<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/unhacked" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>UnHacked - Cybersecurity Made Simple for Small Businesses</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/unhacked</itunes:new-feed-url>
    <description>When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked!

UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best practices that give the highest ROI.</description>
    <copyright>© 2026 Phoenix IT Advisors</copyright>
    <podcast:guid>1f0861ed-db20-53bd-bb4f-4af7b818af08</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
    <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
    <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
    <language>en</language>
    <pubDate>Fri, 08 May 2026 15:41:19 -0500</pubDate>
    <lastBuildDate>Fri, 08 May 2026 15:42:05 -0500</lastBuildDate>
    <link>https://unhacked.live</link>
    <image>
      <url>https://img.transistorcdn.com/b0vbWnmovVfxNWF2quvg4salJbArKdUTtzQTnpABwuo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MGQ5/MzlkNDhmODUyY2E0/NjQwY2ZjMDBjNzA5/NzZiMi5wbmc.jpg</url>
      <title>UnHacked - Cybersecurity Made Simple for Small Businesses</title>
      <link>https://unhacked.live</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Business">
      <itunes:category text="Entrepreneurship"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Phoenix IT Advisors</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/b0vbWnmovVfxNWF2quvg4salJbArKdUTtzQTnpABwuo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MGQ5/MzlkNDhmODUyY2E0/NjQwY2ZjMDBjNzA5/NzZiMi5wbmc.jpg"/>
    <itunes:summary>When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked!

UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best practices that give the highest ROI.</itunes:summary>
    <itunes:subtitle>When Russian hackers break into your business’s computers, what will they find and how much will it cost you.</itunes:subtitle>
    <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
    <itunes:owner>
      <itunes:name>Justin Shelley</itunes:name>
      <itunes:email>justin@phoenixitadvisors.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>Yes</itunes:explicit>
    <item>
      <title>86. Your Business Has No Plan for When It Gets Hacked — Here's How to Fix That</title>
      <itunes:title>86. Your Business Has No Plan for When It Gets Hacked — Here's How to Fix That</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b0aedaa1-0d5f-4f35-bdc5-738d83a4cae0</guid>
      <link>https://unhacked.live/86</link>
      <description>
        <![CDATA[<p><strong>Hosts:<br>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Most businesses don't have a plan for when they get hacked. Not <em>if</em> — <em>when</em>. In Episode 86 of UnHacked, Justin, Mario, and Bryan dig into one of the least glamorous — but most critically important — topics in cybersecurity: policies, procedures, and incident response planning.</p><p>Here's the hard truth they unpack: your firewall won't save you if your people don't know what to do. The gap between a breach and a catastrophe is almost always human behavior — and that's exactly what policies and incident response plans are designed to address.</p><p>In this episode, you'll learn:</p><p>The top 3 policies every business needs right now (including one you've almost certainly overlooked)</p><ul><li>Why most policies fail — and the three elements every good policy must have</li><li>How to build a genuine security culture, not just a signed employee handbook nobody reads</li><li>What an incident response plan actually covers (hint: it's not just an IT problem)</li><li>The single most important document a business owner can create to protect themselves legally and operationally</li></ul><p>PLUS — a major announcement: the UnHacked team is launching a <strong>free portal</strong> to help business owners score their cybersecurity posture, build an action plan, and hold their IT providers accountable.</p><p>Want to know how secure your business really is? Get a free cybersecurity risk assessment at <strong>phoenixitadvisors.com</strong> — mention UnHacked.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:<br>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Most businesses don't have a plan for when they get hacked. Not <em>if</em> — <em>when</em>. In Episode 86 of UnHacked, Justin, Mario, and Bryan dig into one of the least glamorous — but most critically important — topics in cybersecurity: policies, procedures, and incident response planning.</p><p>Here's the hard truth they unpack: your firewall won't save you if your people don't know what to do. The gap between a breach and a catastrophe is almost always human behavior — and that's exactly what policies and incident response plans are designed to address.</p><p>In this episode, you'll learn:</p><p>The top 3 policies every business needs right now (including one you've almost certainly overlooked)</p><ul><li>Why most policies fail — and the three elements every good policy must have</li><li>How to build a genuine security culture, not just a signed employee handbook nobody reads</li><li>What an incident response plan actually covers (hint: it's not just an IT problem)</li><li>The single most important document a business owner can create to protect themselves legally and operationally</li></ul><p>PLUS — a major announcement: the UnHacked team is launching a <strong>free portal</strong> to help business owners score their cybersecurity posture, build an action plan, and hold their IT providers accountable.</p><p>Want to know how secure your business really is? Get a free cybersecurity risk assessment at <strong>phoenixitadvisors.com</strong> — mention UnHacked.</p>]]>
      </content:encoded>
      <pubDate>Fri, 08 May 2026 15:41:19 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/d123b042/f7bdd7b7.mp3" length="38331814" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2394</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:<br>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Most businesses don't have a plan for when they get hacked. Not <em>if</em> — <em>when</em>. In Episode 86 of UnHacked, Justin, Mario, and Bryan dig into one of the least glamorous — but most critically important — topics in cybersecurity: policies, procedures, and incident response planning.</p><p>Here's the hard truth they unpack: your firewall won't save you if your people don't know what to do. The gap between a breach and a catastrophe is almost always human behavior — and that's exactly what policies and incident response plans are designed to address.</p><p>In this episode, you'll learn:</p><p>The top 3 policies every business needs right now (including one you've almost certainly overlooked)</p><ul><li>Why most policies fail — and the three elements every good policy must have</li><li>How to build a genuine security culture, not just a signed employee handbook nobody reads</li><li>What an incident response plan actually covers (hint: it's not just an IT problem)</li><li>The single most important document a business owner can create to protect themselves legally and operationally</li></ul><p>PLUS — a major announcement: the UnHacked team is launching a <strong>free portal</strong> to help business owners score their cybersecurity posture, build an action plan, and hold their IT providers accountable.</p><p>Want to know how secure your business really is? Get a free cybersecurity risk assessment at <strong>phoenixitadvisors.com</strong> — mention UnHacked.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/d123b042/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>85. They're Already Inside: How Hackers Live in Your Business Undetected for Months</title>
      <itunes:title>85. They're Already Inside: How Hackers Live in Your Business Undetected for Months</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e0b04a05-7e40-4815-b68a-71e18ca39acd</guid>
      <link>https://unhacked.live/85</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong><br><strong>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>What if someone was already living in your business — watching everything, stealing data, using your resources — and you had absolutely no idea?</p><p>In Episode 85 of UnHacked, Justin, Bryan, and Mario tackle one of the most overlooked gaps in cybersecurity: <strong>logging, monitoring, and detection</strong>. Most businesses (and even most IT providers) invest heavily in <em>preventing</em> attacks — but almost no one has a plan for <em>detecting</em> them once they're already in.<br>And they will get in.<br>The hosts share real-world stories of attackers living undetected inside business networks for months — creating hidden admin accounts, mining cryptocurrency, exfiltrating data, and worse — all while the business owner had no idea. They break down what a Security Operations Center (SOC) actually does, why "mean time to detection" could be the most important metric you've never heard of, and why this is one cybersecurity layer you absolutely cannot DIY.</p><p><strong>Key takeaways:</strong></p><ul><li>Ask your IT provider: <em>"What are we doing for detection and response?"</em> — and be prepared for the answer.</li><li>Once you know you're unprotected, you're legally and ethically obligated to act.</li><li>Monitoring without expert review is just noise — you need the right people watching.</li></ul><p>🔒 <em>Think your business is protected? Find out for free at</em> <strong>unhackmybusiness.com<br></strong><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong><br><strong>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>What if someone was already living in your business — watching everything, stealing data, using your resources — and you had absolutely no idea?</p><p>In Episode 85 of UnHacked, Justin, Bryan, and Mario tackle one of the most overlooked gaps in cybersecurity: <strong>logging, monitoring, and detection</strong>. Most businesses (and even most IT providers) invest heavily in <em>preventing</em> attacks — but almost no one has a plan for <em>detecting</em> them once they're already in.<br>And they will get in.<br>The hosts share real-world stories of attackers living undetected inside business networks for months — creating hidden admin accounts, mining cryptocurrency, exfiltrating data, and worse — all while the business owner had no idea. They break down what a Security Operations Center (SOC) actually does, why "mean time to detection" could be the most important metric you've never heard of, and why this is one cybersecurity layer you absolutely cannot DIY.</p><p><strong>Key takeaways:</strong></p><ul><li>Ask your IT provider: <em>"What are we doing for detection and response?"</em> — and be prepared for the answer.</li><li>Once you know you're unprotected, you're legally and ethically obligated to act.</li><li>Monitoring without expert review is just noise — you need the right people watching.</li></ul><p>🔒 <em>Think your business is protected? Find out for free at</em> <strong>unhackmybusiness.com<br></strong><br></p>]]>
      </content:encoded>
      <pubDate>Mon, 04 May 2026 06:30:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/24fc4d0c/54bd2cee.mp3" length="42802648" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2673</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong><br><strong>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>What if someone was already living in your business — watching everything, stealing data, using your resources — and you had absolutely no idea?</p><p>In Episode 85 of UnHacked, Justin, Bryan, and Mario tackle one of the most overlooked gaps in cybersecurity: <strong>logging, monitoring, and detection</strong>. Most businesses (and even most IT providers) invest heavily in <em>preventing</em> attacks — but almost no one has a plan for <em>detecting</em> them once they're already in.<br>And they will get in.<br>The hosts share real-world stories of attackers living undetected inside business networks for months — creating hidden admin accounts, mining cryptocurrency, exfiltrating data, and worse — all while the business owner had no idea. They break down what a Security Operations Center (SOC) actually does, why "mean time to detection" could be the most important metric you've never heard of, and why this is one cybersecurity layer you absolutely cannot DIY.</p><p><strong>Key takeaways:</strong></p><ul><li>Ask your IT provider: <em>"What are we doing for detection and response?"</em> — and be prepared for the answer.</li><li>Once you know you're unprotected, you're legally and ethically obligated to act.</li><li>Monitoring without expert review is just noise — you need the right people watching.</li></ul><p>🔒 <em>Think your business is protected? Find out for free at</em> <strong>unhackmybusiness.com<br></strong><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/24fc4d0c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>84. The Vendor You Trust Most Could Be Your Biggest Security Risk</title>
      <itunes:title>84. The Vendor You Trust Most Could Be Your Biggest Security Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">73f96e3c-e1df-4bba-ae72-d56677df9b8d</guid>
      <link>https://unhacked.live/84</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong><br> <strong>Justin Shelley</strong> — Phoenix IT Advisors: <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> <strong>Mario Zak</strong>i — Mazteck IT: <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>Do you know exactly which vendors have access to your business systems, your data, or your network? If the honest answer is "not really" — this episode is for you.</p><p>In Episode 84 of <strong>UnHacked</strong>, Justin Shelley and Mario Zaki tackle one of the most overlooked threats in cybersecurity: <strong>vendor risk and third-party access</strong>. This is the 10th installment in their deep-dive mini-series on cybersecurity fundamentals, and it may be the most eye-opening yet.</p><p>The guys share a real-world story of an MSP who was breached through his own remote management software — encrypting not just his systems, but <em>every single one of his clients' systems</em> — and what his one-word lesson was when it was all over.</p><p>You'll learn:</p><ul><li>Why your least secure vendor is your biggest security liability</li><li>How to find remote access software lurking on your network (and what to do with it)</li><li>The simple first step every business owner can take <em>today</em> — no IT degree required</li><li>What questions to ask your MSP to make sure <em>they</em> aren't your weakest link</li><li>How AI can help you sort through thousands of installed applications in minutes</li></ul><p>Whether you're in construction, healthcare, finance, or any industry where you rely on vendors and subcontractors, this episode will change how you think about who you're letting in the door.</p><p>📌 Resources and episode links: <strong>unhackmybusiness.com</strong><br>🔒 Get your free cybersecurity risk assessment: <strong>phoenixitadvisors.com<br></strong><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong><br> <strong>Justin Shelley</strong> — Phoenix IT Advisors: <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> <strong>Mario Zak</strong>i — Mazteck IT: <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>Do you know exactly which vendors have access to your business systems, your data, or your network? If the honest answer is "not really" — this episode is for you.</p><p>In Episode 84 of <strong>UnHacked</strong>, Justin Shelley and Mario Zaki tackle one of the most overlooked threats in cybersecurity: <strong>vendor risk and third-party access</strong>. This is the 10th installment in their deep-dive mini-series on cybersecurity fundamentals, and it may be the most eye-opening yet.</p><p>The guys share a real-world story of an MSP who was breached through his own remote management software — encrypting not just his systems, but <em>every single one of his clients' systems</em> — and what his one-word lesson was when it was all over.</p><p>You'll learn:</p><ul><li>Why your least secure vendor is your biggest security liability</li><li>How to find remote access software lurking on your network (and what to do with it)</li><li>The simple first step every business owner can take <em>today</em> — no IT degree required</li><li>What questions to ask your MSP to make sure <em>they</em> aren't your weakest link</li><li>How AI can help you sort through thousands of installed applications in minutes</li></ul><p>Whether you're in construction, healthcare, finance, or any industry where you rely on vendors and subcontractors, this episode will change how you think about who you're letting in the door.</p><p>📌 Resources and episode links: <strong>unhackmybusiness.com</strong><br>🔒 Get your free cybersecurity risk assessment: <strong>phoenixitadvisors.com<br></strong><br></p>]]>
      </content:encoded>
      <pubDate>Thu, 23 Apr 2026 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/161ee475/a130b8c0.mp3" length="30477432" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1903</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong><br> <strong>Justin Shelley</strong> — Phoenix IT Advisors: <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> <strong>Mario Zak</strong>i — Mazteck IT: <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>Do you know exactly which vendors have access to your business systems, your data, or your network? If the honest answer is "not really" — this episode is for you.</p><p>In Episode 84 of <strong>UnHacked</strong>, Justin Shelley and Mario Zaki tackle one of the most overlooked threats in cybersecurity: <strong>vendor risk and third-party access</strong>. This is the 10th installment in their deep-dive mini-series on cybersecurity fundamentals, and it may be the most eye-opening yet.</p><p>The guys share a real-world story of an MSP who was breached through his own remote management software — encrypting not just his systems, but <em>every single one of his clients' systems</em> — and what his one-word lesson was when it was all over.</p><p>You'll learn:</p><ul><li>Why your least secure vendor is your biggest security liability</li><li>How to find remote access software lurking on your network (and what to do with it)</li><li>The simple first step every business owner can take <em>today</em> — no IT degree required</li><li>What questions to ask your MSP to make sure <em>they</em> aren't your weakest link</li><li>How AI can help you sort through thousands of installed applications in minutes</li></ul><p>Whether you're in construction, healthcare, finance, or any industry where you rely on vendors and subcontractors, this episode will change how you think about who you're letting in the door.</p><p>📌 Resources and episode links: <strong>unhackmybusiness.com</strong><br>🔒 Get your free cybersecurity risk assessment: <strong>phoenixitadvisors.com<br></strong><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
    </item>
    <item>
      <title>83. Your Business Is in the Cloud — But Is It Actually Secure? </title>
      <itunes:title>83. Your Business Is in the Cloud — But Is It Actually Secure? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cd317ef3-8d6b-478b-b60e-6721b445b349</guid>
      <link>https://unhacked.live/83</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong></p><p>Justin Shelley — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>You moved your business to the cloud to simplify things. But what if that move actually <em>increased</em> your risk — and you didn't even know it?</p><p>In Episode 83 of <strong>UnHacked</strong>, Justin, Mario, and Bryan pull back the curtain on cloud and SaaS security — the ninth installment in their 12-part Cybersecurity Basics series. This episode tackles one of the most dangerous misconceptions in modern business: that "moving to the cloud" means you're secure, saving money, or simplifying your operations. Spoiler — it often does none of those things without the right setup.</p><p><strong>In this episode, you'll learn:</strong></p><ul><li>Why the cloud doesn't automatically secure or simplify your business</li><li>The hidden risks of shared links, shadow IT, and expired user accounts</li><li>Why single sign-on (SSO) is a double-edged sword — and how to protect it</li><li>How former employees may <em>still</em> have access to your systems right now</li><li>What admin account separation really means and why your IT person might be doing it wrong</li><li>What a proper, proactive cloud security setup actually looks like</li></ul><p>Whether you're already in the cloud or thinking about making the move, this episode will change how you think about who has access to your business — and what happens when you don't know the answer.</p><p>🔐 <strong>Not sure how secure your cloud setup really is?</strong> Get a free cybersecurity risk assessment at <a href="https://www.phoenixitadvisors.com/">PhoenixITAdvisors.com</a><br> and mention <em>UnHacked</em>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong></p><p>Justin Shelley — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>You moved your business to the cloud to simplify things. But what if that move actually <em>increased</em> your risk — and you didn't even know it?</p><p>In Episode 83 of <strong>UnHacked</strong>, Justin, Mario, and Bryan pull back the curtain on cloud and SaaS security — the ninth installment in their 12-part Cybersecurity Basics series. This episode tackles one of the most dangerous misconceptions in modern business: that "moving to the cloud" means you're secure, saving money, or simplifying your operations. Spoiler — it often does none of those things without the right setup.</p><p><strong>In this episode, you'll learn:</strong></p><ul><li>Why the cloud doesn't automatically secure or simplify your business</li><li>The hidden risks of shared links, shadow IT, and expired user accounts</li><li>Why single sign-on (SSO) is a double-edged sword — and how to protect it</li><li>How former employees may <em>still</em> have access to your systems right now</li><li>What admin account separation really means and why your IT person might be doing it wrong</li><li>What a proper, proactive cloud security setup actually looks like</li></ul><p>Whether you're already in the cloud or thinking about making the move, this episode will change how you think about who has access to your business — and what happens when you don't know the answer.</p><p>🔐 <strong>Not sure how secure your cloud setup really is?</strong> Get a free cybersecurity risk assessment at <a href="https://www.phoenixitadvisors.com/">PhoenixITAdvisors.com</a><br> and mention <em>UnHacked</em>.</p>]]>
      </content:encoded>
      <pubDate>Mon, 20 Apr 2026 18:16:36 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/daa8c9c2/860bba1a.mp3" length="40230154" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2513</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong></p><p>Justin Shelley — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>You moved your business to the cloud to simplify things. But what if that move actually <em>increased</em> your risk — and you didn't even know it?</p><p>In Episode 83 of <strong>UnHacked</strong>, Justin, Mario, and Bryan pull back the curtain on cloud and SaaS security — the ninth installment in their 12-part Cybersecurity Basics series. This episode tackles one of the most dangerous misconceptions in modern business: that "moving to the cloud" means you're secure, saving money, or simplifying your operations. Spoiler — it often does none of those things without the right setup.</p><p><strong>In this episode, you'll learn:</strong></p><ul><li>Why the cloud doesn't automatically secure or simplify your business</li><li>The hidden risks of shared links, shadow IT, and expired user accounts</li><li>Why single sign-on (SSO) is a double-edged sword — and how to protect it</li><li>How former employees may <em>still</em> have access to your systems right now</li><li>What admin account separation really means and why your IT person might be doing it wrong</li><li>What a proper, proactive cloud security setup actually looks like</li></ul><p>Whether you're already in the cloud or thinking about making the move, this episode will change how you think about who has access to your business — and what happens when you don't know the answer.</p><p>🔐 <strong>Not sure how secure your cloud setup really is?</strong> Get a free cybersecurity risk assessment at <a href="https://www.phoenixitadvisors.com/">PhoenixITAdvisors.com</a><br> and mention <em>UnHacked</em>.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/daa8c9c2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>82. Your IT Company Is Probably Not Patching Your Systems — Here's How to Catch Them</title>
      <itunes:title>82. Your IT Company Is Probably Not Patching Your Systems — Here's How to Catch Them</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9d864f07-393b-45a6-afb6-a522c1e4f45d</guid>
