CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Encrypted Data Backups Podcasts
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
1
Top Technology Trends and Predictions for 2026
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04In this episode KJ Burke discusses the technology trends of 2025 and predictions for 2026. He covers the maturation of AI, the importance of treating data as a product, innovations at the edge, managing cross-cloud environments, building business resiliency and automating the skills gap. Looking ahead, he highlights key trends for 2026, including A…
…
continue reading
1
73. Microsoft Engineer Reveals: How AI Can Read Your Entire Database (In Plain English) - with Faiz Gouri
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Bryan Lachapelle - https://www.b4networks.ca/ Guest: Faiz Gouri -https://www.linkedin.com/in/faizgouri/ https://modelcontextprotocol.io/ Microsoft Senior Software Engineer Business owners, your data just became incredibly powerful—and potentially danger…
…
continue reading
1
72. Why Your Cybersecurity Training is Making You LESS Safe - with Craig Taylor
43:48
43:48
Play later
Play later
Lists
Like
Liked
43:48Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Bryan Lachapelle - https://www.b4networks.ca/ Guest: Craig Taylor - http://cyberhoot.com/ Your cybersecurity awareness training might be sabotaging your business. Recent studies show traditional "gotcha" phishing tests actually increase clicks and creat…
…
continue reading
1
71. HIPAA Violations: From $141 to $2.1 Million Per Record Exposed - with Milan Rogers
1:06:18
1:06:18
Play later
Play later
Lists
Like
Liked
1:06:18Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Bryan Lachapelle - https://www.b4networks.ca/ Guest: Milan Rogers - Complete Healthcare Business Consulting -https://chcbconsulting.com/ Healthcare practices face the highest cybersecurity costs of any industry - averaging $10.93 million per breach. In …
…
continue reading
1
Technology Innovations in Media and Entertainment
1:20:38
1:20:38
Play later
Play later
Lists
Like
Liked
1:20:38In this episode of the CDW Canada Tech Talks podcast, host KJ Burke engages with CDW experts Joe D'Amato, Kris Kostiuk and Kevin Ellsworth to explore the evolving technology landscape of media and entertainment. They discuss the unique challenges faced by the industry, including project-based workflows, cybersecurity threats and the impact of AI on…
…
continue reading
1
70. Unlicensed and Dangerous: The IT Industry Secret That's Putting Your Business at Risk - with Robert Cioffi
49:05
49:05
Play later
Play later
Lists
Like
Liked
49:05Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Bryan Lachapelle - https://www.b4networks.ca/ Guest: Robert Cioffi - https://www.progressivecomputing.com/ The IT industry has a dirty secret: anyone can hang a shingle and call themselves a cybersecurity expert. No license required. No proven competenc…
…
continue reading
1
69. Windows 7, Zero Backups, and $24K Down the Drain: A Cybersecurity Horror Story
30:42
30:42
Play later
Play later
Lists
Like
Liked
30:42Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Bryan Lachapelle - https://www.b4networks.ca/ A real cybersecurity horror story unfolds as Justin reveals his most shocking discovery ever: a 34-computer business paying $2,000 monthly for IT services while receiving literally nothing in return. Windows 7 machines, zero backups, no antiviru…
…
continue reading
By CDW Canada
…
continue reading
1
68. The ADA Website Lawsuit Trap That's Bankrupting Small Businesses
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Small businesses making under $500K are the #1 target for ADA website compliance lawsuits - and most business owners have never heard of this threat. In this eye-opening episode, Justin and Mario break down the "digital ambulance chasing" epidemic that'…
…
continue reading
1
67. The $10 Million Cybersecurity Mistake That Could Destroy Your Business Tomorrow
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Nevada's state government has been crippled by ransomware for nearly a month with most systems still down - and it's a wake-up call every business owner needs to hear. In this eye-opening episode, Justin and Mario dissect what makes some organizations r…
…
continue reading
By CDW Canada
…
continue reading
1
66. Turn Hackers Into Your Security Team - with Grant McCracken
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Bryan Lachapelle - https://www.b4networks.ca/ Guest: Grant McCracken - https://darkhorse.sh What if the best way to secure your business was to invite hackers to attack it? In this eye-opening episode, ethical hacker Grant McCracken reveals how bug boun…
…
continue reading
1
65. 80 Clients, 2,500 Computers, 100% Encrypted: A Survival Story Every CEO Needs to Hear - with Robert Cioffi
1:01:08
1:01:08
Play later
Play later
Lists
Like
Liked
1:01:08Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Guest: Robert Cioffi - https://www.patreon.com/CyberRISE and https://cyberrise.org/ In July 2021, Robert Cioffi's MSP business was completely destroyed in 90 minutes. 80 clients, 200 locations, 2,500 endpoints - 100% encrypted by ransomware through a ze…
