show episodes
 
Artwork

1
ALS Focus on Food

ALS Focus on Food

Unsubscribe
Unsubscribe
Monthly
 
Owning or managing a successful food business is a complex process - ensuring that food is safe at all times and that the business is complying with all the relevant regulations is no easy task. At Focus on Food, our mission is to provide accessible and cost effective advice, training and guidance to food business owners and managers. No complex technical jargon. No hidden or excessive fees. Through our website, online training courses and this podcast, we take complex technical information ...
  continue reading
 
Artwork

201
West Cork

yarn fm

Unsubscribe
Unsubscribe
Monthly
 
In West Cork, it’s simply known as ‘the murder’. In 1996 French film producer Sophie Toscan du Plantier is found dead near her holiday home. There are no witnesses and no known motive. The police suspect one man in this community but they can’t make a charge stick and he refuses to leave, living under the glare of suspicion ever since. This series brings together an incredible cast of characters, many of whom have never spoken publicly before. The family of the victim bring to life a woman l ...
  continue reading
 
Artwork

1
KnowTechTalk

Barb Paluszkiewicz

Unsubscribe
Unsubscribe
Monthly
 
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
  continue reading
 
Loading …
show series
 
A ransomware attack occurs every 14 seconds. Cyber attacks occur once every 39 seconds. The average ransomware attack costs a company $170,000! Does your business need cyber insurance? Is cyber insurance really worth the investment? What is a cyber warranty? Barb speaks with Nick Wolf, part of Cork’s Leadership Team about Cyber Warranties. 0:00 – B…
  continue reading
 
AI – It's everywhere nowadays, reshaping our reality in ways we’ve only begun to explore. Barb goes in depth with Jimmy Hatzell – the intrepid co-founder and CEO of Hatz AI – exploring his vision and expertise to see how AI can empower, enhance and encourage transformation for MSPs and their clients. 0:00 – Barb's Introduction 0:46 – Who is Jimmy H…
  continue reading
 
Our guest, Michael Contento, is a seasoned expert who has journeyed through the whole life cycle of an MSP. We hear about Michael's story and gain invaluable insights on the MSP landscape in Canada, the dynamics of mergers, what to look for in an acquisition, and the hurdles owner-operated MSPs face. Whether you're a budding MSP looking to scale or…
  continue reading
 
Small businesses require a simple plan to protect themselves from cyber crime. Cyber attacks are unexpected, and these attacks seem to be on the increase. The good news is the majority of cyber crimes can be prevented, and a network assessment performed by an MSP is pivotal to improving security within an organization. Matthew K. Koenig from Nodewa…
  continue reading
 
In this grand symphony of small business IT, every instrument, every section plays its part. But as we know, in any great performance, a single note change can influence the whole piece. This raises a crucial question: How does a business keep track of all the subtle changes in each section? Shawn Sailer from Liongard joins Barb to explain how tool…
  continue reading
 
In today's fast-paced business environment, technology has become an integral part of almost every aspect of operations. From communications, marketing to supply chain management and Cyber Security, ALL businesses rely heavily on technology. Journalists behind industry publications, conferences, social media and research reports provide a deep unde…
  continue reading
 
Consider this: 99% of the world doesn’t speak geek, nor do they understand cybersecurity and how to protect their digital assets. For the 1% of people who are familiar with terms like Privilege Escalation, Lateral movement and Seim, you might want to continue listening to understand how to communicate effectively to the rest of the world. Joining B…
  continue reading
 
Does your business need cyber insurance? Truth is, cyber criminals are targeting smaller organizations because the smaller your business, the less prepared it is to guard itself against a cyber attack. Cyber insurance policies and riders have grown popular over the last decade as cybercriminals have become more cunning. Because of this, cyber insur…
  continue reading
 
If you are thinking about selling your IT company chances are you have come full circle. The majority of MSPs are tech turned owner operators that grew a respectable businesses and now are done and want out. They can now take that long overdue vacation, treat themselves to something nice, pay back that line of credit and finally have some REAL mone…
  continue reading
 
What is Malware? Do you constantly get hammered by pop-up ads that come from nowhere and infuriate you when using your computer? Does your computer run slow, act funny, or crash unexpectedly? Are you getting tons of spam from unknown senders? Did your internet browser suddenly change? If so, then your computer might be infected with malicious progr…
  continue reading
 
When was the last time you thought about the security and the health of your computer network? I know you are so darn busy running your business that you simply forget, until something major happens. Consider this a friendly reminder to get your network checked out – if nothing else, it’s a good way to get a third party review of your network’s sec…
  continue reading
 