      <link>https://unhacked.live/82</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong><br><strong>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a></p><p><em>Note: Co-hosts Mario Zaki and Bryan Lachapelle are absent this episode — they're representing their firms at a trade show in Dallas.<br></em><br></p><p>Did you know there are <strong>130+ new cybersecurity vulnerabilities discovered every single day?</strong> That's nearly 50,000 last year alone — and the number is growing exponentially, fueled in part by AI-powered attacks. In this solo episode, Justin Shelley breaks down one of the most overlooked and mismanaged areas of cybersecurity for small and mid-sized businesses: <strong>patch and vulnerability management.<br></strong><br></p><p>Most business owners assume their IT company is handling it. Most of the time, they're wrong.</p><p>In this episode, Justin covers:</p><ul><li><strong>What patching actually is</strong> — and why it's far more complex than "set it and forget it"</li><li><strong>The CVE list</strong> — the publicly available database of known vulnerabilities and why it should terrify you</li><li><strong>Zero-day vulnerabilities</strong> — what they are and why they're especially dangerous</li><li><strong>The reactive spiral of death</strong> — the real reason your IT company may be dropping the ball (and it's not because they don't care)</li><li><strong>The reboot problem</strong> — why something as simple as restarting a computer is one of the biggest obstacles to keeping your business secure</li><li><strong>Legacy systems and blind spots</strong> — Windows 10, old software, browsers, firewalls, and all the things that aren't getting patched even when you think they are</li><li><strong>Two specific questions</strong> you should be asking your IT company right now — and what to do if they can't answer them</li></ul><p>Justin also shares a personal story about a client breach caused by an outdated version of Microsoft Office — one that nearly destroyed that business and ended a client relationship — to illustrate just how real and costly this problem is.</p><p>This is episode 8 of the <strong>Cybersecurity Basics series</strong>. If you haven't already, go back and listen to the previous episodes on frameworks, identity and access management, endpoint security, backups, email phishing, and network security.</p><p>🎯 <strong>Free Resource:</strong> Want to know if your business is actually protected? Visit <a href="https://www.unhackmybusiness.com/"><strong>unhackmybusiness.com</strong></a><br> for show notes, the full video recording, and to schedule your <strong>free cybersecurity risk assessment</strong> with Phoenix IT Advisors — no matter where you're located.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong><br><strong>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a></p><p><em>Note: Co-hosts Mario Zaki and Bryan Lachapelle are absent this episode — they're representing their firms at a trade show in Dallas.<br></em><br></p><p>Did you know there are <strong>130+ new cybersecurity vulnerabilities discovered every single day?</strong> That's nearly 50,000 last year alone — and the number is growing exponentially, fueled in part by AI-powered attacks. In this solo episode, Justin Shelley breaks down one of the most overlooked and mismanaged areas of cybersecurity for small and mid-sized businesses: <strong>patch and vulnerability management.<br></strong><br></p><p>Most business owners assume their IT company is handling it. Most of the time, they're wrong.</p><p>In this episode, Justin covers:</p><ul><li><strong>What patching actually is</strong> — and why it's far more complex than "set it and forget it"</li><li><strong>The CVE list</strong> — the publicly available database of known vulnerabilities and why it should terrify you</li><li><strong>Zero-day vulnerabilities</strong> — what they are and why they're especially dangerous</li><li><strong>The reactive spiral of death</strong> — the real reason your IT company may be dropping the ball (and it's not because they don't care)</li><li><strong>The reboot problem</strong> — why something as simple as restarting a computer is one of the biggest obstacles to keeping your business secure</li><li><strong>Legacy systems and blind spots</strong> — Windows 10, old software, browsers, firewalls, and all the things that aren't getting patched even when you think they are</li><li><strong>Two specific questions</strong> you should be asking your IT company right now — and what to do if they can't answer them</li></ul><p>Justin also shares a personal story about a client breach caused by an outdated version of Microsoft Office — one that nearly destroyed that business and ended a client relationship — to illustrate just how real and costly this problem is.</p><p>This is episode 8 of the <strong>Cybersecurity Basics series</strong>. If you haven't already, go back and listen to the previous episodes on frameworks, identity and access management, endpoint security, backups, email phishing, and network security.</p><p>🎯 <strong>Free Resource:</strong> Want to know if your business is actually protected? Visit <a href="https://www.unhackmybusiness.com/"><strong>unhackmybusiness.com</strong></a><br> for show notes, the full video recording, and to schedule your <strong>free cybersecurity risk assessment</strong> with Phoenix IT Advisors — no matter where you're located.</p>]]>
      </content:encoded>
      <pubDate>Thu, 09 Apr 2026 18:08:28 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/302814b5/0346bdb5.mp3" length="41027771" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1708</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong><br><strong>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a></p><p><em>Note: Co-hosts Mario Zaki and Bryan Lachapelle are absent this episode — they're representing their firms at a trade show in Dallas.<br></em><br></p><p>Did you know there are <strong>130+ new cybersecurity vulnerabilities discovered every single day?</strong> That's nearly 50,000 last year alone — and the number is growing exponentially, fueled in part by AI-powered attacks. In this solo episode, Justin Shelley breaks down one of the most overlooked and mismanaged areas of cybersecurity for small and mid-sized businesses: <strong>patch and vulnerability management.<br></strong><br></p><p>Most business owners assume their IT company is handling it. Most of the time, they're wrong.</p><p>In this episode, Justin covers:</p><ul><li><strong>What patching actually is</strong> — and why it's far more complex than "set it and forget it"</li><li><strong>The CVE list</strong> — the publicly available database of known vulnerabilities and why it should terrify you</li><li><strong>Zero-day vulnerabilities</strong> — what they are and why they're especially dangerous</li><li><strong>The reactive spiral of death</strong> — the real reason your IT company may be dropping the ball (and it's not because they don't care)</li><li><strong>The reboot problem</strong> — why something as simple as restarting a computer is one of the biggest obstacles to keeping your business secure</li><li><strong>Legacy systems and blind spots</strong> — Windows 10, old software, browsers, firewalls, and all the things that aren't getting patched even when you think they are</li><li><strong>Two specific questions</strong> you should be asking your IT company right now — and what to do if they can't answer them</li></ul><p>Justin also shares a personal story about a client breach caused by an outdated version of Microsoft Office — one that nearly destroyed that business and ended a client relationship — to illustrate just how real and costly this problem is.</p><p>This is episode 8 of the <strong>Cybersecurity Basics series</strong>. If you haven't already, go back and listen to the previous episodes on frameworks, identity and access management, endpoint security, backups, email phishing, and network security.</p><p>🎯 <strong>Free Resource:</strong> Want to know if your business is actually protected? Visit <a href="https://www.unhackmybusiness.com/"><strong>unhackmybusiness.com</strong></a><br> for show notes, the full video recording, and to schedule your <strong>free cybersecurity risk assessment</strong> with Phoenix IT Advisors — no matter where you're located.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/302814b5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>81. The Digital Wild West: How the Death of the Network Perimeter Is Leaving Your Business Wide Open</title>
      <itunes:title>81. The Digital Wild West: How the Death of the Network Perimeter Is Leaving Your Business Wide Open</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4965510a-4343-4293-a777-914cd4c591c2</guid>
      <link>https://unhacked.live/81</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong><br><strong>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Your firewall is not enough anymore — and your IT team may not be telling you that.</p><p>In Episode 81 of UnHacked, Justin and Bryan dig into one of the most misunderstood concepts in cybersecurity: the network perimeter. It used to be simple. Put a firewall on the edge of your network, install antivirus, done. But that world is gone. Today, your data lives in Microsoft 365, SharePoint, Dropbox, cloud apps your HR manager signed up for last Tuesday, your employee's home network, the guest Wi-Fi at your office, and the IoT thermostat down the hall. The "perimeter" is everywhere — which means it has to be protected everywhere.</p><p>In this episode, you'll learn:</p><ul><li>Why the traditional firewall is still necessary — but nowhere near sufficient</li><li>How cloud platforms like Microsoft 365 require their own security layer (and what that actually looks like)</li><li>The hidden danger of VPN tunnels drilled through your firewall during the remote work era</li><li>Why your guest Wi-Fi might not actually be a guest network</li><li>What shadow IT is and why an employee could be walking out the door with your entire company's data right now — legally, and invisibly</li><li>The single most important first step to securing any business: knowing what you actually have</li></ul><p>Plus, Justin shares the one question every business owner should ask their IT person — and warns that most of the time, the answer they get back will tell them everything they need to know about how exposed they really are.</p><p>This is Episode 7 in the UnHacked Cybersecurity Basics mini-series.</p><p>🔐 <strong>Want to know how secure your business really is?</strong> Visit <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> and mention UnHacked to schedule a free cybersecurity risk assessment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong><br><strong>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Your firewall is not enough anymore — and your IT team may not be telling you that.</p><p>In Episode 81 of UnHacked, Justin and Bryan dig into one of the most misunderstood concepts in cybersecurity: the network perimeter. It used to be simple. Put a firewall on the edge of your network, install antivirus, done. But that world is gone. Today, your data lives in Microsoft 365, SharePoint, Dropbox, cloud apps your HR manager signed up for last Tuesday, your employee's home network, the guest Wi-Fi at your office, and the IoT thermostat down the hall. The "perimeter" is everywhere — which means it has to be protected everywhere.</p><p>In this episode, you'll learn:</p><ul><li>Why the traditional firewall is still necessary — but nowhere near sufficient</li><li>How cloud platforms like Microsoft 365 require their own security layer (and what that actually looks like)</li><li>The hidden danger of VPN tunnels drilled through your firewall during the remote work era</li><li>Why your guest Wi-Fi might not actually be a guest network</li><li>What shadow IT is and why an employee could be walking out the door with your entire company's data right now — legally, and invisibly</li><li>The single most important first step to securing any business: knowing what you actually have</li></ul><p>Plus, Justin shares the one question every business owner should ask their IT person — and warns that most of the time, the answer they get back will tell them everything they need to know about how exposed they really are.</p><p>This is Episode 7 in the UnHacked Cybersecurity Basics mini-series.</p><p>🔐 <strong>Want to know how secure your business really is?</strong> Visit <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> and mention UnHacked to schedule a free cybersecurity risk assessment.</p>]]>
      </content:encoded>
      <pubDate>Fri, 03 Apr 2026 05:35:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/9c7dde8b/11867a51.mp3" length="41731126" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1737</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong><br><strong>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Your firewall is not enough anymore — and your IT team may not be telling you that.</p><p>In Episode 81 of UnHacked, Justin and Bryan dig into one of the most misunderstood concepts in cybersecurity: the network perimeter. It used to be simple. Put a firewall on the edge of your network, install antivirus, done. But that world is gone. Today, your data lives in Microsoft 365, SharePoint, Dropbox, cloud apps your HR manager signed up for last Tuesday, your employee's home network, the guest Wi-Fi at your office, and the IoT thermostat down the hall. The "perimeter" is everywhere — which means it has to be protected everywhere.</p><p>In this episode, you'll learn:</p><ul><li>Why the traditional firewall is still necessary — but nowhere near sufficient</li><li>How cloud platforms like Microsoft 365 require their own security layer (and what that actually looks like)</li><li>The hidden danger of VPN tunnels drilled through your firewall during the remote work era</li><li>Why your guest Wi-Fi might not actually be a guest network</li><li>What shadow IT is and why an employee could be walking out the door with your entire company's data right now — legally, and invisibly</li><li>The single most important first step to securing any business: knowing what you actually have</li></ul><p>Plus, Justin shares the one question every business owner should ask their IT person — and warns that most of the time, the answer they get back will tell them everything they need to know about how exposed they really are.</p><p>This is Episode 7 in the UnHacked Cybersecurity Basics mini-series.</p><p>🔐 <strong>Want to know how secure your business really is?</strong> Visit <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> and mention UnHacked to schedule a free cybersecurity risk assessment.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/9c7dde8b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>80. Your Employees Are the Vulnerability: The Truth About Email Scams, Phishing, and the Human Risk You're Ignoring</title>
      <itunes:title>80. Your Employees Are the Vulnerability: The Truth About Email Scams, Phishing, and the Human Risk You're Ignoring</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c3f032f9-f230-414a-9a01-b62e2cecfce5</guid>
      <link>https://unhacked.live/80</link>
      <description>
        <![CDATA[<p><strong>Hosts:<br>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>What does it take to lose $50,000 in a single email? Not much. A spoofed address. A busy CFO. A wire transfer that clears before anyone realizes what happened.</p><p>In Episode 80 of UnHacked, Justin Shelley, Mario Zaki, and Bryan Lachapelle dig deep into one of the most financially devastating threats facing businesses today: Business Email Compromise (BEC). This is Episode 6 of their ongoing 12-part series on Security Basics, and this one hits close to home for every business owner who relies on email to run their company — which is all of them.</p><p>The guys break down exactly how BEC attacks work in two primary forms: lookalike domains designed to trick you letter by letter, and fully compromised email inboxes where a hacker is literally sitting inside your vendor's or employee's account, reading everything and waiting for the right moment to strike. Using AI, attackers can now download entire mailboxes, study communication patterns, and pick up mid-conversation with chilling accuracy.</p><p>But the scariest part of this episode isn't the technology — it's the human element. From new employees targeted on LinkedIn within days of posting about their new job, to companies that actively silenced their own IT teams who flagged security gaps (and paid dearly for it), the hosts make a compelling case that people — not software — are both the biggest vulnerability and the most powerful defense a company has.</p><p>You'll learn:</p><ul><li>The two types of Business Email Compromise and why one is nearly impossible to stop with technology alone</li><li>The one phone call that could have saved a $50,000 wire transfer — and why most companies don't make it</li><li>Why punishing employees who report mistakes is one of the most dangerous things a company can do</li><li>How attackers use LinkedIn to target new hires and exploit their eagerness to impress leadership</li><li>What "zero trust" really means in the context of email — and how to build it into your team's daily behavior</li><li>How to report lookalike domains and get them taken down</li><li>Why a culture of security awareness is more valuable than any software tool you can buy</li></ul><p>This episode is a wake-up call. Email is not safe by default. Your vendors can be compromised. Your new hires are being targeted. And if you don't have written policies and a culture that rewards vigilance, no firewall in the world will save you.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:<br>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>What does it take to lose $50,000 in a single email? Not much. A spoofed address. A busy CFO. A wire transfer that clears before anyone realizes what happened.</p><p>In Episode 80 of UnHacked, Justin Shelley, Mario Zaki, and Bryan Lachapelle dig deep into one of the most financially devastating threats facing businesses today: Business Email Compromise (BEC). This is Episode 6 of their ongoing 12-part series on Security Basics, and this one hits close to home for every business owner who relies on email to run their company — which is all of them.</p><p>The guys break down exactly how BEC attacks work in two primary forms: lookalike domains designed to trick you letter by letter, and fully compromised email inboxes where a hacker is literally sitting inside your vendor's or employee's account, reading everything and waiting for the right moment to strike. Using AI, attackers can now download entire mailboxes, study communication patterns, and pick up mid-conversation with chilling accuracy.</p><p>But the scariest part of this episode isn't the technology — it's the human element. From new employees targeted on LinkedIn within days of posting about their new job, to companies that actively silenced their own IT teams who flagged security gaps (and paid dearly for it), the hosts make a compelling case that people — not software — are both the biggest vulnerability and the most powerful defense a company has.</p><p>You'll learn:</p><ul><li>The two types of Business Email Compromise and why one is nearly impossible to stop with technology alone</li><li>The one phone call that could have saved a $50,000 wire transfer — and why most companies don't make it</li><li>Why punishing employees who report mistakes is one of the most dangerous things a company can do</li><li>How attackers use LinkedIn to target new hires and exploit their eagerness to impress leadership</li><li>What "zero trust" really means in the context of email — and how to build it into your team's daily behavior</li><li>How to report lookalike domains and get them taken down</li><li>Why a culture of security awareness is more valuable than any software tool you can buy</li></ul><p>This episode is a wake-up call. Email is not safe by default. Your vendors can be compromised. Your new hires are being targeted. And if you don't have written policies and a culture that rewards vigilance, no firewall in the world will save you.</p>]]>
      </content:encoded>
      <pubDate>Fri, 13 Mar 2026 05:30:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/34b923c8/3afbb0bb.mp3" length="60059686" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2501</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:<br>Justin Shelley</strong> — Phoenix IT Advisors | <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br><strong>Mario Zaki</strong> — Mazteck IT | <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br><strong>Bryan Lachapelle</strong> — B4 Networks | <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>What does it take to lose $50,000 in a single email? Not much. A spoofed address. A busy CFO. A wire transfer that clears before anyone realizes what happened.</p><p>In Episode 80 of UnHacked, Justin Shelley, Mario Zaki, and Bryan Lachapelle dig deep into one of the most financially devastating threats facing businesses today: Business Email Compromise (BEC). This is Episode 6 of their ongoing 12-part series on Security Basics, and this one hits close to home for every business owner who relies on email to run their company — which is all of them.</p><p>The guys break down exactly how BEC attacks work in two primary forms: lookalike domains designed to trick you letter by letter, and fully compromised email inboxes where a hacker is literally sitting inside your vendor's or employee's account, reading everything and waiting for the right moment to strike. Using AI, attackers can now download entire mailboxes, study communication patterns, and pick up mid-conversation with chilling accuracy.</p><p>But the scariest part of this episode isn't the technology — it's the human element. From new employees targeted on LinkedIn within days of posting about their new job, to companies that actively silenced their own IT teams who flagged security gaps (and paid dearly for it), the hosts make a compelling case that people — not software — are both the biggest vulnerability and the most powerful defense a company has.</p><p>You'll learn:</p><ul><li>The two types of Business Email Compromise and why one is nearly impossible to stop with technology alone</li><li>The one phone call that could have saved a $50,000 wire transfer — and why most companies don't make it</li><li>Why punishing employees who report mistakes is one of the most dangerous things a company can do</li><li>How attackers use LinkedIn to target new hires and exploit their eagerness to impress leadership</li><li>What "zero trust" really means in the context of email — and how to build it into your team's daily behavior</li><li>How to report lookalike domains and get them taken down</li><li>Why a culture of security awareness is more valuable than any software tool you can buy</li></ul><p>This episode is a wake-up call. Email is not safe by default. Your vendors can be compromised. Your new hires are being targeted. And if you don't have written policies and a culture that rewards vigilance, no firewall in the world will save you.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/34b923c8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>79. Your Backup Strategy Is Probably Broken (And It Will Cost You)</title>
      <itunes:title>79. Your Backup Strategy Is Probably Broken (And It Will Cost You)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">df8fffc8-1957-457a-a1ef-b64433610cdf</guid>
      <link>https://unhacked.live/79</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Think your business is protected because you're paying for IT services? Think again. In this eye-opening episode, three cybersecurity experts share real horror stories of backup failures that cost businesses everything – from tape backups that never worked to QuickBooks files that vanished when needed most.</p><p>You'll discover why modern backups are more complex than ever (hint: your data isn't just on one server anymore), what immutable storage means for your protection, and the critical difference between having backups and having backups that actually work when disaster strikes.</p><p>The hosts walk you through a practical framework for auditing your current backup strategy, testing it properly, and creating manual processes to keep your business running during recovery. Plus, learn why some businesses can survive ransomware attacks while others are devastated – and which category you're currently in.</p><p>Whether you're relying on "my IT guy handles that" or managing backups yourself, this episode will either confirm you're truly protected or expose dangerous gaps before they cost you your business.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Think your business is protected because you're paying for IT services? Think again. In this eye-opening episode, three cybersecurity experts share real horror stories of backup failures that cost businesses everything – from tape backups that never worked to QuickBooks files that vanished when needed most.</p><p>You'll discover why modern backups are more complex than ever (hint: your data isn't just on one server anymore), what immutable storage means for your protection, and the critical difference between having backups and having backups that actually work when disaster strikes.</p><p>The hosts walk you through a practical framework for auditing your current backup strategy, testing it properly, and creating manual processes to keep your business running during recovery. Plus, learn why some businesses can survive ransomware attacks while others are devastated – and which category you're currently in.</p><p>Whether you're relying on "my IT guy handles that" or managing backups yourself, this episode will either confirm you're truly protected or expose dangerous gaps before they cost you your business.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Mar 2026 05:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/9749fbcc/cfd36232.mp3" length="57924247" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2412</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Think your business is protected because you're paying for IT services? Think again. In this eye-opening episode, three cybersecurity experts share real horror stories of backup failures that cost businesses everything – from tape backups that never worked to QuickBooks files that vanished when needed most.</p><p>You'll discover why modern backups are more complex than ever (hint: your data isn't just on one server anymore), what immutable storage means for your protection, and the critical difference between having backups and having backups that actually work when disaster strikes.</p><p>The hosts walk you through a practical framework for auditing your current backup strategy, testing it properly, and creating manual processes to keep your business running during recovery. Plus, learn why some businesses can survive ransomware attacks while others are devastated – and which category you're currently in.</p><p>Whether you're relying on "my IT guy handles that" or managing backups yourself, this episode will either confirm you're truly protected or expose dangerous gaps before they cost you your business.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/9749fbcc/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>78. The Real Perimeter: Why Every Device in Your Business Is a Target</title>