…
continue reading
1
64. The Hidden Threat: How Vendor Breaches Can Destroy Your Business - with Jolie Grace Wareham
50:55
50:55
Play later
Play later
Lists
Like
Liked
50:55Hosts: Justin Shelley - https://unhackmybusiness.com Bryan Lachapelle - https://www.b4networks.ca/ Guest: Jolie Grace Wareham, CEO of Protosec - https://protasec.com/ Your vendors could be your biggest cybersecurity weakness. In this eye-opening episode, cybersecurity advisor Jolie Grace Wareham shares a real case where a small business lost a sign…
…
continue reading
1
63. Everything Is a Data Problem: How AI Is Creating New Business Risks - with Jocelyn Houle
49:49
49:49
Play later
Play later
Lists
Like
Liked
49:49Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Bryan Lachapelle - https://www.b4networks.ca/ Guest: Jocelyn Houle - https://www.jocelynhoule.com/ Small businesses are racing to adopt AI, but most are unknowingly creating massive security vulnerabilities. In this episode, veteran AI expert Jocelyn Houle reveals why "everything is a data …
…
continue reading
1
Sustainability in Technology: A New Era
1:00:21
1:00:21
Play later
Play later
Lists
Like
Liked
1:00:21By CDW Canada
…
continue reading
1
62. How Elderly Scams Could Destroy Your Business and Family Wealth - with Jocelyn King
47:57
47:57
Play later
Play later
Lists
Like
Liked
47:57Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ | Mario Zaki - https://www.mazteck.com/ Guest: Jocelyn King, "Queen of Online Safety" - https://www.smarteronlinesafety.com/ In this eye-opening episode, cybersecurity expert Jocelyn King shares her harrowing personal story of being targeted by cybercriminals for years, losing over $500,000…
…
continue reading
1
61. When Six Figures Nearly Vanished: A Real-World Guide to Protecting Your Business from Wire Fraud The Reality Check Every Business Owner Needs
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32By Phoenix IT Advisors
…
continue reading
1
60. The Brutal Truth Your Cybersecurity Is Probably Worthless - with Adriel Desautels
44:42
44:42
Play later
Play later
Lists
Like
Liked
44:42By Phoenix IT Advisors
…
continue reading
1
59. Your Factory Is Wide Open: How to Lock Down Connected Machines Before It’s Too Late with Tory Bjorklundy
58:57
58:57
Play later
Play later
Lists
Like
Liked
58:57Your Factory Is Wide Open: How to Lock Down Connected Machines Before It’s Too Late Legacy machines were never designed to be connected—or protected. But in modern manufacturing, connectivity is a must. So how do you protect your business when the shop floor is now on the network? In this episode, Justin talks with Tory Bjorklund, manufacturing con…
…
continue reading
1
58. The AI Advantage: How Small Businesses Can Compete (and Win) Like the Big Guys with Brad Groux
48:20
48:20
Play later
Play later
Lists
Like
Liked
48:20This week on UnHacked, we’re talking with Brad Groux (cybersecurity engineer, tech founder, and co-host of The Digital Meld podcast) about how AI is quietly shaping how we build, manage, and lead our businesses. From SMBs to the enterprise, Brad has worked with it all. In this episode, we break down: Why we’re already outsourcing leadership decisio…
…
continue reading
1
Exploring BTEX 2025: Insights and Innovations
58:21
58:21
Play later
Play later
Lists
Like
Liked
58:21By CDW Canada
…
continue reading
1
57. The Password Trap: What It’s Costing Your Business (And How to Escape) with Raul Cepeda
38:23
38:23
Play later
Play later
Lists
Like
Liked
38:23Password fatigue isn’t just annoying—it’s expensive and dangerous. In this episode of UnHacked, Raul Cepeda Jr. from rf IDEAS breaks down the hidden costs of password dependence and shows small businesses a better way forward. From clinicians wasting hours re-logging into systems to the real risk of password-related breaches, Raul makes the case fo…
…
continue reading
1
56. Unlocked Remote Access: How One Mistake Brought a Manufacturer to a Halt with Brett Galant
59:45
59:45
Play later
Play later
Lists
Like
Liked
59:45In this episode of UnHacked, cybersecurity strategist Brett Gallant walks us through a real-world disaster—a manufacturing plant brought to its knees by an unsecured remote access tool. We break down what went wrong, how it could’ve been prevented, and why business leaders must stop assuming their IT support has cybersecurity covered. If you’re a m…
…
continue reading
1
55. From Breached to Bulletproof: How Smart Businesses Stay Ahead of Cyber Threats with Michael Ritsema
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20What would happen if your entire business was encrypted overnight? No files. No access. No plan. In this episode of UnHacked, we sit down with Michael Ritsema—cybersecurity strategist and President of i3 Business Solutions—who’s helped multiple companies survive full-scale breaches. Together with co-hosts Bryan Lachapelle and Mario Zake, we unpack …
…
continue reading
1
54. The Receipts Are Fake, The Photos Are Lies: A Small Business Owner's Survival Guide with Mounir Ibrahim
