/

HR Considerations for Remote Teams
In this podcast, we'll talk about some of the best practices and tips for managing a remote team, including some things to watch out for and avoid.

Adapting Your IT in Times of Crisis: Three Real Stories