      <itunes:title>78. The Real Perimeter: Why Every Device in Your Business Is a Target</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">76ae7ed8-9eb4-4d24-ad08-8c004b25bc36</guid>
      <link>https://unhacked.live/78</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>What happens when your laptop gets stolen and you forgot to lock it? In this episode of UnHacked, our hosts dive deep into endpoint security - the real perimeter of your business in today's digital world.</p><p>Justin, Bryan, and Mario explore real-world examples of how endpoints (computers, phones, VPNs, smart devices) are compromised and share practical CEO-level guidance on protecting these critical access points. From VPN vulnerabilities to improperly configured guest networks, learn why 97% of breaches could be prevented with basic security measures.</p><p>Key topics include: the four essential endpoint protection checks every CEO should perform, why "it's in the cloud" doesn't mean you're protected, the importance of detection systems alongside prevention, and how to hold your IT team accountable.</p><p>Whether you're paying for managed IT services or handling security in-house, this episode provides actionable steps to verify your endpoints are truly protected. Don't wait until your business is the next cautionary tale.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>What happens when your laptop gets stolen and you forgot to lock it? In this episode of UnHacked, our hosts dive deep into endpoint security - the real perimeter of your business in today's digital world.</p><p>Justin, Bryan, and Mario explore real-world examples of how endpoints (computers, phones, VPNs, smart devices) are compromised and share practical CEO-level guidance on protecting these critical access points. From VPN vulnerabilities to improperly configured guest networks, learn why 97% of breaches could be prevented with basic security measures.</p><p>Key topics include: the four essential endpoint protection checks every CEO should perform, why "it's in the cloud" doesn't mean you're protected, the importance of detection systems alongside prevention, and how to hold your IT team accountable.</p><p>Whether you're paying for managed IT services or handling security in-house, this episode provides actionable steps to verify your endpoints are truly protected. Don't wait until your business is the next cautionary tale.</p>]]>
      </content:encoded>
      <pubDate>Thu, 26 Feb 2026 16:18:51 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/bde4d74d/0d58a979.mp3" length="69880595" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2910</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>What happens when your laptop gets stolen and you forgot to lock it? In this episode of UnHacked, our hosts dive deep into endpoint security - the real perimeter of your business in today's digital world.</p><p>Justin, Bryan, and Mario explore real-world examples of how endpoints (computers, phones, VPNs, smart devices) are compromised and share practical CEO-level guidance on protecting these critical access points. From VPN vulnerabilities to improperly configured guest networks, learn why 97% of breaches could be prevented with basic security measures.</p><p>Key topics include: the four essential endpoint protection checks every CEO should perform, why "it's in the cloud" doesn't mean you're protected, the importance of detection systems alongside prevention, and how to hold your IT team accountable.</p><p>Whether you're paying for managed IT services or handling security in-house, this episode provides actionable steps to verify your endpoints are truly protected. Don't wait until your business is the next cautionary tale.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/bde4d74d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>77. The Hidden Cyber Threats Lurking in Your Business (That Your IT Guy Doesn't Even Know About)</title>
      <itunes:title>77. The Hidden Cyber Threats Lurking in Your Business (That Your IT Guy Doesn't Even Know About)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">234e5478-580c-4e17-a494-8a189bf08981</guid>
      <link>https://unhacked.live/77</link>
      <description>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>You can't secure what you can't see. In this critical episode of our baseline security series, Justin and Mario expose the dangerous reality of "shadow IT" - the hidden software, devices, and vulnerabilities lurking in your business that could be costing you everything.</p><p>From TeamViewer installations left wide open to former vendors still having backdoor access years later, discover why even the most well-intentioned businesses are sitting ducks for ransomware attacks. Learn the shocking truth about unprotected home computers accessing corporate data, outdated backup software creating attack surfaces, and why "we moved to the cloud" doesn't mean you're safe.</p><p>This episode delivers actionable steps every CEO needs to take THIS WEEK to identify their digital assets and close dangerous security gaps. Don't wait until you're the next headline - your business depends on knowing what you're protecting.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>You can't secure what you can't see. In this critical episode of our baseline security series, Justin and Mario expose the dangerous reality of "shadow IT" - the hidden software, devices, and vulnerabilities lurking in your business that could be costing you everything.</p><p>From TeamViewer installations left wide open to former vendors still having backdoor access years later, discover why even the most well-intentioned businesses are sitting ducks for ransomware attacks. Learn the shocking truth about unprotected home computers accessing corporate data, outdated backup software creating attack surfaces, and why "we moved to the cloud" doesn't mean you're safe.</p><p>This episode delivers actionable steps every CEO needs to take THIS WEEK to identify their digital assets and close dangerous security gaps. Don't wait until you're the next headline - your business depends on knowing what you're protecting.</p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Feb 2026 20:20:29 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/b99e0a5c/87ee1666.mp3" length="67379005" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2806</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>You can't secure what you can't see. In this critical episode of our baseline security series, Justin and Mario expose the dangerous reality of "shadow IT" - the hidden software, devices, and vulnerabilities lurking in your business that could be costing you everything.</p><p>From TeamViewer installations left wide open to former vendors still having backdoor access years later, discover why even the most well-intentioned businesses are sitting ducks for ransomware attacks. Learn the shocking truth about unprotected home computers accessing corporate data, outdated backup software creating attack surfaces, and why "we moved to the cloud" doesn't mean you're safe.</p><p>This episode delivers actionable steps every CEO needs to take THIS WEEK to identify their digital assets and close dangerous security gaps. Don't wait until you're the next headline - your business depends on knowing what you're protecting.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/b99e0a5c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>76. Courts Can Now Use Your ChatGPT History Against You (And Other Identity Nightmares) </title>
      <itunes:title>76. Courts Can Now Use Your ChatGPT History Against You (And Other Identity Nightmares) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3b91df6a-de00-49fa-b27e-8363b3a1f5cd</guid>
      <link>https://unhacked.live/76</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong><br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Episode 76 kicks off a comprehensive multi-part series on baseline cybersecurity with a deep dive into identity and access control. The hosts reveal why courts can now pull your ChatGPT conversations in legal proceedings, and break down the critical difference between passwords and passphrases. Learn why shared accounts are a business owner's worst nightmare, discover the three essential Microsoft 365 security settings most companies miss, and understand why your ego might be your biggest security vulnerability. From conditional access policies to employee onboarding checklists, this episode provides non-technical business owners with actionable steps to protect their greatest asset - their business. The conversation includes real-world horror stories of access control failures and practical solutions for companies of all sizes.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong><br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Episode 76 kicks off a comprehensive multi-part series on baseline cybersecurity with a deep dive into identity and access control. The hosts reveal why courts can now pull your ChatGPT conversations in legal proceedings, and break down the critical difference between passwords and passphrases. Learn why shared accounts are a business owner's worst nightmare, discover the three essential Microsoft 365 security settings most companies miss, and understand why your ego might be your biggest security vulnerability. From conditional access policies to employee onboarding checklists, this episode provides non-technical business owners with actionable steps to protect their greatest asset - their business. The conversation includes real-world horror stories of access control failures and practical solutions for companies of all sizes.</p>]]>
      </content:encoded>
      <pubDate>Thu, 12 Feb 2026 19:44:51 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/cb6ad032/b05de8fe.mp3" length="47695835" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2979</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong><br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>Episode 76 kicks off a comprehensive multi-part series on baseline cybersecurity with a deep dive into identity and access control. The hosts reveal why courts can now pull your ChatGPT conversations in legal proceedings, and break down the critical difference between passwords and passphrases. Learn why shared accounts are a business owner's worst nightmare, discover the three essential Microsoft 365 security settings most companies miss, and understand why your ego might be your biggest security vulnerability. From conditional access policies to employee onboarding checklists, this episode provides non-technical business owners with actionable steps to protect their greatest asset - their business. The conversation includes real-world horror stories of access control failures and practical solutions for companies of all sizes.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/cb6ad032/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/cb6ad032/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>75. Governance, Frameworks &amp; Compliance: Your Business Survival Guide </title>
      <itunes:title>75. Governance, Frameworks &amp; Compliance: Your Business Survival Guide </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a6118990-25a1-4d7b-845b-8e35e5a1df87</guid>
      <link>https://unhacked.live/75</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong></p><p>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>In this episode, Justin and Mario dive deep into why "I didn't know" isn't a legal defense when your business gets hit with a cyber attack. Using a realistic scenario of a 60-employee manufacturing company facing $180,000 in losses from ransomware, they explore how delayed IT decisions can devastate businesses overnight.</p><p>The hosts kick off a comprehensive mini-series on cybersecurity governance, frameworks, and compliance, breaking down complex topics for non-technical business owners. Mario shares real-world stories from his MSP practice, including the shocking reality of passwords taped to monitors and the doctor who simply didn't care about security.</p><p>Key topics covered: the true cost of cyber attacks, cybersecurity frameworks (CIS, NIST), multi-factor authentication beyond just Office 365, risk assessment strategies, and why business owners must take ownership of their cybersecurity decisions.</p><p>Whether your industry is regulated or not, this episode provides the foundation every business owner needs to make intelligent security decisions and protect their greatest asset: their business.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong></p><p>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>In this episode, Justin and Mario dive deep into why "I didn't know" isn't a legal defense when your business gets hit with a cyber attack. Using a realistic scenario of a 60-employee manufacturing company facing $180,000 in losses from ransomware, they explore how delayed IT decisions can devastate businesses overnight.</p><p>The hosts kick off a comprehensive mini-series on cybersecurity governance, frameworks, and compliance, breaking down complex topics for non-technical business owners. Mario shares real-world stories from his MSP practice, including the shocking reality of passwords taped to monitors and the doctor who simply didn't care about security.</p><p>Key topics covered: the true cost of cyber attacks, cybersecurity frameworks (CIS, NIST), multi-factor authentication beyond just Office 365, risk assessment strategies, and why business owners must take ownership of their cybersecurity decisions.</p><p>Whether your industry is regulated or not, this episode provides the foundation every business owner needs to make intelligent security decisions and protect their greatest asset: their business.</p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Jan 2026 15:46:58 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/bda8ce25/213c6f01.mp3" length="33285003" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2078</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong></p><p>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>In this episode, Justin and Mario dive deep into why "I didn't know" isn't a legal defense when your business gets hit with a cyber attack. Using a realistic scenario of a 60-employee manufacturing company facing $180,000 in losses from ransomware, they explore how delayed IT decisions can devastate businesses overnight.</p><p>The hosts kick off a comprehensive mini-series on cybersecurity governance, frameworks, and compliance, breaking down complex topics for non-technical business owners. Mario shares real-world stories from his MSP practice, including the shocking reality of passwords taped to monitors and the doctor who simply didn't care about security.</p><p>Key topics covered: the true cost of cyber attacks, cybersecurity frameworks (CIS, NIST), multi-factor authentication beyond just Office 365, risk assessment strategies, and why business owners must take ownership of their cybersecurity decisions.</p><p>Whether your industry is regulated or not, this episode provides the foundation every business owner needs to make intelligent security decisions and protect their greatest asset: their business.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/bda8ce25/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/bda8ce25/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>74. The AI Trap That's Making Business Owners Dangerously Complacent</title>
      <itunes:title>74. The AI Trap That's Making Business Owners Dangerously Complacent</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">26c4c7d0-5da2-4326-9a56-91cdef67160e</guid>
      <link>https://unhacked.live/74</link>
      <description>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>After a two-month hiatus, the UnHacked team returns with hard-earned lessons from 2025 and critical predictions for 2026. When their scheduled guest no-shows, Justin, Mario, and Bryan deliver an unfiltered discussion about the dangerous complacency creeping into business security.</p><p>Mario reveals how AI is making business owners go "on autopilot" with potentially devastating consequences, while Bryan predicts the mainstream adoption of passkeys will revolutionize login security. Justin warns about the hidden security risks as AI democratizes coding and development.</p><p>Key takeaways include the power of consistency over perfection, why AI can't spell "strawberry" correctly but businesses still trust it with critical decisions, and practical steps to avoid becoming the low-hanging fruit for cybercriminals in 2026.</p><p>Perfect for business owners who want to stay ahead of emerging threats while learning from real-world security experiences.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>After a two-month hiatus, the UnHacked team returns with hard-earned lessons from 2025 and critical predictions for 2026. When their scheduled guest no-shows, Justin, Mario, and Bryan deliver an unfiltered discussion about the dangerous complacency creeping into business security.</p><p>Mario reveals how AI is making business owners go "on autopilot" with potentially devastating consequences, while Bryan predicts the mainstream adoption of passkeys will revolutionize login security. Justin warns about the hidden security risks as AI democratizes coding and development.</p><p>Key takeaways include the power of consistency over perfection, why AI can't spell "strawberry" correctly but businesses still trust it with critical decisions, and practical steps to avoid becoming the low-hanging fruit for cybercriminals in 2026.</p><p>Perfect for business owners who want to stay ahead of emerging threats while learning from real-world security experiences.</p>]]>
      </content:encoded>
      <pubDate>Thu, 22 Jan 2026 16:24:31 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/38b0f64f/93535fbc.mp3" length="34008906" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2124</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>After a two-month hiatus, the UnHacked team returns with hard-earned lessons from 2025 and critical predictions for 2026. When their scheduled guest no-shows, Justin, Mario, and Bryan deliver an unfiltered discussion about the dangerous complacency creeping into business security.</p><p>Mario reveals how AI is making business owners go "on autopilot" with potentially devastating consequences, while Bryan predicts the mainstream adoption of passkeys will revolutionize login security. Justin warns about the hidden security risks as AI democratizes coding and development.</p><p>Key takeaways include the power of consistency over perfection, why AI can't spell "strawberry" correctly but businesses still trust it with critical decisions, and practical steps to avoid becoming the low-hanging fruit for cybercriminals in 2026.</p><p>Perfect for business owners who want to stay ahead of emerging threats while learning from real-world security experiences.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/38b0f64f/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/38b0f64f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>73. Microsoft Engineer Reveals: How AI Can Read Your Entire Database (In Plain English) - with Faiz Gouri</title>
      <itunes:title>73. Microsoft Engineer Reveals: How AI Can Read Your Entire Database (In Plain English) - with Faiz Gouri</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b5018317-47c2-4da9-a2c8-31bb0505909e</guid>
      <link>https://unhacked.live/73</link>
      <description>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Faiz Gouri -<a href="https://www.linkedin.com/in/faizgouri/">https://www.linkedin.com/in/faizgouri/</a> <a href="https://modelcontextprotocol.io/">https://modelcontextprotocol.io/</a>  Microsoft Senior Software Engineer</p><p>Business owners, your data just became incredibly powerful—and potentially dangerous. Microsoft engineer Faiz Gouri reveals the Model Context Protocol (MCP), the breakthrough technology that lets AI read and analyze your entire business database in plain English.<br>Imagine asking your computer: "How many customers did we lose last month and why?" or "Which products are trending down and what should we do?" This isn't science fiction—it's happening now.<br>But here's the catch: While MCP can revolutionize how you access business intelligence, it also creates new security vulnerabilities that could expose everything. Faiz breaks down the real risks, the massive opportunities, and what every business owner needs to know before their competitors get there first.</p><p>Key topics: AI data integration, business intelligence automation, cybersecurity implications, and practical implementation strategies.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Faiz Gouri -<a href="https://www.linkedin.com/in/faizgouri/">https://www.linkedin.com/in/faizgouri/</a> <a href="https://modelcontextprotocol.io/">https://modelcontextprotocol.io/</a>  Microsoft Senior Software Engineer</p><p>Business owners, your data just became incredibly powerful—and potentially dangerous. Microsoft engineer Faiz Gouri reveals the Model Context Protocol (MCP), the breakthrough technology that lets AI read and analyze your entire business database in plain English.<br>Imagine asking your computer: "How many customers did we lose last month and why?" or "Which products are trending down and what should we do?" This isn't science fiction—it's happening now.<br>But here's the catch: While MCP can revolutionize how you access business intelligence, it also creates new security vulnerabilities that could expose everything. Faiz breaks down the real risks, the massive opportunities, and what every business owner needs to know before their competitors get there first.</p><p>Key topics: AI data integration, business intelligence automation, cybersecurity implications, and practical implementation strategies.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Nov 2025 06:00:00 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/111b3b85/a4355d32.mp3" length="37618856" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2349</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Faiz Gouri -<a href="https://www.linkedin.com/in/faizgouri/">https://www.linkedin.com/in/faizgouri/</a> <a href="https://modelcontextprotocol.io/">https://modelcontextprotocol.io/</a>  Microsoft Senior Software Engineer</p><p>Business owners, your data just became incredibly powerful—and potentially dangerous. Microsoft engineer Faiz Gouri reveals the Model Context Protocol (MCP), the breakthrough technology that lets AI read and analyze your entire business database in plain English.<br>Imagine asking your computer: "How many customers did we lose last month and why?" or "Which products are trending down and what should we do?" This isn't science fiction—it's happening now.<br>But here's the catch: While MCP can revolutionize how you access business intelligence, it also creates new security vulnerabilities that could expose everything. Faiz breaks down the real risks, the massive opportunities, and what every business owner needs to know before their competitors get there first.</p><p>Key topics: AI data integration, business intelligence automation, cybersecurity implications, and practical implementation strategies.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/111b3b85/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/111b3b85/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>72. Why Your Cybersecurity Training is Making You LESS Safe - with Craig Taylor</title>
      <itunes:title>72. Why Your Cybersecurity Training is Making You LESS Safe - with Craig Taylor</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4d1fb2a4-6675-4138-9aad-b1d9b54e1388</guid>
      <link>https://unhacked.live/72</link>