46:27
46:27
Play later
Play later
Lists
Like
Liked
46:27Three small business owners are about to discover why their $150 inspection costs are bankrupting them—and how one diplomat's experience in Syrian war zones revealed the game-changing solution. In this eye-opening episode, cybersecurity experts Justin, Bryan, and Mario sit down with Mounir Ibrahim, former US diplomat and Chief Communications Office…
…
continue reading
1
53. The One Thing That’s Tanking Your Business Value (And How to Fix It) with James DuBos
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10Are your cybersecurity gaps quietly devaluing your business? In this episode, entrepreneur and advisor Jim DuBos shares the top reasons buyers walk away—and how small business owners can protect their company’s value before it’s too late. Learn the 3 essential controls every buyer looks for, how to build a culture of security, and why cybersecurity…
…
continue reading
1
52. Deepfakes Are Coming for Your Business: Here’s How to Fight Back with Ilke Demir
52:11
52:11
Play later
Play later
Lists
Like
Liked
52:11In this episode, hosts Justin Shelley and Mario Zaki welcome Dr. Ilkay Damir, a deep fake detection expert who developed FakeCatcher at Intel. Dr. Damir explains how deepfakes threaten businesses through financial scams, political misinformation, and reputation damage. She discusses her groundbreaking technology that detects fake videos by analyzin…
…
continue reading
1
Bonus Episode: Cybersecurity Challenges Faced by Canadian Organizations
1:09:30
1:09:30
Play later
Play later
Lists
Like
Liked
1:09:30By CDW Canada
…
continue reading
1
51. Behind the Likes: What Small Business Owners Must Know About Social Media Fraud
59:00
59:00
Play later
Play later
Lists
Like
Liked
59:00In this episode of UnHacked, hosts Justin Shelley and Mario Zake are joined by Tim O'Hearn, author and former software engineer, to explore the darker side of social media engagement strategies. Tim shares insights from his personal journey of creating social media bots and discusses the implications of fake activity on platforms like Instagram. Th…
…
continue reading
1
50. Security Is a Team Sport: Turning Employees from Liabilities to Cyber Defenders
45:33
45:33
Play later
Play later
Lists
Like
Liked
45:33This episode focuses on the critical role people play in cybersecurity. The hosts discuss how most breaches (95-97%) involve human error, emphasizing that while technology defenses are important, humans remain the weakest link. They explore how hackers exploit human psychology through social engineering and why creating a positive security culture …
…
continue reading
1
49. Mac or PC? Mario and Damien Duke it out in This Epic Battle of Who Is More Secure
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Today we bring in a guest who consults with solopreneurs who run their businesses on Macs. This question is debated all the time: Is Mac really more secure than Windows? Well, today we heat things up on UnHacked as we battle it out. Where is Windows more vulnerable? Where is Mac more vulnerable? What threats are the same (PC vs Mac) I don't know th…
…
continue reading
1
48. I Hate the Cybersecurity Industry with Dave Sobel of The Business of Tech Podcast
51:31
51:31
Play later
Play later
Lists
Like
Liked
51:31Dave Sobel is the host of The Business of Tech, a podcast that delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering ‘Why Do We Care? Dave shocked me when he said, "I hate the cybersecurity industry!" So I said, "Let's discuss!" The bottom line is this: we as a society can and …
…
continue reading
1
47. Architects of Defense with Lori Crooks
50:02
50:02
Play later
Play later
Lists
Like
Liked
50:02Lori Crooks is the Founder and CEO of Cadra, Inc. The organization focuses on security assessments and security management projects. With a career focused on information security assessments, developing policies and standards, and advising clients regarding their information security requirements, Lori brings a deep understanding of information sec…
…
continue reading
1
46. Cybersecurity Meets Financial Planning with Eric Brotman
44:42
44:42
Play later
Play later
Lists
Like
Liked
44:42Eric D. Brotman, CFP®, is the CEO of BFG Financial Advisors, President of Brotman Consulting Group, LLC, host of the Don’t Retire… Graduate! podcast, and author of the award-winning book, Don’t Retire… Graduate! Use code "unhacked" for a 25% discount on Eric's book: https://dontretiregraduatebook.com/ In our pre-interview meeting, Eric said: “Very …
…
continue reading
1
45. How to Protect Your Business When Using 3rd Party Integrations
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16We make a lot of assumptions in the world of tech and cybersecurity. The most common one I see is assuming that a vendor is properly protecting your data. And honestly, that feels like the only option since we can't really see behind the curtains. But what if I told you there is a way to verify that your vendors have the proper cybersecurity safegu…