Let me ask you a controversial question: When was the last time you took inventory of all the computers and devices in your organization? What is being backed up? Have you checked it? If you don’t know what hardware you own, or what software subscriptions you are paying for then you might be overpaying or getting underserved. Think of this. If you …
  continue reading
 
Did you know you are not supposed to use your mobile phone while it’s charging? When you use your phone while it’s charging, you are using more power than its being fed, and this screws up the battery. Did you also know that charging your phone overnight hurts the phone battery life? According to lifeside.com it is recommended that you charge your …
  continue reading
 
How do you decide who to hire when you reach the point in your business when you realize – I need help with the IT? IT companies can look all the same, but who can you trust to partner with? It’s no secret that everyone preaches prevention, customer service. So how do you make sure you are comparing apples to apples instead of oranges to grapefruit…
  continue reading
 
Businesses are spending more money on IT this year. Gartner predicts the global IT spend could reach $4.4 trillion this year and that’s despite rising inflation, the Russian invasion, chip shortages and talent shortages. Since we’re all leveraging technology as a competitive advantage, and looking to technology to solve our problems today, we’re go…
  continue reading
 
What should you expect to pay for IT support for your business? How do you make sure you know exactly what you are paying for? What are all the services you are buying to keep your business cyber safe? The computer industry is still young, and there are not many guides in place to protect consumers. How do you determine if the fees that are billed …
  continue reading
 
Our world has shifted online and it’s important that all of us make cybersecurity a priority. Let’s protect ourselves, our communities and our collective future. Remember: Human beings, devices, and applications all have identities. In your business, it is important to identify who your employees are, what account access they have and understanding…
  continue reading
 
Have you ever locked yourself out of your own system because you can't remember your own password? How do you know you are actually talking to someone from your tech support department? Forced password resets can be a catch 22 because changing your password all the time creates problems and so does not ever changing your password. Announcing Jimmy …
  continue reading
 
Recording of our free Nutrition and Health Claims webinar, which was broadcast live on Friday 19th June 2020 at 10.00 AEST. This introductory webinar focused on the basics of making compliant Nutrition and Health claims and will be helpful for food business owners/managers, food business marketing departments, those seeking to set up or market a ho…
  continue reading
 
Congratulations! if you haven’t had to deal with a cyber attack, or if you were compromised the consequences weren’t significant. It seems like every day has a new cyber attack. The new computer virus’ that are out there are much like all the new “covid variants.” They’re polymorphic which means they have the ability to change their code to evade d…
  continue reading
 
This is a recording of the webinar presented live on Friday 8th May 2020. It will provide you with the technical knowledge and background to understand when and what to test for in regard to possible food allergens in your products. With a focus on actionable information, we cover the basics of food allergens, before moving on to testing: which tes…
  continue reading
 
Joining Barb Paluszkiewicz‏ for this episode of #KNOWTECHTALK talk are Paul Nebb of Titan Technologies, Henry Overton of Turn Key Solutions, Al Alper of Absolute Logic and Tim Meredith of Tech Eagles, to discuss how you can choose the right IT company to support your business. Listen to this podcast and you'll discover: 0:00- 2:32 - Intro 02:33-10:…
  continue reading
 
This episode features a recording of the 5th webinar in the Focus on Food series. In this webinar, Nick Cork CMgr FIML (National Food Consultant, ALS) takes you through an overview of food shelf life testing, including how to set up a shelf life verification trial for your product and how to determine whether you need to apply a best before or use …
  continue reading
 
Listen To This Podcast and You'll Discover: The 3 most common ways IT services companies charge for their services and the pros and cons of each approach A common billing model that puts ALL THE RISK on you, the customer when buying IT services; you'll learn what it is and why you need to avoid agreeing to it Exclusions, hidden fees and other "Gotc…
  continue reading
 
This is a recording of the 4th Focus on Food webinar held on Friday 18th October 2019. This webinar focused on how to plan and write a compliant Environmental Monitoring plan, including what to test for and specifications. Visit www.focus-on-food.com to subscribe to all of the information available from Focus on Food, including video recordings of …
  continue reading
 
If you want to prevent your personal or business identity from being stolen by a cybercriminal, have a listen to what Namik Muduroglu from Human ID shares. You will discover: 1:55 - What is classified as Personal Identifiable Information 2:11 - What is not classified as Personal Identifiable Information & Anonymous 3:00 - Who is Namik Muduroglu & H…
  continue reading
 
Loading …

Quick Reference Guide