      <description>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Craig Taylor - <a href="http://cyberhoot.com/">http://cyberhoot.com/</a></p><p>Your cybersecurity awareness training might be sabotaging your business. Recent studies show traditional "gotcha" phishing tests actually increase clicks and create disengaged, apathetic employees. Craig Taylor, CISSP-certified cybersecurity expert with 30 years of experience and co-founder of CyberHoot, reveals why punishment-based security training fails and how positive reinforcement and gamification can transform your first line of defense. Discover why rewarding good behavior works better than shaming mistakes, learn about the psychology behind effective training, and find out how AI is changing the threat landscape. Plus, get actionable steps to build a security-aware culture that actually protects your business.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Craig Taylor - <a href="http://cyberhoot.com/">http://cyberhoot.com/</a></p><p>Your cybersecurity awareness training might be sabotaging your business. Recent studies show traditional "gotcha" phishing tests actually increase clicks and create disengaged, apathetic employees. Craig Taylor, CISSP-certified cybersecurity expert with 30 years of experience and co-founder of CyberHoot, reveals why punishment-based security training fails and how positive reinforcement and gamification can transform your first line of defense. Discover why rewarding good behavior works better than shaming mistakes, learn about the psychology behind effective training, and find out how AI is changing the threat landscape. Plus, get actionable steps to build a security-aware culture that actually protects your business.</p>]]>
      </content:encoded>
      <pubDate>Wed, 19 Nov 2025 16:47:14 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/58f2efa4/9c08bd2e.mp3" length="42070096" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2628</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Craig Taylor - <a href="http://cyberhoot.com/">http://cyberhoot.com/</a></p><p>Your cybersecurity awareness training might be sabotaging your business. Recent studies show traditional "gotcha" phishing tests actually increase clicks and create disengaged, apathetic employees. Craig Taylor, CISSP-certified cybersecurity expert with 30 years of experience and co-founder of CyberHoot, reveals why punishment-based security training fails and how positive reinforcement and gamification can transform your first line of defense. Discover why rewarding good behavior works better than shaming mistakes, learn about the psychology behind effective training, and find out how AI is changing the threat landscape. Plus, get actionable steps to build a security-aware culture that actually protects your business.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/58f2efa4/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/58f2efa4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>71. HIPAA Violations: From $141 to $2.1 Million Per Record Exposed - with Milan Rogers </title>
      <itunes:title>71. HIPAA Violations: From $141 to $2.1 Million Per Record Exposed - with Milan Rogers </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1fe160d8-243e-4927-9b9d-6fbcd6bfd338</guid>
      <link>https://unhacked.live/71</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Milan Rogers - Complete Healthcare Business Consulting -<a href="https://chcbconsulting.com/">https://chcbconsulting.com/</a></p><p>Healthcare practices face the highest cybersecurity costs of any industry - averaging $10.93 million per breach. In this critical episode, healthcare consultant Milan Rogers reveals why medical records sell for $250-$5,000 each on the dark web and shares the devastating real-world impact of the Change Healthcare breach that affected 190+ million patients. Learn about HIPAA's tiered penalty system ($141 to $2.1 million per violation), the three essential security safeguards every practice needs, and why 97% of breaches are preventable with basic measures. Whether you're a healthcare provider or manage any business with sensitive data, this episode could save your company from a catastrophic "game-ending" cyber attack.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Milan Rogers - Complete Healthcare Business Consulting -<a href="https://chcbconsulting.com/">https://chcbconsulting.com/</a></p><p>Healthcare practices face the highest cybersecurity costs of any industry - averaging $10.93 million per breach. In this critical episode, healthcare consultant Milan Rogers reveals why medical records sell for $250-$5,000 each on the dark web and shares the devastating real-world impact of the Change Healthcare breach that affected 190+ million patients. Learn about HIPAA's tiered penalty system ($141 to $2.1 million per violation), the three essential security safeguards every practice needs, and why 97% of breaches are preventable with basic measures. Whether you're a healthcare provider or manage any business with sensitive data, this episode could save your company from a catastrophic "game-ending" cyber attack.</p>]]>
      </content:encoded>
      <pubDate>Thu, 06 Nov 2025 17:43:47 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/68ebeb60/894f0998.mp3" length="63683191" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3978</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Milan Rogers - Complete Healthcare Business Consulting -<a href="https://chcbconsulting.com/">https://chcbconsulting.com/</a></p><p>Healthcare practices face the highest cybersecurity costs of any industry - averaging $10.93 million per breach. In this critical episode, healthcare consultant Milan Rogers reveals why medical records sell for $250-$5,000 each on the dark web and shares the devastating real-world impact of the Change Healthcare breach that affected 190+ million patients. Learn about HIPAA's tiered penalty system ($141 to $2.1 million per violation), the three essential security safeguards every practice needs, and why 97% of breaches are preventable with basic measures. Whether you're a healthcare provider or manage any business with sensitive data, this episode could save your company from a catastrophic "game-ending" cyber attack.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/68ebeb60/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/68ebeb60/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>70. Unlicensed and Dangerous: The IT Industry Secret That's Putting Your Business at Risk - with Robert Cioffi </title>
      <itunes:title>70. Unlicensed and Dangerous: The IT Industry Secret That's Putting Your Business at Risk - with Robert Cioffi </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d7282758-5efe-4d69-8839-dbcaffc57f72</guid>
      <link>https://unhacked.live/70</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Robert Cioffi - <a href="https://www.progressivecomputing.com/">https://www.progressivecomputing.com/</a></p><p>The IT industry has a dirty secret: anyone can hang a shingle and call themselves a cybersecurity expert. No license required. No proven competency. No oversight. In this eye-opening episode, cybersecurity veteran Robert Cioffi returns for his third appearance to expose how this unregulated wild west is putting businesses at catastrophic risk.</p><p><br>Justin shares a real horror story of a company paying $2,000/month for "managed services" while having zero antivirus, no backups, and servers riddled with errors. The hosts break down the three critical areas every business owner must understand: what this means for clients, legitimate service providers, and most importantly - how to protect yourself.</p><p><br>You'll learn the warning signs of incompetent IT providers, why choosing based on price is business suicide, and the specific questions to ask that will separate the professionals from the pretenders. This isn't just about technology - it's about protecting your life's work from preventable disasters.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Robert Cioffi - <a href="https://www.progressivecomputing.com/">https://www.progressivecomputing.com/</a></p><p>The IT industry has a dirty secret: anyone can hang a shingle and call themselves a cybersecurity expert. No license required. No proven competency. No oversight. In this eye-opening episode, cybersecurity veteran Robert Cioffi returns for his third appearance to expose how this unregulated wild west is putting businesses at catastrophic risk.</p><p><br>Justin shares a real horror story of a company paying $2,000/month for "managed services" while having zero antivirus, no backups, and servers riddled with errors. The hosts break down the three critical areas every business owner must understand: what this means for clients, legitimate service providers, and most importantly - how to protect yourself.</p><p><br>You'll learn the warning signs of incompetent IT providers, why choosing based on price is business suicide, and the specific questions to ask that will separate the professionals from the pretenders. This isn't just about technology - it's about protecting your life's work from preventable disasters.</p>]]>
      </content:encoded>
      <pubDate>Fri, 24 Oct 2025 06:30:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/f1e10253/722cfb51.mp3" length="47143316" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2945</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Robert Cioffi - <a href="https://www.progressivecomputing.com/">https://www.progressivecomputing.com/</a></p><p>The IT industry has a dirty secret: anyone can hang a shingle and call themselves a cybersecurity expert. No license required. No proven competency. No oversight. In this eye-opening episode, cybersecurity veteran Robert Cioffi returns for his third appearance to expose how this unregulated wild west is putting businesses at catastrophic risk.</p><p><br>Justin shares a real horror story of a company paying $2,000/month for "managed services" while having zero antivirus, no backups, and servers riddled with errors. The hosts break down the three critical areas every business owner must understand: what this means for clients, legitimate service providers, and most importantly - how to protect yourself.</p><p><br>You'll learn the warning signs of incompetent IT providers, why choosing based on price is business suicide, and the specific questions to ask that will separate the professionals from the pretenders. This isn't just about technology - it's about protecting your life's work from preventable disasters.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/f1e10253/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/f1e10253/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>69. Windows 7, Zero Backups, and $24K Down the Drain: A Cybersecurity Horror Story  </title>
      <itunes:title>69. Windows 7, Zero Backups, and $24K Down the Drain: A Cybersecurity Horror Story  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3da54489-ebde-4dfe-b06a-b673e5eb3315</guid>
      <link>https://unhacked.live/69</link>
      <description>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>A real cybersecurity horror story unfolds as Justin reveals his most shocking discovery ever: a 34-computer business paying $2,000 monthly for IT services while receiving literally nothing in return. Windows 7 machines, zero backups, no antivirus, failing systems, and unlicensed software - all while the business owner believed they were protected.</p><p>In this Halloween special episode, Justin and Bryan share spine-chilling tales from their IT audits and provide a practical checklist every business owner needs to verify they're actually getting what they pay for from their IT provider. Learn the critical questions to ask, red flags to watch for, and why quarterly business reviews aren't optional.</p><p>Key takeaways include framework-based cybersecurity approaches, the importance of documented processes, and why "trust but verify" should be every business owner's motto when it comes to IT services.</p><p>Don't let your business become the next cautionary tale. This episode could save your company from financial devastation.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>A real cybersecurity horror story unfolds as Justin reveals his most shocking discovery ever: a 34-computer business paying $2,000 monthly for IT services while receiving literally nothing in return. Windows 7 machines, zero backups, no antivirus, failing systems, and unlicensed software - all while the business owner believed they were protected.</p><p>In this Halloween special episode, Justin and Bryan share spine-chilling tales from their IT audits and provide a practical checklist every business owner needs to verify they're actually getting what they pay for from their IT provider. Learn the critical questions to ask, red flags to watch for, and why quarterly business reviews aren't optional.</p><p>Key takeaways include framework-based cybersecurity approaches, the importance of documented processes, and why "trust but verify" should be every business owner's motto when it comes to IT services.</p><p>Don't let your business become the next cautionary tale. This episode could save your company from financial devastation.</p>]]>
      </content:encoded>
      <pubDate>Mon, 20 Oct 2025 14:51:40 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/3042cf32/35005551.mp3" length="29502068" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1842</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p>A real cybersecurity horror story unfolds as Justin reveals his most shocking discovery ever: a 34-computer business paying $2,000 monthly for IT services while receiving literally nothing in return. Windows 7 machines, zero backups, no antivirus, failing systems, and unlicensed software - all while the business owner believed they were protected.</p><p>In this Halloween special episode, Justin and Bryan share spine-chilling tales from their IT audits and provide a practical checklist every business owner needs to verify they're actually getting what they pay for from their IT provider. Learn the critical questions to ask, red flags to watch for, and why quarterly business reviews aren't optional.</p><p>Key takeaways include framework-based cybersecurity approaches, the importance of documented processes, and why "trust but verify" should be every business owner's motto when it comes to IT services.</p><p>Don't let your business become the next cautionary tale. This episode could save your company from financial devastation.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/3042cf32/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/3042cf32/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>68. The ADA Website Lawsuit Trap That's Bankrupting Small Businesses  </title>
      <itunes:title>68. The ADA Website Lawsuit Trap That's Bankrupting Small Businesses  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8d47a60d-c2ae-4e02-a052-e8aaf024d506</guid>
      <link>https://unhacked.live/68</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>Small businesses making under $500K are the #1 target for ADA website compliance lawsuits - and most business owners have never heard of this threat. In this eye-opening episode, Justin and Mario break down the "digital ambulance chasing" epidemic that's forcing small businesses into $5K-$20K settlements for website violations they didn't know existed.</p><p>You'll discover why having a website makes you a target, what specific violations trigger lawsuits, and the free tools you can use TODAY to protect your business. The hosts also reveal why these cases almost always settle (even when frivolous) and provide a step-by-step action plan to minimize your risk.</p><p>This isn't about hackers or data breaches - it's about predatory legal tactics targeting the very businesses that can least afford to defend themselves. Don't become the next victim.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>Small businesses making under $500K are the #1 target for ADA website compliance lawsuits - and most business owners have never heard of this threat. In this eye-opening episode, Justin and Mario break down the "digital ambulance chasing" epidemic that's forcing small businesses into $5K-$20K settlements for website violations they didn't know existed.</p><p>You'll discover why having a website makes you a target, what specific violations trigger lawsuits, and the free tools you can use TODAY to protect your business. The hosts also reveal why these cases almost always settle (even when frivolous) and provide a step-by-step action plan to minimize your risk.</p><p>This isn't about hackers or data breaches - it's about predatory legal tactics targeting the very businesses that can least afford to defend themselves. Don't become the next victim.</p>]]>
      </content:encoded>
      <pubDate>Fri, 26 Sep 2025 12:48:53 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/81827b7d/96d74e21.mp3" length="30355527" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1895</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>Small businesses making under $500K are the #1 target for ADA website compliance lawsuits - and most business owners have never heard of this threat. In this eye-opening episode, Justin and Mario break down the "digital ambulance chasing" epidemic that's forcing small businesses into $5K-$20K settlements for website violations they didn't know existed.</p><p>You'll discover why having a website makes you a target, what specific violations trigger lawsuits, and the free tools you can use TODAY to protect your business. The hosts also reveal why these cases almost always settle (even when frivolous) and provide a step-by-step action plan to minimize your risk.</p><p>This isn't about hackers or data breaches - it's about predatory legal tactics targeting the very businesses that can least afford to defend themselves. Don't become the next victim.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/81827b7d/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/81827b7d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>67.  The $10 Million Cybersecurity Mistake That Could Destroy Your Business Tomorrow</title>
      <itunes:title>67.  The $10 Million Cybersecurity Mistake That Could Destroy Your Business Tomorrow</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a0eb4940-f99a-4050-bdc1-d830aa63d0a3</guid>
      <link>https://unhacked.live/67</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong><br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>Nevada's state government has been crippled by ransomware for nearly a month with most systems still down - and it's a wake-up call every business owner needs to hear. In this eye-opening episode, Justin and Mario dissect what makes some organizations recover quickly from cyberattacks while others remain paralyzed for weeks.</p><p>From Marriott's impressive ransomware response to Nevada's ongoing nightmare, discover why being "low hanging fruit" is more dangerous than having a target on your back. Plus: the Windows 10 end-of-life crisis hitting 40% of US computers next month, and why cutting corners on cybersecurity can turn a $500K problem into a $10M lawsuit.</p><p>Key topics: The difference between targeted attacks and opportunistic breaches, why government entities struggle with cyber recovery, Windows 10 end-of-life vulnerabilities, building a security-first culture, and practical steps every business can take today to avoid becoming the next cautionary tale.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong><br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>Nevada's state government has been crippled by ransomware for nearly a month with most systems still down - and it's a wake-up call every business owner needs to hear. In this eye-opening episode, Justin and Mario dissect what makes some organizations recover quickly from cyberattacks while others remain paralyzed for weeks.</p><p>From Marriott's impressive ransomware response to Nevada's ongoing nightmare, discover why being "low hanging fruit" is more dangerous than having a target on your back. Plus: the Windows 10 end-of-life crisis hitting 40% of US computers next month, and why cutting corners on cybersecurity can turn a $500K problem into a $10M lawsuit.</p><p>Key topics: The difference between targeted attacks and opportunistic breaches, why government entities struggle with cyber recovery, Windows 10 end-of-life vulnerabilities, building a security-first culture, and practical steps every business can take today to avoid becoming the next cautionary tale.</p>]]>
      </content:encoded>
      <pubDate>Fri, 19 Sep 2025 13:33:05 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/42b06cab/b347a3b6.mp3" length="43117089" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2693</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong><br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p>Nevada's state government has been crippled by ransomware for nearly a month with most systems still down - and it's a wake-up call every business owner needs to hear. In this eye-opening episode, Justin and Mario dissect what makes some organizations recover quickly from cyberattacks while others remain paralyzed for weeks.</p><p>From Marriott's impressive ransomware response to Nevada's ongoing nightmare, discover why being "low hanging fruit" is more dangerous than having a target on your back. Plus: the Windows 10 end-of-life crisis hitting 40% of US computers next month, and why cutting corners on cybersecurity can turn a $500K problem into a $10M lawsuit.</p><p>Key topics: The difference between targeted attacks and opportunistic breaches, why government entities struggle with cyber recovery, Windows 10 end-of-life vulnerabilities, building a security-first culture, and practical steps every business can take today to avoid becoming the next cautionary tale.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/42b06cab/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/42b06cab/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>66. Turn Hackers Into Your Security Team - with Grant McCracken</title>
      <itunes:title>66. Turn Hackers Into Your Security Team - with Grant McCracken</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c7aa7b55-3766-48f1-bf71-5e061f67a7ad</guid>
      <link>https://unhacked.live/66</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Grant McCracken - <a href="https://darkhorse.sh/">https://darkhorse.sh</a></p><p>What if the best way to secure your business was to invite hackers to attack it? In this eye-opening episode, ethical hacker Grant McCracken reveals how bug bounty programs are revolutionizing cybersecurity for businesses of all sizes. Grant explains how his company Dark Horse Security makes these powerful security tools accessible and affordable for small businesses - starting at absolutely free for the first 25 vulnerability reports.</p><p>Discover why traditional penetration testing only scratches the surface, how a major bank found six-figure worth of vulnerabilities overnight when they expanded their scope, and why the bad guys are already looking for your vulnerabilities whether you're testing for them or not. Grant breaks down complex concepts like attack surfaces, vulnerability disclosure programs, and the NIST Cybersecurity Framework in business owner-friendly terms.</p><p>Key takeaways include identifying if your business needs a bug bounty program, understanding what constitutes an attack surface, and learning how to leverage the crowd-sourced approach to cybersecurity. This episode is essential listening for any business owner serious about proactive security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Grant McCracken - <a href="https://darkhorse.sh/">https://darkhorse.sh</a></p><p>What if the best way to secure your business was to invite hackers to attack it? In this eye-opening episode, ethical hacker Grant McCracken reveals how bug bounty programs are revolutionizing cybersecurity for businesses of all sizes. Grant explains how his company Dark Horse Security makes these powerful security tools accessible and affordable for small businesses - starting at absolutely free for the first 25 vulnerability reports.</p><p>Discover why traditional penetration testing only scratches the surface, how a major bank found six-figure worth of vulnerabilities overnight when they expanded their scope, and why the bad guys are already looking for your vulnerabilities whether you're testing for them or not. Grant breaks down complex concepts like attack surfaces, vulnerability disclosure programs, and the NIST Cybersecurity Framework in business owner-friendly terms.</p><p>Key takeaways include identifying if your business needs a bug bounty program, understanding what constitutes an attack surface, and learning how to leverage the crowd-sourced approach to cybersecurity. This episode is essential listening for any business owner serious about proactive security.</p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Sep 2025 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/b95445dc/f3b71d07.mp3" length="41026436" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2562</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Grant McCracken - <a href="https://darkhorse.sh/">https://darkhorse.sh</a></p><p>What if the best way to secure your business was to invite hackers to attack it? In this eye-opening episode, ethical hacker Grant McCracken reveals how bug bounty programs are revolutionizing cybersecurity for businesses of all sizes. Grant explains how his company Dark Horse Security makes these powerful security tools accessible and affordable for small businesses - starting at absolutely free for the first 25 vulnerability reports.</p><p>Discover why traditional penetration testing only scratches the surface, how a major bank found six-figure worth of vulnerabilities overnight when they expanded their scope, and why the bad guys are already looking for your vulnerabilities whether you're testing for them or not. Grant breaks down complex concepts like attack surfaces, vulnerability disclosure programs, and the NIST Cybersecurity Framework in business owner-friendly terms.</p><p>Key takeaways include identifying if your business needs a bug bounty program, understanding what constitutes an attack surface, and learning how to leverage the crowd-sourced approach to cybersecurity. This episode is essential listening for any business owner serious about proactive security.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/b95445dc/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/b95445dc/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>65. 80 Clients, 2,500 Computers, 100% Encrypted: A Survival Story Every CEO Needs to Hear - with Robert Cioffi</title>
