• 51. Behind the Likes: What Small Business Owners Must Know About Social Media Fraud
    May 14 2025

    In this episode of UnHacked, hosts Justin Shelley and Mario Zake are joined by Tim O'Hearn, author and former software engineer, to explore the darker side of social media engagement strategies. Tim shares insights from his personal journey of creating social media bots and discusses the implications of fake activity on platforms like Instagram. The conversation delves into the potential harm of artificial social proof, highlighting the need for small business owners to be discerning about social media metrics. Tim also discusses his book, Framed: A Villain's Perspective on Social Media, and the broader impact of deceptive online practices. Listen to uncover the hidden threats and learn how to navigate the complexities of social media with your business's integrity intact.

    Buy Tim's book here: https://amzn.to/3XoxUC1

    Show More Show Less
    59 mins
  • 50. Security Is a Team Sport: Turning Employees from Liabilities to Cyber Defenders
    May 7 2025

    This episode focuses on the critical role people play in cybersecurity. The hosts discuss how most breaches (95-97%) involve human error, emphasizing that while technology defenses are important, humans remain the weakest link. They explore how hackers exploit human psychology through social engineering and why creating a positive security culture that rewards reporting and learning is crucial. The episode includes stories of successful security awareness programs and offers practical advice for organizations looking to strengthen their "human firewall."

    Show More Show Less
    46 mins
  • 49. Mac or PC? Mario and Damien Duke it out in This Epic Battle of Who Is More Secure
    Apr 8 2025

    Today we bring in a guest who consults with solopreneurs who run their businesses on Macs. This question is debated all the time: Is Mac really more secure than Windows? Well, today we heat things up on UnHacked as we battle it out.

    • Where is Windows more vulnerable?
    • Where is Mac more vulnerable?
    • What threats are the same (PC vs Mac)

    I don't know that we ever solved the primary question... but here are some good tips for staying safe, regardless of which platform you are passionate about.

    Show More Show Less
    53 mins
  • 48. I Hate the Cybersecurity Industry with Dave Sobel of The Business of Tech Podcast
    Apr 4 2025

    Dave Sobel is the host of The Business of Tech, a podcast that delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering ‘Why Do We Care?

    Dave shocked me when he said, "I hate the cybersecurity industry!" So I said, "Let's discuss!" The bottom line is this: we as a society can and should do better.

    • As consumers of cybersecurity products and services, we need to push back on vendors. Why do they get away with having no skin in the game?
    • As citizens, we need to push back on our leaders. Why are we always on defense? Let's play offense!
    • As users of technology, we have our own set of responsibilities. It's time to take that seriously.
    Show More Show Less
    52 mins
  • 47. Architects of Defense with Lori Crooks
    Apr 3 2025

    Lori Crooks is the Founder and CEO of Cadra, Inc. The organization focuses on security assessments and security management projects. With a career focused on information security assessments, developing policies and standards, and advising clients regarding their information security requirements, Lori brings a deep understanding of information security controls

    Show More Show Less
    50 mins
  • 46. Cybersecurity Meets Financial Planning with Eric Brotman
    Mar 26 2025

    Eric D. Brotman, CFP®, is the CEO of BFG Financial Advisors, President of Brotman Consulting Group, LLC, host of the Don’t Retire… Graduate! podcast, and author of the award-winning book, Don’t Retire… Graduate!

    In our pre-interview meeting, Eric said: “Very few things keep me up at night. Not stocks, not capital hill, but having my identity stolen and company infiltrated.” And he has a great reason for this. Several years ago his company was hit with a ransomware attack.

    Show More Show Less
    45 mins
  • 45. How to Protect Your Business When Using 3rd Party Integrations
    Mar 21 2025

    We make a lot of assumptions in the world of tech and cybersecurity. The most common one I see is assuming that a vendor is properly protecting your data. And honestly, that feels like the only option since we can't really see behind the curtains. But what if I told you there is a way to verify that your vendors have the proper cybersecurity safeguards in place? Take a listen!

    Show More Show Less
    33 mins
  • 44. How Will Tariffs Impact Cybersecurity Risks?
    Mar 18 2025

    How will tariffs impact cybersecurity? As costs rise, we will be forced to make difficult decisions. Many will choose not to upgrade old technology which gives the bad guys a huge advantage. Here's what to do about it.

    Show More Show Less
    35 mins