…
continue reading
1
44. How Will Tariffs Impact Cybersecurity Risks?
35:00
35:00
Play later
Play later
Lists
Like
Liked
35:00How will tariffs impact cybersecurity? As costs rise, we will be forced to make difficult decisions. Many will choose not to upgrade old technology which gives the bad guys a huge advantage. Here's what to do about it.By Phoenix IT Advisors
…
continue reading
Last week we talked about how AI can improve processes and output. Today, we’re going to talk more about the security side of AI.By Phoenix IT Advisors
…
continue reading
1
42. Th-AI Took Our Jobs! with Chase Friedman
47:06
47:06
Play later
Play later
Lists
Like
Liked
47:06Like all things in tech, AI is a tool that can be used for good or bad. Today we talk with Chase Friedman, managing partner of Alpine Anchor, about leveraging AI to improve processes, outputs, and profitability.By Phoenix IT Advisors
…
continue reading
1
41. High-Stakes Divorces and Cybersecurity - with Jonathan Steele
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42This week we talk with Jonathan Steele, a prominent high-stakes divorce attorney who doubles as a cybersecurity expert. At Steele Fortress, Jonathan leverages his unique blend of legal and cybersecurity expertise to provide comprehensive cybersecurity and privacy consulting services. His deep understanding of both the legal and technical aspects of…
…
continue reading
1
40. Ransomware Attacks QUADRUPLED in 2024 - and what to do about it
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26Compared to 2023, ransomware attacks increased 4x in 2024. Why? Because it's EASY! With RaaS (Ransomware as a Service), anyone can be a successful bad guy. On average, it only takes someone 74 minutes to pull off a cyberheist. No skills required. This is the problem. Take a listen to learn the solution.…
…
continue reading
1
39. Forget the Russians - The ATTORNEYS are Coming!
41:35
41:35
Play later
Play later
Lists
Like
Liked
41:35It's bad enough that cyber-thugs are coming for our businesses. And our bank accounts. But there's a new threat that is gaining traction: class-action lawsuits. But there's good news! A Plan of Action with Milestones (POAM for short) is your get-out-of-jail-free card. Listen up... and we'll break it down!…
…
continue reading
1
38. Compliance First - Protecting Your Empire with Tim Golden of Compliance Scorecard
1:00:27
1:00:27
Play later
Play later
Lists
Like
Liked
1:00:27Tim Golden of Compliance Scorecard joins us to discuss the meaning and importance of measuring against an official security frameworkBy Phoenix IT Advisors
…
continue reading
By Martin Bazinet, Joseph Reele
…
continue reading
1
37. Why We Are Losing the Cyberwar - The Root Cause and New Solution with Christian Espinosa
59:52
59:52
Play later
Play later
Lists
Like
Liked
59:52As business owners and execs, we are responsible for EVERYTHING! While cybersecurity may not be your native language, it is critical to learn enough to make informed decisions. UnHacked is a great place to start! Today we talk with Christian Espinosa about the cybersecurity basics, as well as his 7 Step Secure Methodology.…
…
continue reading
1
36. Breaking Down a Doctor's Rant with Evgeniy Kharam
56:18
56:18
Play later
Play later
Lists
Like
Liked
56:18In today’s episode, we talk about a disgruntled doctor, his real/understandable problems, and [perhaps] a bigger problem with mindset; and as always, wrap it up with the formula to protect your business from Boris Grishenko.By Phoenix IT Advisors
…
continue reading
1
How Women Are Reshaping the Tech Landscape
1:10:51
1:10:51
Play later
Play later
Lists
Like
Liked
1:10:51By Sandi Jones
…
continue reading
1
How to Empower Your Organization with AI Tools
1:04:46
1:04:46
Play later
Play later
Lists
Like
Liked
1:04:46By CDW Canada
…
continue reading
1
35. 6 Signs Your IT Company is Leaving You Exposed
45:24
45:24
Play later
Play later
Lists
Like
Liked
45:24How do you REALLY know that your IT company has you properly protected? How do you know you are getting what you pay for? This is one decision where you cannot afford to be wrong.By Phoenix IT Advisors
…
continue reading
1
How to Get the Most out of the Technology You Purchase
57:32
57:32
Play later
Play later
Lists
Like
Liked
57:32By Adam Diallo, Amanda Franck
…
continue reading