      <itunes:title>65. 80 Clients, 2,500 Computers, 100% Encrypted: A Survival Story Every CEO Needs to Hear - with Robert Cioffi</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">498f2178-432a-4f67-8475-86ea0ae94c5e</guid>
      <link>https://unhacked.live/65</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p><strong>Guest:</strong> Robert Cioffi - <a href="https://www.patreon.com/CyberRISE">https://www.patreon.com/CyberRISE</a> and <a href="https://cyberrise.org/">https://cyberrise.org/</a> </p><p>In July 2021, Robert Cioffi's MSP business was completely destroyed in 90 minutes. 80 clients, 200 locations, 2,500 endpoints - 100% encrypted by ransomware through a zero-day exploit. But this isn't just another breach story. It's the blueprint for what every business owner needs to know about frameworks, community, and the one resource that could save your company when disaster strikes.</p><p>Justin and Mario dive deep with Robert about the human side of cyber attacks, why frameworks like CIS Controls became his lifeline, and how he transformed his nightmare into MSP911.org - a nonprofit that provides emergency response for cyber attacks. If you're a business owner wondering "what would we do if this happened to us?" - this episode contains answers you can't afford to ignore.</p><p>Key topics: Cybersecurity frameworks, incident response, community support, MSP911.org, Cyber Rise nonprofit, prevention vs. response strategies.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p><strong>Guest:</strong> Robert Cioffi - <a href="https://www.patreon.com/CyberRISE">https://www.patreon.com/CyberRISE</a> and <a href="https://cyberrise.org/">https://cyberrise.org/</a> </p><p>In July 2021, Robert Cioffi's MSP business was completely destroyed in 90 minutes. 80 clients, 200 locations, 2,500 endpoints - 100% encrypted by ransomware through a zero-day exploit. But this isn't just another breach story. It's the blueprint for what every business owner needs to know about frameworks, community, and the one resource that could save your company when disaster strikes.</p><p>Justin and Mario dive deep with Robert about the human side of cyber attacks, why frameworks like CIS Controls became his lifeline, and how he transformed his nightmare into MSP911.org - a nonprofit that provides emergency response for cyber attacks. If you're a business owner wondering "what would we do if this happened to us?" - this episode contains answers you can't afford to ignore.</p><p>Key topics: Cybersecurity frameworks, incident response, community support, MSP911.org, Cyber Rise nonprofit, prevention vs. response strategies.</p>]]>
      </content:encoded>
      <pubDate>Tue, 26 Aug 2025 15:22:29 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/cf4e9aa1/ddded950.mp3" length="58722457" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3668</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p><strong>Guest:</strong> Robert Cioffi - <a href="https://www.patreon.com/CyberRISE">https://www.patreon.com/CyberRISE</a> and <a href="https://cyberrise.org/">https://cyberrise.org/</a> </p><p>In July 2021, Robert Cioffi's MSP business was completely destroyed in 90 minutes. 80 clients, 200 locations, 2,500 endpoints - 100% encrypted by ransomware through a zero-day exploit. But this isn't just another breach story. It's the blueprint for what every business owner needs to know about frameworks, community, and the one resource that could save your company when disaster strikes.</p><p>Justin and Mario dive deep with Robert about the human side of cyber attacks, why frameworks like CIS Controls became his lifeline, and how he transformed his nightmare into MSP911.org - a nonprofit that provides emergency response for cyber attacks. If you're a business owner wondering "what would we do if this happened to us?" - this episode contains answers you can't afford to ignore.</p><p>Key topics: Cybersecurity frameworks, incident response, community support, MSP911.org, Cyber Rise nonprofit, prevention vs. response strategies.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/cf4e9aa1/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/cf4e9aa1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>64. The Hidden Threat: How Vendor Breaches Can Destroy Your Business - with Jolie Grace Wareham</title>
      <itunes:title>64. The Hidden Threat: How Vendor Breaches Can Destroy Your Business - with Jolie Grace Wareham</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7b41e4bd-5fe4-49e2-b861-a4244c6e01d8</guid>
      <link>https://unhacked.live/64</link>
      <description>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://unhackmybusiness.com">https://unhackmybusiness.com</a>  <a href="https://www.eventbrite.com/e/how-to-cut-your-technology-costs-by-40-without-compromising-security-tickets-1505204289549?utm-campaign=social&amp;utm-content=attendeeshare&amp;utm-medium=discovery&amp;utm-term=listing&amp;utm-source=cp&amp;aff=ebdsshcopyurl"><br></a>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Jolie Grace Wareham, CEO of Protosec - <a href="https://protasec.com/">https://protasec.com/</a></p><p><br>Your vendors could be your biggest cybersecurity weakness. In this eye-opening episode, cybersecurity advisor Jolie Grace Wareham shares a real case where a small business lost a significant five-figure sum when their vendor's email compromise led to fraudulent payment instructions.</p><p>Learn how threat actors lived undetected in a vendor's email system for months, then sent convincing fake wiring instructions that looked completely legitimate. Discover the red flags that could have prevented this costly attack and why 60% of small businesses that experience cyber incidents are out of business within six months.</p><p>Key topics: vendor risk management, business email compromise (BEC), payment verification protocols, incident response planning, and why cybersecurity is everyone's responsibility—not just IT's.</p><p>Essential listening for any business owner who works with vendors, contractors, or third-party service providers.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://unhackmybusiness.com">https://unhackmybusiness.com</a>  <a href="https://www.eventbrite.com/e/how-to-cut-your-technology-costs-by-40-without-compromising-security-tickets-1505204289549?utm-campaign=social&amp;utm-content=attendeeshare&amp;utm-medium=discovery&amp;utm-term=listing&amp;utm-source=cp&amp;aff=ebdsshcopyurl"><br></a>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Jolie Grace Wareham, CEO of Protosec - <a href="https://protasec.com/">https://protasec.com/</a></p><p><br>Your vendors could be your biggest cybersecurity weakness. In this eye-opening episode, cybersecurity advisor Jolie Grace Wareham shares a real case where a small business lost a significant five-figure sum when their vendor's email compromise led to fraudulent payment instructions.</p><p>Learn how threat actors lived undetected in a vendor's email system for months, then sent convincing fake wiring instructions that looked completely legitimate. Discover the red flags that could have prevented this costly attack and why 60% of small businesses that experience cyber incidents are out of business within six months.</p><p>Key topics: vendor risk management, business email compromise (BEC), payment verification protocols, incident response planning, and why cybersecurity is everyone's responsibility—not just IT's.</p><p>Essential listening for any business owner who works with vendors, contractors, or third-party service providers.</p>]]>
      </content:encoded>
      <pubDate>Fri, 08 Aug 2025 17:22:55 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/a00e7501/9af2d760.mp3" length="48905416" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3055</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:<br></strong>Justin Shelley - <a href="https://unhackmybusiness.com">https://unhackmybusiness.com</a>  <a href="https://www.eventbrite.com/e/how-to-cut-your-technology-costs-by-40-without-compromising-security-tickets-1505204289549?utm-campaign=social&amp;utm-content=attendeeshare&amp;utm-medium=discovery&amp;utm-term=listing&amp;utm-source=cp&amp;aff=ebdsshcopyurl"><br></a>Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Jolie Grace Wareham, CEO of Protosec - <a href="https://protasec.com/">https://protasec.com/</a></p><p><br>Your vendors could be your biggest cybersecurity weakness. In this eye-opening episode, cybersecurity advisor Jolie Grace Wareham shares a real case where a small business lost a significant five-figure sum when their vendor's email compromise led to fraudulent payment instructions.</p><p>Learn how threat actors lived undetected in a vendor's email system for months, then sent convincing fake wiring instructions that looked completely legitimate. Discover the red flags that could have prevented this costly attack and why 60% of small businesses that experience cyber incidents are out of business within six months.</p><p>Key topics: vendor risk management, business email compromise (BEC), payment verification protocols, incident response planning, and why cybersecurity is everyone's responsibility—not just IT's.</p><p>Essential listening for any business owner who works with vendors, contractors, or third-party service providers.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/a00e7501/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/a00e7501/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>63. Everything Is a Data Problem: How AI Is Creating New Business Risks - with Jocelyn Houle</title>
      <itunes:title>63. Everything Is a Data Problem: How AI Is Creating New Business Risks - with Jocelyn Houle</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6c693fb9-a3f5-4ab6-b895-6f399c9a7384</guid>
      <link>https://unhacked.live/63</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Jocelyn Houle - <a href="https://www.jocelynhoule.com/">https://www.jocelynhoule.com/</a></p><p>Small businesses are racing to adopt AI, but most are unknowingly creating massive security vulnerabilities. In this episode, veteran AI expert Jocelyn Houle reveals why "everything is a data problem" and how companies are accidentally exposing customer data, intellectual property, and sensitive information through AI implementations.</p><p>From the Chevrolet chatbot that offered a $76,000 car for $1 to HR systems leaking employee salaries, we explore real-world AI disasters and what they mean for your business. Jocelyn shares practical strategies for Data Security Posture Management (DSPM), prompt injection prevention, and safe AI adoption that won't put your company at risk.</p><p>Key topics: AI security risks, data protection, prompt injection attacks, shadow IT, customer data exposure, and actionable steps for implementing AI safely in small businesses.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Jocelyn Houle - <a href="https://www.jocelynhoule.com/">https://www.jocelynhoule.com/</a></p><p>Small businesses are racing to adopt AI, but most are unknowingly creating massive security vulnerabilities. In this episode, veteran AI expert Jocelyn Houle reveals why "everything is a data problem" and how companies are accidentally exposing customer data, intellectual property, and sensitive information through AI implementations.</p><p>From the Chevrolet chatbot that offered a $76,000 car for $1 to HR systems leaking employee salaries, we explore real-world AI disasters and what they mean for your business. Jocelyn shares practical strategies for Data Security Posture Management (DSPM), prompt injection prevention, and safe AI adoption that won't put your company at risk.</p><p>Key topics: AI security risks, data protection, prompt injection attacks, shadow IT, customer data exposure, and actionable steps for implementing AI safely in small businesses.</p>]]>
      </content:encoded>
      <pubDate>Fri, 08 Aug 2025 12:20:57 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/e41b1fb9/f1793e01.mp3" length="47858843" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2989</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a><br> Bryan Lachapelle - <a href="https://www.b4networks.ca/">https://www.b4networks.ca/</a></p><p><strong>Guest:</strong> Jocelyn Houle - <a href="https://www.jocelynhoule.com/">https://www.jocelynhoule.com/</a></p><p>Small businesses are racing to adopt AI, but most are unknowingly creating massive security vulnerabilities. In this episode, veteran AI expert Jocelyn Houle reveals why "everything is a data problem" and how companies are accidentally exposing customer data, intellectual property, and sensitive information through AI implementations.</p><p>From the Chevrolet chatbot that offered a $76,000 car for $1 to HR systems leaking employee salaries, we explore real-world AI disasters and what they mean for your business. Jocelyn shares practical strategies for Data Security Posture Management (DSPM), prompt injection prevention, and safe AI adoption that won't put your company at risk.</p><p>Key topics: AI security risks, data protection, prompt injection attacks, shadow IT, customer data exposure, and actionable steps for implementing AI safely in small businesses.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/e41b1fb9/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/e41b1fb9/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>62. How Elderly Scams Could Destroy Your Business and Family Wealth - with Jocelyn King</title>
      <itunes:title>62. How Elderly Scams Could Destroy Your Business and Family Wealth - with Jocelyn King</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5c1a5af0-8f52-47e9-9411-b691aa707835</guid>
      <link>https://unhacked.live/62</link>
      <description>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a>  | <br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p><strong>Guest:</strong> Jocelyn King, "Queen of Online Safety" - <a href="https://www.smarteronlinesafety.com/">https://www.smarteronlinesafety.com/</a> </p><p>In this eye-opening episode, cybersecurity expert Jocelyn King shares her harrowing personal story of being targeted by cybercriminals for years, losing over $500,000, and how it led to her mission of protecting others online.</p><p>The conversation focuses on a critical but underserved area: protecting our elderly community from cyber scams. With over <br>40billionstolenfromAmericans60+lastyearalone,andaveragelossesexceeding40<em>billionstolenfromAmericans</em>60+<em>lastyearalone</em>,<em>andaveragelossesexceeding</em>60,000 per victim, this isn't just about protecting grandparents—it's about protecting your family's financial future.</p><p>Jocelyn shares practical strategies for safeguarding elderly family members, including setting up two-factor authentication alerts to your phone, establishing "stranger danger" protocols for the digital age, and creating emergency response plans. The hosts discuss real cases, including a devastating $300,000 retirement theft, and why traditional banking protections don't apply when victims willingly transfer money to scammers.</p><p>Key takeaways include actionable steps business owners can take today to protect elderly family members who could become unexpected financial burdens if targeted by sophisticated scammers.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a>  | <br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p><strong>Guest:</strong> Jocelyn King, "Queen of Online Safety" - <a href="https://www.smarteronlinesafety.com/">https://www.smarteronlinesafety.com/</a> </p><p>In this eye-opening episode, cybersecurity expert Jocelyn King shares her harrowing personal story of being targeted by cybercriminals for years, losing over $500,000, and how it led to her mission of protecting others online.</p><p>The conversation focuses on a critical but underserved area: protecting our elderly community from cyber scams. With over <br>40billionstolenfromAmericans60+lastyearalone,andaveragelossesexceeding40<em>billionstolenfromAmericans</em>60+<em>lastyearalone</em>,<em>andaveragelossesexceeding</em>60,000 per victim, this isn't just about protecting grandparents—it's about protecting your family's financial future.</p><p>Jocelyn shares practical strategies for safeguarding elderly family members, including setting up two-factor authentication alerts to your phone, establishing "stranger danger" protocols for the digital age, and creating emergency response plans. The hosts discuss real cases, including a devastating $300,000 retirement theft, and why traditional banking protections don't apply when victims willingly transfer money to scammers.</p><p>Key takeaways include actionable steps business owners can take today to protect elderly family members who could become unexpected financial burdens if targeted by sophisticated scammers.</p>]]>
      </content:encoded>
      <pubDate>Wed, 23 Jul 2025 16:07:07 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/3a4c09b0/43737908.mp3" length="46057852" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2877</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Hosts:</strong> <br>Justin Shelley - <a href="https://www.phoenixitadvisors.com/">https://www.phoenixitadvisors.com/</a>  | <br>Mario Zaki - <a href="https://www.mazteck.com/">https://www.mazteck.com/</a></p><p><strong>Guest:</strong> Jocelyn King, "Queen of Online Safety" - <a href="https://www.smarteronlinesafety.com/">https://www.smarteronlinesafety.com/</a> </p><p>In this eye-opening episode, cybersecurity expert Jocelyn King shares her harrowing personal story of being targeted by cybercriminals for years, losing over $500,000, and how it led to her mission of protecting others online.</p><p>The conversation focuses on a critical but underserved area: protecting our elderly community from cyber scams. With over <br>40billionstolenfromAmericans60+lastyearalone,andaveragelossesexceeding40<em>billionstolenfromAmericans</em>60+<em>lastyearalone</em>,<em>andaveragelossesexceeding</em>60,000 per victim, this isn't just about protecting grandparents—it's about protecting your family's financial future.</p><p>Jocelyn shares practical strategies for safeguarding elderly family members, including setting up two-factor authentication alerts to your phone, establishing "stranger danger" protocols for the digital age, and creating emergency response plans. The hosts discuss real cases, including a devastating $300,000 retirement theft, and why traditional banking protections don't apply when victims willingly transfer money to scammers.</p><p>Key takeaways include actionable steps business owners can take today to protect elderly family members who could become unexpected financial burdens if targeted by sophisticated scammers.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/3a4c09b0/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/3a4c09b0/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>61. When Six Figures Nearly Vanished: A Real-World Guide to Protecting Your Business from Wire Fraud The Reality Check Every Business Owner Needs</title>
      <itunes:title>61. When Six Figures Nearly Vanished: A Real-World Guide to Protecting Your Business from Wire Fraud The Reality Check Every Business Owner Needs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">14f34598-2ae2-4a1c-b464-cb8c68bd5889</guid>
      <link>https://unhacked.live/61</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Mon, 21 Jul 2025 17:13:50 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/bce8243c/0c60ba60.mp3" length="35104454" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2192</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/bce8243c/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/bce8243c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>60. The Brutal Truth Your Cybersecurity Is Probably Worthless - with Adriel Desautels</title>
      <itunes:title>60. The Brutal Truth Your Cybersecurity Is Probably Worthless - with Adriel Desautels</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">395a4dec-a654-425a-b0b6-a80ad4dfecd0</guid>
      <link>https://unhacked.live/60</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Mon, 14 Jul 2025 15:38:50 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/40147e6d/b9270601.mp3" length="42935694" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2682</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/40147e6d/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/40147e6d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>59. Your Factory Is Wide Open: How to Lock Down Connected Machines Before It’s Too Late with Tory Bjorklundy </title>
      <itunes:title>59. Your Factory Is Wide Open: How to Lock Down Connected Machines Before It’s Too Late with Tory Bjorklundy </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e7bfc3cc-3c59-4b62-81e0-2c28d2fadc7c</guid>
      <link>https://unhacked.live/59</link>
      <description>
        <![CDATA[<p><strong>Your Factory Is Wide Open: How to Lock Down Connected Machines Before It’s Too Late</strong></p><p>Legacy machines were never designed to be connected—or protected. But in modern manufacturing, connectivity is a must. So how do you protect your business when the shop floor is now on the network?</p><p>In this episode, Justin talks with Tory Bjorklund, manufacturing consultant and author of <em>Digital Transformation Guidebook</em>, about the surprising ways attackers exploit connected machines, what most companies still get wrong, and how to secure industrial systems without breaking your operations.</p><p><strong>In this episode:</strong></p><ul><li>Why shop floor devices are a cybersecurity risk</li><li>The threat of PLCs, HMIs, and remote access</li><li>How one-way data flows can prevent ransomware</li><li>Using segmentation, firewalls, and MFA to keep attackers out</li><li>What AI can (and can’t) do for modern manufacturers</li></ul><p><strong>Guest Links:</strong> <a href="https://victoriafide.com/">https://victoriafide.com/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Your Factory Is Wide Open: How to Lock Down Connected Machines Before It’s Too Late</strong></p><p>Legacy machines were never designed to be connected—or protected. But in modern manufacturing, connectivity is a must. So how do you protect your business when the shop floor is now on the network?</p><p>In this episode, Justin talks with Tory Bjorklund, manufacturing consultant and author of <em>Digital Transformation Guidebook</em>, about the surprising ways attackers exploit connected machines, what most companies still get wrong, and how to secure industrial systems without breaking your operations.</p><p><strong>In this episode:</strong></p><ul><li>Why shop floor devices are a cybersecurity risk</li><li>The threat of PLCs, HMIs, and remote access</li><li>How one-way data flows can prevent ransomware</li><li>Using segmentation, firewalls, and MFA to keep attackers out</li><li>What AI can (and can’t) do for modern manufacturers</li></ul><p><strong>Guest Links:</strong> <a href="https://victoriafide.com/">https://victoriafide.com/</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 03 Jul 2025 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/9fa35203/5c5aa193.mp3" length="56616054" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3537</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Your Factory Is Wide Open: How to Lock Down Connected Machines Before It’s Too Late</strong></p><p>Legacy machines were never designed to be connected—or protected. But in modern manufacturing, connectivity is a must. So how do you protect your business when the shop floor is now on the network?</p><p>In this episode, Justin talks with Tory Bjorklund, manufacturing consultant and author of <em>Digital Transformation Guidebook</em>, about the surprising ways attackers exploit connected machines, what most companies still get wrong, and how to secure industrial systems without breaking your operations.</p><p><strong>In this episode:</strong></p><ul><li>Why shop floor devices are a cybersecurity risk</li><li>The threat of PLCs, HMIs, and remote access</li><li>How one-way data flows can prevent ransomware</li><li>Using segmentation, firewalls, and MFA to keep attackers out</li><li>What AI can (and can’t) do for modern manufacturers</li></ul><p><strong>Guest Links:</strong> <a href="https://victoriafide.com/">https://victoriafide.com/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/9fa35203/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/9fa35203/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>58. The AI Advantage: How Small Businesses Can Compete (and Win) Like the Big Guys with Brad Groux</title>
      <itunes:title>58. The AI Advantage: How Small Businesses Can Compete (and Win) Like the Big Guys with Brad Groux</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">760a13c7-616a-4f3a-a204-1886ddcbfd19</guid>
      <link>https://unhacked.live/58</link>
      <description>
        <![CDATA[<p>This week on <em>UnHacked</em>, we’re talking with Brad Groux (cybersecurity engineer, tech founder, and co-host of <em>The Digital Meld</em> podcast) about how AI is quietly shaping how we build, manage, and lead our businesses.</p><p>From SMBs to the enterprise, Brad has worked with it all. In this episode, we break down:</p><ul><li>Why we’re already outsourcing leadership decisions to AI (and what to do about it)</li><li>How SMBs can avoid tech fatigue while still innovating</li><li>The new risks AI introduces, and how to defend against them</li><li>Why cybersecurity and business growth are now inseparable</li></ul><p>Whether you're an MSP, a manufacturer, or a business owner trying to stay ahead of the tech curve, this episode gives you a candid look at what’s coming next and how to lead through it.</p><p>🔗 <strong>Guest links</strong><br> 🌐 <a href="https://digitalmeld.io">DigitalMeld.io</a><br> 🎙️ <a href="https://open.spotify.com/show/1QH4bM1FV6AEuleFVeCXrG?si=90bebd39055f41e6">The Digital Meld Podcast</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week on <em>UnHacked</em>, we’re talking with Brad Groux (cybersecurity engineer, tech founder, and co-host of <em>The Digital Meld</em> podcast) about how AI is quietly shaping how we build, manage, and lead our businesses.</p><p>From SMBs to the enterprise, Brad has worked with it all. In this episode, we break down:</p><ul><li>Why we’re already outsourcing leadership decisions to AI (and what to do about it)</li><li>How SMBs can avoid tech fatigue while still innovating</li><li>The new risks AI introduces, and how to defend against them</li><li>Why cybersecurity and business growth are now inseparable</li></ul><p>Whether you're an MSP, a manufacturer, or a business owner trying to stay ahead of the tech curve, this episode gives you a candid look at what’s coming next and how to lead through it.</p><p>🔗 <strong>Guest links</strong><br> 🌐 <a href="https://digitalmeld.io">DigitalMeld.io</a><br> 🎙️ <a href="https://open.spotify.com/show/1QH4bM1FV6AEuleFVeCXrG?si=90bebd39055f41e6">The Digital Meld Podcast</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Jul 2025 16:17:29 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/2c795f50/b45f28b7.mp3" length="69641179" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2900</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This week on <em>UnHacked</em>, we’re talking with Brad Groux (cybersecurity engineer, tech founder, and co-host of <em>The Digital Meld</em> podcast) about how AI is quietly shaping how we build, manage, and lead our businesses.</p><p>From SMBs to the enterprise, Brad has worked with it all. In this episode, we break down:</p><ul><li>Why we’re already outsourcing leadership decisions to AI (and what to do about it)</li><li>How SMBs can avoid tech fatigue while still innovating</li><li>The new risks AI introduces, and how to defend against them</li><li>Why cybersecurity and business growth are now inseparable</li></ul><p>Whether you're an MSP, a manufacturer, or a business owner trying to stay ahead of the tech curve, this episode gives you a candid look at what’s coming next and how to lead through it.</p><p>🔗 <strong>Guest links</strong><br> 🌐 <a href="https://digitalmeld.io">DigitalMeld.io</a><br> 🎙️ <a href="https://open.spotify.com/show/1QH4bM1FV6AEuleFVeCXrG?si=90bebd39055f41e6">The Digital Meld Podcast</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/2c795f50/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>57. The Password Trap: What It’s Costing Your Business (And How to Escape) with Raul Cepeda</title>
      <itunes:title>57. The Password Trap: What It’s Costing Your Business (And How to Escape) with Raul Cepeda</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a3977dcc-b6ed-42d1-a735-e7dfd87c1e0f</guid>
      <link>https://unhacked.live/57</link>
      <description>
        <![CDATA[<p>Password fatigue isn’t just annoying—it’s expensive and dangerous. In this episode of <em>UnHacked</em>, Raul Cepeda Jr. from rf IDEAS breaks down the hidden costs of password dependence and shows small businesses a better way forward. From clinicians wasting hours re-logging into systems to the real risk of password-related breaches, Raul makes the case for going passwordless—safely, securely, and affordably.</p><p><br>🔗 Learn more at <a href="https://www.rfideas.com">rfideas.com</a><br> 🔗 Explore passkey adoption at <a href="https://fidoalliance.org">fidoalliance.org</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Password fatigue isn’t just annoying—it’s expensive and dangerous. In this episode of <em>UnHacked</em>, Raul Cepeda Jr. from rf IDEAS breaks down the hidden costs of password dependence and shows small businesses a better way forward. From clinicians wasting hours re-logging into systems to the real risk of password-related breaches, Raul makes the case for going passwordless—safely, securely, and affordably.</p><p><br>🔗 Learn more at <a href="https://www.rfideas.com">rfideas.com</a><br> 🔗 Explore passkey adoption at <a href="https://fidoalliance.org">fidoalliance.org</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Jun 2025 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/87482f33/34fda068.mp3" length="55315028" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2303</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Password fatigue isn’t just annoying—it’s expensive and dangerous. In this episode of <em>UnHacked</em>, Raul Cepeda Jr. from rf IDEAS breaks down the hidden costs of password dependence and shows small businesses a better way forward. From clinicians wasting hours re-logging into systems to the real risk of password-related breaches, Raul makes the case for going passwordless—safely, securely, and affordably.</p><p><br>🔗 Learn more at <a href="https://www.rfideas.com">rfideas.com</a><br> 🔗 Explore passkey adoption at <a href="https://fidoalliance.org">fidoalliance.org</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/87482f33/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>56. Unlocked Remote Access: How One Mistake Brought a Manufacturer to a Halt with Brett Galant</title>
      <itunes:title>56. Unlocked Remote Access: How One Mistake Brought a Manufacturer to a Halt with Brett Galant</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c1b7eca9-332e-481c-846e-e03707d0372a</guid>
      <link>https://unhacked.live/56</link>
      <description>
        <![CDATA[<p>In this episode of <em>UnHacked</em>, cybersecurity strategist Brett Gallant walks us through a real-world disaster—a manufacturing plant brought to its knees by an unsecured remote access tool. We break down what went wrong, how it could’ve been prevented, and why business leaders must stop assuming their IT support has cybersecurity covered.</p><p>If you’re a manufacturer—or any business relying on third-party tools and vendors—this is a wake-up call you can’t afford to miss.</p><p>🔗 Learn more about Brett’s work at <a href="https://www.adaptiveoffice.ca/">adaptiveoffice.ca</a><br> 📘 <em>Why Your Business Must Have Cybersecurity Risk Assessments</em> → <a href="https://a.co/d/9Jfp2MV">Amazon</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>UnHacked</em>, cybersecurity strategist Brett Gallant walks us through a real-world disaster—a manufacturing plant brought to its knees by an unsecured remote access tool. We break down what went wrong, how it could’ve been prevented, and why business leaders must stop assuming their IT support has cybersecurity covered.</p><p>If you’re a manufacturer—or any business relying on third-party tools and vendors—this is a wake-up call you can’t afford to miss.</p><p>🔗 Learn more about Brett’s work at <a href="https://www.adaptiveoffice.ca/">adaptiveoffice.ca</a><br> 📘 <em>Why Your Business Must Have Cybersecurity Risk Assessments</em> → <a href="https://a.co/d/9Jfp2MV">Amazon</a></p>]]>
      </content:encoded>
      <pubDate>Fri, 20 Jun 2025 17:58:44 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/becbfaf7/fe7ec73a.mp3" length="86075212" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3585</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>UnHacked</em>, cybersecurity strategist Brett Gallant walks us through a real-world disaster—a manufacturing plant brought to its knees by an unsecured remote access tool. We break down what went wrong, how it could’ve been prevented, and why business leaders must stop assuming their IT support has cybersecurity covered.</p><p>If you’re a manufacturer—or any business relying on third-party tools and vendors—this is a wake-up call you can’t afford to miss.</p><p>🔗 Learn more about Brett’s work at <a href="https://www.adaptiveoffice.ca/">adaptiveoffice.ca</a><br> 📘 <em>Why Your Business Must Have Cybersecurity Risk Assessments</em> → <a href="https://a.co/d/9Jfp2MV">Amazon</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/becbfaf7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>55. From Breached to Bulletproof: How Smart Businesses Stay Ahead of Cyber Threats with Michael Ritsema</title>
      <itunes:title>55. From Breached to Bulletproof: How Smart Businesses Stay Ahead of Cyber Threats with Michael Ritsema</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f00de74c-77e8-4b7c-be6f-d646a529822f</guid>
      <link>https://unhacked.live/55</link>
      <description>
        <![CDATA[<p>What would happen if your entire business was encrypted overnight? No files. No access. No plan.</p><p>In this episode of <em>UnHacked</em>, we sit down with Michael Ritsema—cybersecurity strategist and President of i3 Business Solutions—who’s helped multiple companies survive full-scale breaches. Together with co-hosts Bryan Lachapelle and Mario Zake, we unpack what actually happens when things go sideways, why most CEOs <em>think</em> they're covered (but aren't), and how to make your business bulletproof—starting today.</p><p><br>This episode is for every business owner who’s ever thought:<br> 🧠 “That won’t happen to us.”<br> 🧠 “We have IT—we’re fine.”<br> 🧠 “We’ll deal with it if something comes up.”</p><p><br>Don’t wait until “something” shows up. Learn how to lead your company through the #1 operational risk of the decade—and how one company was saved by a $300 tape backup.</p><p><br>🎧 Listen in. Take action. Keep your business <em>UnHacked</em>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What would happen if your entire business was encrypted overnight? No files. No access. No plan.</p><p>In this episode of <em>UnHacked</em>, we sit down with Michael Ritsema—cybersecurity strategist and President of i3 Business Solutions—who’s helped multiple companies survive full-scale breaches. Together with co-hosts Bryan Lachapelle and Mario Zake, we unpack what actually happens when things go sideways, why most CEOs <em>think</em> they're covered (but aren't), and how to make your business bulletproof—starting today.</p><p><br>This episode is for every business owner who’s ever thought:<br> 🧠 “That won’t happen to us.”<br> 🧠 “We have IT—we’re fine.”<br> 🧠 “We’ll deal with it if something comes up.”</p><p><br>Don’t wait until “something” shows up. Learn how to lead your company through the #1 operational risk of the decade—and how one company was saved by a $300 tape backup.</p><p><br>🎧 Listen in. Take action. Keep your business <em>UnHacked</em>.</p>]]>
      </content:encoded>
      <pubDate>Wed, 04 Jun 2025 15:14:54 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/7604e88a/6d72a9d9.mp3" length="53798486" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2240</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What would happen if your entire business was encrypted overnight? No files. No access. No plan.</p><p>In this episode of <em>UnHacked</em>, we sit down with Michael Ritsema—cybersecurity strategist and President of i3 Business Solutions—who’s helped multiple companies survive full-scale breaches. Together with co-hosts Bryan Lachapelle and Mario Zake, we unpack what actually happens when things go sideways, why most CEOs <em>think</em> they're covered (but aren't), and how to make your business bulletproof—starting today.</p><p><br>This episode is for every business owner who’s ever thought:<br> 🧠 “That won’t happen to us.”<br> 🧠 “We have IT—we’re fine.”<br> 🧠 “We’ll deal with it if something comes up.”</p><p><br>Don’t wait until “something” shows up. Learn how to lead your company through the #1 operational risk of the decade—and how one company was saved by a $300 tape backup.</p><p><br>🎧 Listen in. Take action. Keep your business <em>UnHacked</em>.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://www.i3businesssolutions.com/" img="https://img.transistorcdn.com/8XE9NBMJS5MnLlQUavn_sVvT3nxce3gM5GubrFPey60/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNmE5/NDg0MjA1NzdkZTkw/ZGM4NjYzY2QxZDU4/YWExMC5qcGc.jpg">Michael Ritsema</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/7604e88a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>54. The Receipts Are Fake, The Photos Are Lies: A Small Business Owner's Survival Guide with Mounir Ibrahim</title>
      <itunes:title>54. The Receipts Are Fake, The Photos Are Lies: A Small Business Owner's Survival Guide with Mounir Ibrahim</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c8fe4cb1-431d-4a72-8dc0-10e05f9c6c58</guid>
      <link>https://unhacked.live/54</link>
      <description>
        <![CDATA[<p>Three small business owners are about to discover why their $150 inspection costs are bankrupting them—and how one diplomat's experience in Syrian war zones revealed the game-changing solution.</p><p>In this eye-opening episode, cybersecurity experts Justin, Bryan, and Mario sit down with <a href="https://www.linkedin.com/in/mounir-ibrahim-2965464/">Mounir Ibrahim</a>, former US diplomat and Chief Communications Officer at <a href="https://www.truepic.com/">TruePic</a>. Mounir shares how witnessing fake images derail international investigations led him to a technology that's revolutionizing how businesses verify digital content.</p><p><strong>What You'll Learn:</strong> • How to eliminate $150 inspection fees and reduce wait times from 3 days to 1 hour • Why your customers' photos, receipts, and documentation can't be trusted (and what to do about it) • The two major fraud threats hitting small businesses: AI-generated content and "cheap fakes" • Real-world examples: Insurance claims, warranty inspections, loan applications, and merchant cash advances • How one pizza shop owner can now get funding in hours instead of days</p><p><strong>Perfect for:</strong> Small business owners doing manual inspections, anyone processing customer-submitted photos or documents, and entrepreneurs looking to expand beyond their geographic area without the traditional costs.</p><p><strong>The Bottom Line:</strong> While we're living in the "Wild West" of digital content, smart business owners are using authentication technology to cut costs by 90%, serve customers faster, and expand into new markets—all while protecting themselves from fraud.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Three small business owners are about to discover why their $150 inspection costs are bankrupting them—and how one diplomat's experience in Syrian war zones revealed the game-changing solution.</p><p>In this eye-opening episode, cybersecurity experts Justin, Bryan, and Mario sit down with <a href="https://www.linkedin.com/in/mounir-ibrahim-2965464/">Mounir Ibrahim</a>, former US diplomat and Chief Communications Officer at <a href="https://www.truepic.com/">TruePic</a>. Mounir shares how witnessing fake images derail international investigations led him to a technology that's revolutionizing how businesses verify digital content.</p><p><strong>What You'll Learn:</strong> • How to eliminate $150 inspection fees and reduce wait times from 3 days to 1 hour • Why your customers' photos, receipts, and documentation can't be trusted (and what to do about it) • The two major fraud threats hitting small businesses: AI-generated content and "cheap fakes" • Real-world examples: Insurance claims, warranty inspections, loan applications, and merchant cash advances • How one pizza shop owner can now get funding in hours instead of days</p><p><strong>Perfect for:</strong> Small business owners doing manual inspections, anyone processing customer-submitted photos or documents, and entrepreneurs looking to expand beyond their geographic area without the traditional costs.</p><p><strong>The Bottom Line:</strong> While we're living in the "Wild West" of digital content, smart business owners are using authentication technology to cut costs by 90%, serve customers faster, and expand into new markets—all while protecting themselves from fraud.</p>]]>
      </content:encoded>
      <pubDate>Thu, 29 May 2025 09:50:30 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/b0e8047c/02c7ea51.mp3" length="66937763" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2787</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Three small business owners are about to discover why their $150 inspection costs are bankrupting them—and how one diplomat's experience in Syrian war zones revealed the game-changing solution.</p><p>In this eye-opening episode, cybersecurity experts Justin, Bryan, and Mario sit down with <a href="https://www.linkedin.com/in/mounir-ibrahim-2965464/">Mounir Ibrahim</a>, former US diplomat and Chief Communications Officer at <a href="https://www.truepic.com/">TruePic</a>. Mounir shares how witnessing fake images derail international investigations led him to a technology that's revolutionizing how businesses verify digital content.</p><p><strong>What You'll Learn:</strong> • How to eliminate $150 inspection fees and reduce wait times from 3 days to 1 hour • Why your customers' photos, receipts, and documentation can't be trusted (and what to do about it) • The two major fraud threats hitting small businesses: AI-generated content and "cheap fakes" • Real-world examples: Insurance claims, warranty inspections, loan applications, and merchant cash advances • How one pizza shop owner can now get funding in hours instead of days</p><p><strong>Perfect for:</strong> Small business owners doing manual inspections, anyone processing customer-submitted photos or documents, and entrepreneurs looking to expand beyond their geographic area without the traditional costs.</p><p><strong>The Bottom Line:</strong> While we're living in the "Wild West" of digital content, smart business owners are using authentication technology to cut costs by 90%, serve customers faster, and expand into new markets—all while protecting themselves from fraud.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/b0e8047c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>53. The One Thing That’s Tanking Your Business Value (And How to Fix It) with James DuBos</title>
      <itunes:title>53. The One Thing That’s Tanking Your Business Value (And How to Fix It) with James DuBos</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3b065a1d-4d8e-452b-91fa-b463f0773e96</guid>
      <link>https://unhacked.live/53</link>
      <description>
        <![CDATA[<p>Are your cybersecurity gaps quietly devaluing your business? In this episode, entrepreneur and advisor Jim DuBos shares the top reasons buyers walk away—and how small business owners can protect their company’s value before it’s too late. Learn the 3 essential controls every buyer looks for, how to build a culture of security, and why cybersecurity is a business growth strategy, not just an IT concern. </p><p><a href="https://www.phoenixitadvisors.com/dubos"> Download Jim DuBos’ Cybersecurity Program for Small Business</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are your cybersecurity gaps quietly devaluing your business? In this episode, entrepreneur and advisor Jim DuBos shares the top reasons buyers walk away—and how small business owners can protect their company’s value before it’s too late. Learn the 3 essential controls every buyer looks for, how to build a culture of security, and why cybersecurity is a business growth strategy, not just an IT concern. </p><p><a href="https://www.phoenixitadvisors.com/dubos"> Download Jim DuBos’ Cybersecurity Program for Small Business</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 27 May 2025 12:39:27 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/4aa27736/049812f2.mp3" length="52116374" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2170</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are your cybersecurity gaps quietly devaluing your business? In this episode, entrepreneur and advisor Jim DuBos shares the top reasons buyers walk away—and how small business owners can protect their company’s value before it’s too late. Learn the 3 essential controls every buyer looks for, how to build a culture of security, and why cybersecurity is a business growth strategy, not just an IT concern. </p><p><a href="https://www.phoenixitadvisors.com/dubos"> Download Jim DuBos’ Cybersecurity Program for Small Business</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://www.dubos.me/" img="https://img.transistorcdn.com/6ImFLaK-1lATPnpyLRG_h3jzkcHVDXHJS4Fk0V4X17I/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OGZk/YjZjMDI2OWVjZWE0/YjM4NzgyNThhMzE4/OGYzMy5wbmc.jpg">James DuBos</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/4aa27736/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>52. Deepfakes Are Coming for Your Business: Here’s How to Fight Back with Ilke Demir</title>
      <itunes:title>52. Deepfakes Are Coming for Your Business: Here’s How to Fight Back with Ilke Demir</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e45f94af-00fd-48bb-95e0-236c6af33ec3</guid>
      <link>https://unhacked.live/52</link>
      <description>
        <![CDATA[<p>In this episode, hosts Justin Shelley and Mario Zaki welcome Dr. Ilkay Damir, a deep fake detection expert who developed FakeCatcher at Intel. Dr. Damir explains how deepfakes threaten businesses through financial scams, political misinformation, and reputation damage. She discusses her groundbreaking technology that detects fake videos by analyzing blood flow signals in faces with 96% accuracy. The conversation covers practical protection strategies for business owners, including using the Content Provenance and Authenticity (C2PA) standard and protective technologies like "My Art My Choice" that prevent AI from successfully replicating content. Dr. Damir's message: we're not doomed - businesses can protect their digital identity by being proactive and leveraging emerging authentication technologies.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, hosts Justin Shelley and Mario Zaki welcome Dr. Ilkay Damir, a deep fake detection expert who developed FakeCatcher at Intel. Dr. Damir explains how deepfakes threaten businesses through financial scams, political misinformation, and reputation damage. She discusses her groundbreaking technology that detects fake videos by analyzing blood flow signals in faces with 96% accuracy. The conversation covers practical protection strategies for business owners, including using the Content Provenance and Authenticity (C2PA) standard and protective technologies like "My Art My Choice" that prevent AI from successfully replicating content. Dr. Damir's message: we're not doomed - businesses can protect their digital identity by being proactive and leveraging emerging authentication technologies.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 20 May 2025 08:10:23 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/40fedd66/3f56d714.mp3" length="75187633" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3131</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, hosts Justin Shelley and Mario Zaki welcome Dr. Ilkay Damir, a deep fake detection expert who developed FakeCatcher at Intel. Dr. Damir explains how deepfakes threaten businesses through financial scams, political misinformation, and reputation damage. She discusses her groundbreaking technology that detects fake videos by analyzing blood flow signals in faces with 96% accuracy. The conversation covers practical protection strategies for business owners, including using the Content Provenance and Authenticity (C2PA) standard and protective technologies like "My Art My Choice" that prevent AI from successfully replicating content. Dr. Damir's message: we're not doomed - businesses can protect their digital identity by being proactive and leveraging emerging authentication technologies.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://ilkedemir.weebly.com/" img="https://img.transistorcdn.com/nL8a15kA3UKvS562k6XvHpR2Xu9BPkuU4Y4AqtcObpo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMGFl/ZTM4ZTIxNWMyNTRj/N2M4Zjc1YTliMDhk/NzZlYi5qcGc.jpg">Ilke Demir</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/40fedd66/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/40fedd66/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/40fedd66/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/40fedd66/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/40fedd66/transcription" type="text/html"/>
    </item>
    <item>
      <title>51. Behind the Likes: What Small Business Owners Must Know About Social Media Fraud</title>
      <itunes:title>51. Behind the Likes: What Small Business Owners Must Know About Social Media Fraud</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">194b48a9-12c8-481e-9575-b8fa6407806f</guid>
      <link>https://unhacked.live/51</link>
      <description>
        <![CDATA[<p>In this episode of UnHacked, hosts Justin Shelley and Mario Zake are joined by Tim O'Hearn, author and former software engineer, to explore the darker side of social media engagement strategies. Tim shares insights from his personal journey of creating social media bots and discusses the implications of fake activity on platforms like Instagram. The conversation delves into the potential harm of artificial social proof, highlighting the need for small business owners to be discerning about social media metrics. Tim also discusses his book, <em>Framed: A Villain's Perspective on Social Media</em>, and the broader impact of deceptive online practices. Listen to uncover the hidden threats and learn how to navigate the complexities of social media with your business's integrity intact.</p><p>Buy Tim's book here: https://amzn.to/3XoxUC1</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of UnHacked, hosts Justin Shelley and Mario Zake are joined by Tim O'Hearn, author and former software engineer, to explore the darker side of social media engagement strategies. Tim shares insights from his personal journey of creating social media bots and discusses the implications of fake activity on platforms like Instagram. The conversation delves into the potential harm of artificial social proof, highlighting the need for small business owners to be discerning about social media metrics. Tim also discusses his book, <em>Framed: A Villain's Perspective on Social Media</em>, and the broader impact of deceptive online practices. Listen to uncover the hidden threats and learn how to navigate the complexities of social media with your business's integrity intact.</p><p>Buy Tim's book here: https://amzn.to/3XoxUC1</p>]]>
      </content:encoded>
      <pubDate>Wed, 14 May 2025 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/ad8d18ea/9ff288be.mp3" length="85048862" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3540</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of UnHacked, hosts Justin Shelley and Mario Zake are joined by Tim O'Hearn, author and former software engineer, to explore the darker side of social media engagement strategies. Tim shares insights from his personal journey of creating social media bots and discusses the implications of fake activity on platforms like Instagram. The conversation delves into the potential harm of artificial social proof, highlighting the need for small business owners to be discerning about social media metrics. Tim also discusses his book, <em>Framed: A Villain's Perspective on Social Media</em>, and the broader impact of deceptive online practices. Listen to uncover the hidden threats and learn how to navigate the complexities of social media with your business's integrity intact.</p><p>Buy Tim's book here: https://amzn.to/3XoxUC1</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://www.tjohearn.com/links/" img="https://img.transistorcdn.com/4OC-8yfwxyQot6fgBHo7V2913O1fKUAYvt4sRXbrWoY/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zOWM3/NTI2ZDkzZmJmYTM2/YTkzMTM2ODk5YzQz/NWM0ZS5qcGc.jpg">Tim O'Hearn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/ad8d18ea/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ad8d18ea/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ad8d18ea/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ad8d18ea/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/ad8d18ea/transcription" type="text/html"/>
    </item>
    <item>
      <title>50. Security Is a Team Sport: Turning Employees from Liabilities to Cyber Defenders</title>
      <itunes:title>50. Security Is a Team Sport: Turning Employees from Liabilities to Cyber Defenders</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">845e1c44-d1ea-43ad-9acd-9403fe920d53</guid>
      <link>https://unhacked.live/50</link>
      <description>
        <![CDATA[<p>This episode focuses on the critical role people play in cybersecurity. The hosts discuss how most breaches (95-97%) involve human error, emphasizing that while technology defenses are important, humans remain the weakest link. They explore how hackers exploit human psychology through social engineering and why creating a positive security culture that rewards reporting and learning is crucial. The episode includes stories of successful security awareness programs and offers practical advice for organizations looking to strengthen their "human firewall."</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on the critical role people play in cybersecurity. The hosts discuss how most breaches (95-97%) involve human error, emphasizing that while technology defenses are important, humans remain the weakest link. They explore how hackers exploit human psychology through social engineering and why creating a positive security culture that rewards reporting and learning is crucial. The episode includes stories of successful security awareness programs and offers practical advice for organizations looking to strengthen their "human firewall."</p>]]>
      </content:encoded>
      <pubDate>Wed, 07 May 2025 08:21:57 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/ace27fed/6e5e4739.mp3" length="65670483" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2733</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on the critical role people play in cybersecurity. The hosts discuss how most breaches (95-97%) involve human error, emphasizing that while technology defenses are important, humans remain the weakest link. They explore how hackers exploit human psychology through social engineering and why creating a positive security culture that rewards reporting and learning is crucial. The episode includes stories of successful security awareness programs and offers practical advice for organizations looking to strengthen their "human firewall."</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/ace27fed/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ace27fed/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ace27fed/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ace27fed/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/ace27fed/transcription" type="text/html"/>
    </item>
    <item>
      <title>49. Mac or PC? Mario and Damien Duke it out in This Epic Battle of Who Is More Secure</title>
      <itunes:title>49. Mac or PC? Mario and Damien Duke it out in This Epic Battle of Who Is More Secure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b05756d1-8e3a-4cbd-9512-b0e9f7914468</guid>
      <link>https://unhacked.live/49</link>
      <description>
        <![CDATA[<p>Today we bring in a guest who consults with solopreneurs who run their businesses on Macs. This question is debated all the time: Is Mac really more secure than Windows? Well, today we heat things up on UnHacked as we battle it out. </p><ul><li>Where is Windows more vulnerable?</li><li>Where is Mac more vulnerable?</li><li>What threats are the same (PC vs Mac)</li></ul><p>I don't know that we ever solved the primary question... but here are some good tips for staying safe, regardless of which platform you are passionate about.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Today we bring in a guest who consults with solopreneurs who run their businesses on Macs. This question is debated all the time: Is Mac really more secure than Windows? Well, today we heat things up on UnHacked as we battle it out. </p><ul><li>Where is Windows more vulnerable?</li><li>Where is Mac more vulnerable?</li><li>What threats are the same (PC vs Mac)</li></ul><p>I don't know that we ever solved the primary question... but here are some good tips for staying safe, regardless of which platform you are passionate about.</p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Apr 2025 14:17:20 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/c6925f5c/2374123c.mp3" length="76458424" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3182</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Today we bring in a guest who consults with solopreneurs who run their businesses on Macs. This question is debated all the time: Is Mac really more secure than Windows? Well, today we heat things up on UnHacked as we battle it out. </p><ul><li>Where is Windows more vulnerable?</li><li>Where is Mac more vulnerable?</li><li>What threats are the same (PC vs Mac)</li></ul><p>I don't know that we ever solved the primary question... but here are some good tips for staying safe, regardless of which platform you are passionate about.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://macpreneur.com/tips" img="https://img.transistorcdn.com/XL-MvVYCnfbVSdXX_vQvHHSRHJ1uYQdTMNa0WT-ivi0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNGUx/NWRiMzc3ZGIyOGU3/MjhjYWYzNjQ5NDE1/NDExZi5qcGc.jpg">Damien Schreurs</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/c6925f5c/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/c6925f5c/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/c6925f5c/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/c6925f5c/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/c6925f5c/transcription" type="text/html"/>
    </item>
    <item>
      <title>48. I Hate the Cybersecurity Industry with Dave Sobel of The Business of Tech Podcast</title>
      <itunes:title>48. I Hate the Cybersecurity Industry with Dave Sobel of The Business of Tech Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d8257551-ef1f-4234-9ff7-e158ff2fba1d</guid>
      <link>https://unhacked.live/48</link>
      <description>
        <![CDATA[<p>Dave Sobel is the host of The Business of Tech, a podcast that delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering ‘Why Do We Care?</p><p>Dave shocked me when he said, "I hate the cybersecurity industry!" So I said, "Let's discuss!" The bottom line is this: we as a society can and should do better. </p><ul><li>As consumers of cybersecurity products and services, we need to push back on vendors. Why do they get away with having no skin in the game?</li><li>As citizens, we need to push back on our leaders. Why are we always on defense? Let's play offense!</li><li>As users of technology, we have our own set of responsibilities. It's time to take that seriously.</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Dave Sobel is the host of The Business of Tech, a podcast that delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering ‘Why Do We Care?</p><p>Dave shocked me when he said, "I hate the cybersecurity industry!" So I said, "Let's discuss!" The bottom line is this: we as a society can and should do better. </p><ul><li>As consumers of cybersecurity products and services, we need to push back on vendors. Why do they get away with having no skin in the game?</li><li>As citizens, we need to push back on our leaders. Why are we always on defense? Let's play offense!</li><li>As users of technology, we have our own set of responsibilities. It's time to take that seriously.</li></ul>]]>
      </content:encoded>
      <pubDate>Fri, 04 Apr 2025 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/4fe7824d/6f54ada9.mp3" length="74269132" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3091</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Dave Sobel is the host of The Business of Tech, a podcast that delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering ‘Why Do We Care?</p><p>Dave shocked me when he said, "I hate the cybersecurity industry!" So I said, "Let's discuss!" The bottom line is this: we as a society can and should do better. </p><ul><li>As consumers of cybersecurity products and services, we need to push back on vendors. Why do they get away with having no skin in the game?</li><li>As citizens, we need to push back on our leaders. Why are we always on defense? Let's play offense!</li><li>As users of technology, we have our own set of responsibilities. It's time to take that seriously.</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://www.businessof.tech/about/" img="https://img.transistorcdn.com/LTWaq7swrBNzJrCmSB5maZ_660OYLMA2evlFI_sW388/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNTUx/OTdmMTk5ZjQ0N2Qz/YjU5MjI3ZmQ3MGM1/NDBjNS5qcGc.jpg">Dave Sobel</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/4fe7824d/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4fe7824d/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4fe7824d/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4fe7824d/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/4fe7824d/transcription" type="text/html"/>
    </item>
    <item>
      <title>47. Architects of Defense with Lori Crooks</title>
      <itunes:title>47. Architects of Defense with Lori Crooks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c266a199-4c44-45d8-8532-33d13364bfcb</guid>
      <link>https://unhacked.live/47</link>
      <description>
        <![CDATA[<p>Lori Crooks is the Founder and CEO of Cadra, Inc. The organization focuses on security assessments and security management projects. With a career focused on information security assessments, developing policies and standards, and advising clients regarding their information security requirements, Lori brings a deep understanding of information security controls </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Lori Crooks is the Founder and CEO of Cadra, Inc. The organization focuses on security assessments and security management projects. With a career focused on information security assessments, developing policies and standards, and advising clients regarding their information security requirements, Lori brings a deep understanding of information security controls </p>]]>
      </content:encoded>
      <pubDate>Thu, 03 Apr 2025 06:22:26 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/f69a4f93/4ad81f15.mp3" length="72124450" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3002</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Lori Crooks is the Founder and CEO of Cadra, Inc. The organization focuses on security assessments and security management projects. With a career focused on information security assessments, developing policies and standards, and advising clients regarding their information security requirements, Lori brings a deep understanding of information security controls </p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://www.cadra.com/" img="https://img.transistorcdn.com/1SOXbAFNe4DcpXBQOHPjwicKPzPE-vW4RvGvlSfm85I/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZjRl/MmI1NTk1MDhjMzc2/YTA2N2NlMTI4OWMw/MGQ2My5qcGc.jpg">Lori Crooks</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/f69a4f93/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/f69a4f93/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/f69a4f93/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/f69a4f93/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/f69a4f93/transcription" type="text/html"/>
    </item>
    <item>
      <title>46. Cybersecurity Meets Financial Planning with Eric Brotman</title>
      <itunes:title>46. Cybersecurity Meets Financial Planning with Eric Brotman</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">db58e1a8-8b46-479d-9e80-1934d32da39f</guid>
      <link>https://unhacked.live/46</link>
      <description>
        <![CDATA[<p>Eric D. Brotman, CFP®, is the CEO of BFG Financial Advisors, President of Brotman Consulting Group, LLC, host of the Don’t Retire… Graduate! podcast, and author of the award-winning book, Don’t Retire… Graduate!</p><p><strong>Use code "unhacked" for a 25% discount on Eric's book: </strong><a href="https://dontretiregraduatebook.com/"><strong>https://dontretiregraduatebook.com/</strong></a><strong> </strong></p><p>In our pre-interview meeting, Eric said: “Very few things keep me up at night. Not stocks, not capital hill, but having my identity stolen and company infiltrated.” And he has a great reason for this. Several years ago his company was hit with a ransomware attack.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Eric D. Brotman, CFP®, is the CEO of BFG Financial Advisors, President of Brotman Consulting Group, LLC, host of the Don’t Retire… Graduate! podcast, and author of the award-winning book, Don’t Retire… Graduate!</p><p><strong>Use code "unhacked" for a 25% discount on Eric's book: </strong><a href="https://dontretiregraduatebook.com/"><strong>https://dontretiregraduatebook.com/</strong></a><strong> </strong></p><p>In our pre-interview meeting, Eric said: “Very few things keep me up at night. Not stocks, not capital hill, but having my identity stolen and company infiltrated.” And he has a great reason for this. Several years ago his company was hit with a ransomware attack.</p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Mar 2025 16:17:12 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/c98ef27e/4d8d484c.mp3" length="64453767" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2682</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Eric D. Brotman, CFP®, is the CEO of BFG Financial Advisors, President of Brotman Consulting Group, LLC, host of the Don’t Retire… Graduate! podcast, and author of the award-winning book, Don’t Retire… Graduate!</p><p><strong>Use code "unhacked" for a 25% discount on Eric's book: </strong><a href="https://dontretiregraduatebook.com/"><strong>https://dontretiregraduatebook.com/</strong></a><strong> </strong></p><p>In our pre-interview meeting, Eric said: “Very few things keep me up at night. Not stocks, not capital hill, but having my identity stolen and company infiltrated.” And he has a great reason for this. Several years ago his company was hit with a ransomware attack.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://www.dontretiregraduatebook.com/" img="https://img.transistorcdn.com/8pME0JtsHBt-jzMiSC2JRcNVfOaSeYQ3GjPI1Tojq7Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYzAz/ODMzODM5YTIzZjRm/NjJmOTBiZjdkNzgz/ZGJmYi5qcGc.jpg">Eric D. Brotman</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/c98ef27e/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/c98ef27e/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/c98ef27e/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/c98ef27e/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/c98ef27e/transcription" type="text/html"/>
    </item>
    <item>
      <title>45. How to Protect Your Business When Using 3rd Party Integrations</title>
      <itunes:title>45. How to Protect Your Business When Using 3rd Party Integrations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4af97d4e-237b-4197-9fc9-7fe0e3c8f887</guid>
      <link>https://unhacked.live/45</link>
      <description>
        <![CDATA[<p>We make a lot of assumptions in the world of tech and cybersecurity. The most common one I see is assuming that a vendor is properly protecting your data. And honestly, that feels like the only option since we can't really see behind the curtains. But what if I told you there is a way to verify that your vendors have the proper cybersecurity safeguards in place? Take a listen!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We make a lot of assumptions in the world of tech and cybersecurity. The most common one I see is assuming that a vendor is properly protecting your data. And honestly, that feels like the only option since we can't really see behind the curtains. But what if I told you there is a way to verify that your vendors have the proper cybersecurity safeguards in place? Take a listen!</p>]]>
      </content:encoded>
      <pubDate>Fri, 21 Mar 2025 13:30:51 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/9d188d12/cb0d342e.mp3" length="47991000" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1996</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>We make a lot of assumptions in the world of tech and cybersecurity. The most common one I see is assuming that a vendor is properly protecting your data. And honestly, that feels like the only option since we can't really see behind the curtains. But what if I told you there is a way to verify that your vendors have the proper cybersecurity safeguards in place? Take a listen!</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/9d188d12/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9d188d12/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9d188d12/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9d188d12/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/9d188d12/transcription" type="text/html"/>
    </item>
    <item>
      <title>44. How Will Tariffs Impact Cybersecurity Risks?</title>
      <itunes:title>44. How Will Tariffs Impact Cybersecurity Risks?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">88b1a85a-654b-4398-9cd1-986c7f52d40a</guid>
      <link>https://unhacked.live/44</link>
      <description>
        <![CDATA[<p>How will tariffs impact cybersecurity? As costs rise, we will be forced to make difficult decisions. Many will choose not to upgrade old technology which gives the bad guys a huge advantage. Here's what to do about it.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How will tariffs impact cybersecurity? As costs rise, we will be forced to make difficult decisions. Many will choose not to upgrade old technology which gives the bad guys a huge advantage. Here's what to do about it.</p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Mar 2025 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/09b05581/20db7e49.mp3" length="50489920" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2100</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How will tariffs impact cybersecurity? As costs rise, we will be forced to make difficult decisions. Many will choose not to upgrade old technology which gives the bad guys a huge advantage. Here's what to do about it.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/09b05581/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/09b05581/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/09b05581/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/09b05581/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/09b05581/transcription" type="text/html"/>
    </item>
    <item>
      <title>43. Locking Down AI with Alec Crawford</title>
      <itunes:title>43. Locking Down AI with Alec Crawford</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a4247f7d-b6c4-4db7-b3e9-d0bb55f98655</guid>
      <link>https://unhacked.live/43</link>
      <description>
        <![CDATA[<p>Last week we talked about how AI can improve processes and output. Today, we’re going to talk more about the security side of AI.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Last week we talked about how AI can improve processes and output. Today, we’re going to talk more about the security side of AI.</p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Mar 2025 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/db2190ab/1d2d3115.mp3" length="57235755" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2381</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Last week we talked about how AI can improve processes and output. Today, we’re going to talk more about the security side of AI.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://www.aicrisk.com/" img="https://img.transistorcdn.com/j1kIPF_2cQkfYmPkRHpzDuI0XxVz5tKZrt9v2trGWhY/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OWQ1/YWMzOTAzN2I4NWIw/MmFkZTA3NzNkNGNk/ZGZhNC5qcGc.jpg">Alec Crawford</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/db2190ab/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/db2190ab/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/db2190ab/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/db2190ab/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/db2190ab/transcription" type="text/html"/>
    </item>
    <item>
      <title>42. Th-AI Took Our Jobs! with Chase Friedman</title>
      <itunes:title>42. Th-AI Took Our Jobs! with Chase Friedman</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ad6b4974-b86e-4039-95d7-e46c6f00c0c9</guid>
      <link>https://unhacked.live/42</link>
      <description>
        <![CDATA[<p>Like all things in tech, AI is a tool that can be used for good or bad. Today we talk with Chase Friedman, managing partner of Alpine Anchor, about leveraging AI to improve processes, outputs, and profitability.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Like all things in tech, AI is a tool that can be used for good or bad. Today we talk with Chase Friedman, managing partner of Alpine Anchor, about leveraging AI to improve processes, outputs, and profitability.</p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Mar 2025 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/713136eb/6d08bf0c.mp3" length="67902512" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2826</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Like all things in tech, AI is a tool that can be used for good or bad. Today we talk with Chase Friedman, managing partner of Alpine Anchor, about leveraging AI to improve processes, outputs, and profitability.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://alpine-anchor.com/" img="https://img.transistorcdn.com/pG2Z4XoBACxvwZBXdfnemGxdka73ROFwIK_6YDNNrNo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYzg3/NTViODVlYWI3MWRl/YmRmMGQ5YTMzZDhl/ZTdjNy5qcGc.jpg">Chase Friedman</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/713136eb/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/713136eb/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/713136eb/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/713136eb/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/713136eb/transcription" type="text/html"/>
    </item>
    <item>
      <title>40. Ransomware Attacks QUADRUPLED in 2024 - and what to do about it</title>
      <itunes:title>40. Ransomware Attacks QUADRUPLED in 2024 - and what to do about it</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4a0c4bf9-6224-45e9-a13e-dcb0cc61447f</guid>
      <link>https://unhacked.live/40</link>
      <description>
        <![CDATA[<p>Compared to 2023, ransomware attacks increased 4x in 2024. Why? Because it's EASY! With RaaS (Ransomware as a Service), anyone can be a successful bad guy. On average, it only takes someone 74 minutes to pull off a cyberheist. No skills required. </p><p>This is the problem. Take a listen to learn the solution.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Compared to 2023, ransomware attacks increased 4x in 2024. Why? Because it's EASY! With RaaS (Ransomware as a Service), anyone can be a successful bad guy. On average, it only takes someone 74 minutes to pull off a cyberheist. No skills required. </p><p>This is the problem. Take a listen to learn the solution.</p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Feb 2025 06:00:00 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/3e7e3d32/b2e0e042.mp3" length="39579957" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1646</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Compared to 2023, ransomware attacks increased 4x in 2024. Why? Because it's EASY! With RaaS (Ransomware as a Service), anyone can be a successful bad guy. On average, it only takes someone 74 minutes to pull off a cyberheist. No skills required. </p><p>This is the problem. Take a listen to learn the solution.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/3e7e3d32/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3e7e3d32/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3e7e3d32/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3e7e3d32/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/3e7e3d32/transcription" type="text/html"/>
    </item>
    <item>
      <title>41. High-Stakes Divorces and Cybersecurity - with Jonathan Steele</title>
      <itunes:title>41. High-Stakes Divorces and Cybersecurity - with Jonathan Steele</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cc28c1ba-0bd8-4d64-a3a8-345e19f3bbb5</guid>
      <link>https://unhacked.live/41</link>
      <description>
        <![CDATA[<p>This week we talk with Jonathan Steele, a prominent high-stakes divorce attorney who doubles as a cybersecurity expert.</p><p>At Steele Fortress, Jonathan leverages his unique blend of legal and cybersecurity expertise to provide comprehensive cybersecurity and privacy consulting services. His deep understanding of both the legal and technical aspects of cybersecurity and privacy makes him a valuable asset to any organization looking to bolster their security posture and navigate the complex landscape of cybersecurity laws and regulations.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week we talk with Jonathan Steele, a prominent high-stakes divorce attorney who doubles as a cybersecurity expert.</p><p>At Steele Fortress, Jonathan leverages his unique blend of legal and cybersecurity expertise to provide comprehensive cybersecurity and privacy consulting services. His deep understanding of both the legal and technical aspects of cybersecurity and privacy makes him a valuable asset to any organization looking to bolster their security posture and navigate the complex landscape of cybersecurity laws and regulations.</p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Feb 2025 06:00:00 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/1108c326/5f05cac9.mp3" length="61571114" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2562</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This week we talk with Jonathan Steele, a prominent high-stakes divorce attorney who doubles as a cybersecurity expert.</p><p>At Steele Fortress, Jonathan leverages his unique blend of legal and cybersecurity expertise to provide comprehensive cybersecurity and privacy consulting services. His deep understanding of both the legal and technical aspects of cybersecurity and privacy makes him a valuable asset to any organization looking to bolster their security posture and navigate the complex landscape of cybersecurity laws and regulations.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://www.steelefamlaw.com/" img="https://img.transistorcdn.com/wUuVDDNdoKKWw7MGnsjDSGTh4Mbromu1W9DgyJUWLoo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lYmFh/ODUzNGExYTMwYmM1/NmU2NWUxMDU1ZjFl/NTAxYy5qcGc.jpg">Jonathan Steele</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/1108c326/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1108c326/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1108c326/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1108c326/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/1108c326/transcription" type="text/html"/>
    </item>
    <item>
      <title>39. Forget the Russians - The ATTORNEYS are Coming!</title>
      <itunes:title>39. Forget the Russians - The ATTORNEYS are Coming!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0fd42ae1-e15a-4ee7-838d-579585e32435</guid>
      <link>https://unhacked.live/39</link>
      <description>
        <![CDATA[<p>It's bad enough that cyber-thugs are coming for our businesses. And our bank accounts. But there's a new threat that is gaining traction: class-action lawsuits. But there's good news! A Plan of Action with Milestones (POAM for short) is your get-out-of-jail-free card. Listen up... and we'll break it down!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>It's bad enough that cyber-thugs are coming for our businesses. And our bank accounts. But there's a new threat that is gaining traction: class-action lawsuits. But there's good news! A Plan of Action with Milestones (POAM for short) is your get-out-of-jail-free card. Listen up... and we'll break it down!</p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Feb 2025 06:00:00 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/00b34c12/33e36841.mp3" length="59960450" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2495</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>It's bad enough that cyber-thugs are coming for our businesses. And our bank accounts. But there's a new threat that is gaining traction: class-action lawsuits. But there's good news! A Plan of Action with Milestones (POAM for short) is your get-out-of-jail-free card. Listen up... and we'll break it down!</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Guest" href="https://redrhinonetworks.com/get-in-touch/" img="https://img.transistorcdn.com/oo6PxxUwU0yGzUVLKUxGVpgMN44TYQ0mtcXD7EVagtA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zY2Qz/ZjRjMjNjYTcwZTI3/MjBmODg1NDc0NWZj/ZTI3NC5qcGc.jpg">Barinder Hans</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/00b34c12/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/00b34c12/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/00b34c12/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/00b34c12/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/00b34c12/transcription" type="text/html"/>
    </item>
    <item>
      <title>38. Compliance First - Protecting Your Empire with Tim Golden of Compliance Scorecard</title>
      <itunes:title>38. Compliance First - Protecting Your Empire with Tim Golden of Compliance Scorecard</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">051785f7-57f7-400b-af29-fc31e07a94b4</guid>
      <link>https://unhacked.live/38</link>
      <description>
        <![CDATA[<p>Tim Golden of Compliance Scorecard joins us to discuss the meaning and importance of measuring against an official security framework</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Tim Golden of Compliance Scorecard joins us to discuss the meaning and importance of measuring against an official security framework</p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Feb 2025 06:00:00 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/b75c34fa/fb9b92b2.mp3" length="87131313" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3627</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Tim Golden of Compliance Scorecard joins us to discuss the meaning and importance of measuring against an official security framework</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/b75c34fa/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b75c34fa/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b75c34fa/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b75c34fa/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/b75c34fa/transcription" type="text/html"/>
    </item>
    <item>
      <title>37. Why We Are Losing the Cyberwar - The Root Cause and New Solution with Christian Espinosa</title>
      <itunes:title>37. Why We Are Losing the Cyberwar - The Root Cause and New Solution with Christian Espinosa</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">22895583-982e-419d-b4b6-25020e81d8e3</guid>
      <link>https://unhacked.live/37</link>
      <description>
        <![CDATA[<p>As business owners and execs, we are responsible for EVERYTHING! While cybersecurity may not be your native language, it is critical to learn enough to make informed decisions. UnHacked is a great place to start!</p><p>Today we talk with Christian Espinosa about the cybersecurity basics, as well as his 7 Step Secure Methodology. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>As business owners and execs, we are responsible for EVERYTHING! While cybersecurity may not be your native language, it is critical to learn enough to make informed decisions. UnHacked is a great place to start!</p><p>Today we talk with Christian Espinosa about the cybersecurity basics, as well as his 7 Step Secure Methodology. </p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Jan 2025 06:00:00 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/0e234af5/cfac06e8.mp3" length="86285686" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3592</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>As business owners and execs, we are responsible for EVERYTHING! While cybersecurity may not be your native language, it is critical to learn enough to make informed decisions. UnHacked is a great place to start!</p><p>Today we talk with Christian Espinosa about the cybersecurity basics, as well as his 7 Step Secure Methodology. </p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Guest" href="https://christianespinosa.com/" img="https://img.transistorcdn.com/QUHnumuilrZ_D7IxF5ZTt2JXypWgSyOBd2601DzWmRU/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iOWYy/NDIyYWFjZmMyMGVj/MDdkZWI2MGJiMTgz/ODljYi5qcGc.jpg">Christian Espinosa</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/0e234af5/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/0e234af5/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/0e234af5/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/0e234af5/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/0e234af5/transcription" type="text/html"/>
    </item>
    <item>
      <title>36. Breaking Down a Doctor's Rant with Evgeniy Kharam</title>
      <itunes:title>36. Breaking Down a Doctor's Rant with Evgeniy Kharam</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1a825452-dbef-4d12-a656-4ea46297d97b</guid>
      <link>https://unhacked.live/36</link>
      <description>
        <![CDATA[<p>In today’s episode, we talk about a disgruntled doctor, his real/understandable problems, and [perhaps] a bigger problem with mindset; and as always, wrap it up with the formula to protect your business from Boris Grishenko. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In today’s episode, we talk about a disgruntled doctor, his real/understandable problems, and [perhaps] a bigger problem with mindset; and as always, wrap it up with the formula to protect your business from Boris Grishenko. </p>]]>
      </content:encoded>
      <pubDate>Tue, 14 Jan 2025 06:00:00 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/32a8f55c/7d7143f3.mp3" length="81165356" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3378</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In today’s episode, we talk about a disgruntled doctor, his real/understandable problems, and [perhaps] a bigger problem with mindset; and as always, wrap it up with the formula to protect your business from Boris Grishenko. </p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Guest" href="https://www.softskillstech.ca/" img="https://img.transistorcdn.com/KXq-r5OyjvTHt807_lehPlBa9YnJqouIi7O9yrHYwCM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZjA4/ODFkNGIzMjk2Mzc0/YmJlZGFiOGFkYzJj/MjlkOS5qcGc.jpg">Evgeniy Kharam</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/32a8f55c/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/32a8f55c/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/32a8f55c/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/32a8f55c/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/32a8f55c/transcription" type="text/html"/>
    </item>
    <item>
      <title>35. 6 Signs Your IT Company is Leaving You Exposed</title>
      <itunes:title>35. 6 Signs Your IT Company is Leaving You Exposed</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">40aa5d43-fbed-4552-b528-18188cd568b9</guid>
      <link>https://unhacked.live/35</link>
      <description>
        <![CDATA[<p>How do you REALLY know that your IT company has you properly protected? How do you know you are getting what you pay for? This is one decision where you cannot afford to be wrong.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How do you REALLY know that your IT company has you properly protected? How do you know you are getting what you pay for? This is one decision where you cannot afford to be wrong.</p>]]>
      </content:encoded>
      <pubDate>Tue, 26 Nov 2024 06:00:00 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/1d93d37c/35497491.mp3" length="65453687" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2724</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How do you REALLY know that your IT company has you properly protected? How do you know you are getting what you pay for? This is one decision where you cannot afford to be wrong.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/1d93d37c/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1d93d37c/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1d93d37c/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1d93d37c/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/1d93d37c/transcription" type="text/html"/>
    </item>
    <item>
      <title>34. Before the Breach: A Business Owner’s Hard Lesson in Cyber Readiness with Robert Cioffi</title>
      <itunes:title>34. Before the Breach: A Business Owner’s Hard Lesson in Cyber Readiness with Robert Cioffi</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">05cf54e2-eb89-41e0-8f84-9800c3490c85</guid>
      <link>https://unhacked.live/34</link>
      <description>
        <![CDATA[<p>Most business owners think a major cyber incident won’t happen to them—until it does.</p><p>In this powerful episode of <em>UnHacked</em>, Robert Cioffi shares the real story of what happened when his systems went down and his company faced every leader’s worst fear. This isn’t about theory—it’s about resilience, company culture, and the choices that define you in a crisis.</p><p><br>We also discuss:</p><ul><li>What to do when you’ve followed all the rules and still get hit</li><li>How company culture becomes your greatest asset during chaos</li><li>Why frameworks (like CIS, NIST, HIPAA, CMMC) are your foundation—but not your guarantee</li></ul><p>If you’re ready to think beyond prevention and build true cyber readiness, this episode is for you.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Most business owners think a major cyber incident won’t happen to them—until it does.</p><p>In this powerful episode of <em>UnHacked</em>, Robert Cioffi shares the real story of what happened when his systems went down and his company faced every leader’s worst fear. This isn’t about theory—it’s about resilience, company culture, and the choices that define you in a crisis.</p><p><br>We also discuss:</p><ul><li>What to do when you’ve followed all the rules and still get hit</li><li>How company culture becomes your greatest asset during chaos</li><li>Why frameworks (like CIS, NIST, HIPAA, CMMC) are your foundation—but not your guarantee</li></ul><p>If you’re ready to think beyond prevention and build true cyber readiness, this episode is for you.</p>]]>
      </content:encoded>
      <pubDate>Tue, 29 Oct 2024 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/28f76ed5/0422816f.mp3" length="126099448" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>5251</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Most business owners think a major cyber incident won’t happen to them—until it does.</p><p>In this powerful episode of <em>UnHacked</em>, Robert Cioffi shares the real story of what happened when his systems went down and his company faced every leader’s worst fear. This isn’t about theory—it’s about resilience, company culture, and the choices that define you in a crisis.</p><p><br>We also discuss:</p><ul><li>What to do when you’ve followed all the rules and still get hit</li><li>How company culture becomes your greatest asset during chaos</li><li>Why frameworks (like CIS, NIST, HIPAA, CMMC) are your foundation—but not your guarantee</li></ul><p>If you’re ready to think beyond prevention and build true cyber readiness, this episode is for you.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Guest" href="https://www.progressivecomputing.com/our-team/" img="https://img.transistorcdn.com/NMap1WJBSt8CH-aRty3iU_uQWNHqXWDD10bfgnDubNM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YTQ2/MWYwNWNjMGJiY2Uw/MDhjMTU4OGE1ODFm/NzA1OS5qcGc.jpg">Robert Cioffi</podcast:person>
      <podcast:person role="Guest" href="https://redrhinonetworks.com/get-in-touch/" img="https://img.transistorcdn.com/oo6PxxUwU0yGzUVLKUxGVpgMN44TYQ0mtcXD7EVagtA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zY2Qz/ZjRjMjNjYTcwZTI3/MjBmODg1NDc0NWZj/ZTI3NC5qcGc.jpg">Barinder Hans</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/28f76ed5/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/28f76ed5/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/28f76ed5/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/28f76ed5/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/28f76ed5/transcription" type="text/html"/>
    </item>
    <item>
      <title>33. The Formula - Part 3: Protect Your People</title>
      <itunes:title>33. The Formula - Part 3: Protect Your People</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5b917745-6fc5-4560-9801-80455771ffee</guid>
      <link>https://unhacked.live/33</link>
      <description>
        <![CDATA[<p>In his book "Future Crimes", Marc Goodman said something that has been burned in my brain for years:<br>“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. Cybersecurity is a people problem, not just a technical one.”</p><p>What's the #1 threat to your organization? IT'S US! WE ARE THE PROBLEM!</p><p>The truth is, we can follow every standard, control, and best practice under the sun, but all it takes is a careless or uninformed click or tap and it's game over. So, if people are the problem, what is the solution?</p><ul><li>Proper tools</li><li>Education</li><li>Policies and procedures</li><li>Culture</li></ul><p>While this might be part 3 of our miniseries, treat yourself to an invaluable discussion of the #1 best thing you can possibly do to protect your business: take care of your people!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In his book "Future Crimes", Marc Goodman said something that has been burned in my brain for years:<br>“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. Cybersecurity is a people problem, not just a technical one.”</p><p>What's the #1 threat to your organization? IT'S US! WE ARE THE PROBLEM!</p><p>The truth is, we can follow every standard, control, and best practice under the sun, but all it takes is a careless or uninformed click or tap and it's game over. So, if people are the problem, what is the solution?</p><ul><li>Proper tools</li><li>Education</li><li>Policies and procedures</li><li>Culture</li></ul><p>While this might be part 3 of our miniseries, treat yourself to an invaluable discussion of the #1 best thing you can possibly do to protect your business: take care of your people!</p>]]>
      </content:encoded>
      <pubDate>Tue, 22 Oct 2024 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/b6aa8a66/2c7d0b48.mp3" length="74180802" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3087</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In his book "Future Crimes", Marc Goodman said something that has been burned in my brain for years:<br>“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. Cybersecurity is a people problem, not just a technical one.”</p><p>What's the #1 threat to your organization? IT'S US! WE ARE THE PROBLEM!</p><p>The truth is, we can follow every standard, control, and best practice under the sun, but all it takes is a careless or uninformed click or tap and it's game over. So, if people are the problem, what is the solution?</p><ul><li>Proper tools</li><li>Education</li><li>Policies and procedures</li><li>Culture</li></ul><p>While this might be part 3 of our miniseries, treat yourself to an invaluable discussion of the #1 best thing you can possibly do to protect your business: take care of your people!</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/b6aa8a66/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b6aa8a66/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b6aa8a66/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b6aa8a66/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/b6aa8a66/transcription" type="text/html"/>
    </item>
    <item>
      <title>32. The Formula - Part 2: Protect Your Data</title>
      <itunes:title>32. The Formula - Part 2: Protect Your Data</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5c352b89-fb73-46cc-bac0-55f692e0dc10</guid>
      <link>https://unhacked.live/32</link>
      <description>
        <![CDATA[<p>Data backup used to be simple: a tape drive on the server and you're good to go! Now data lives everywhere. Taming this beast can be a challenge to say the least. Here's a quick-start guide:</p><ol><li>Go through each department and major function in your business (BizDev, Operations, Finance, HR, etc.)</li><li>Identify the technology used for each</li><li>Make a note of where the associated data is stored</li><li>Create a plan for backing it up and testing the process</li></ol><p>Most important: review this process regularly because things change!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Data backup used to be simple: a tape drive on the server and you're good to go! Now data lives everywhere. Taming this beast can be a challenge to say the least. Here's a quick-start guide:</p><ol><li>Go through each department and major function in your business (BizDev, Operations, Finance, HR, etc.)</li><li>Identify the technology used for each</li><li>Make a note of where the associated data is stored</li><li>Create a plan for backing it up and testing the process</li></ol><p>Most important: review this process regularly because things change!</p>]]>
      </content:encoded>
      <pubDate>Tue, 15 Oct 2024 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/3de7e4de/651b4dc7.mp3" length="58287272" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2425</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Data backup used to be simple: a tape drive on the server and you're good to go! Now data lives everywhere. Taming this beast can be a challenge to say the least. Here's a quick-start guide:</p><ol><li>Go through each department and major function in your business (BizDev, Operations, Finance, HR, etc.)</li><li>Identify the technology used for each</li><li>Make a note of where the associated data is stored</li><li>Create a plan for backing it up and testing the process</li></ol><p>Most important: review this process regularly because things change!</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Guest" href="https://redrhinonetworks.com/get-in-touch/" img="https://img.transistorcdn.com/oo6PxxUwU0yGzUVLKUxGVpgMN44TYQ0mtcXD7EVagtA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zY2Qz/ZjRjMjNjYTcwZTI3/MjBmODg1NDc0NWZj/ZTI3NC5qcGc.jpg">Barinder Hans</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/3de7e4de/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3de7e4de/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3de7e4de/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3de7e4de/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/3de7e4de/transcription" type="text/html"/>
    </item>
    <item>
      <title>31. The Formula - Part 1: Protect Your Technology</title>
      <itunes:title>31. The Formula - Part 1: Protect Your Technology</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3d31d5f9-5335-420c-9265-2b818d7edbc4</guid>
      <link>https://unhacked.live/31</link>
      <description>
        <![CDATA[<p>For Cybersecurity Awareness Month, we decided to do something special. So over the next 3 weeks we will deep-dive on each of these areas and give you a list of what needs to be done, as well as how you can verify that it’s implemented. <strong>This week: Protect Your Technology<br></strong><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>For Cybersecurity Awareness Month, we decided to do something special. So over the next 3 weeks we will deep-dive on each of these areas and give you a list of what needs to be done, as well as how you can verify that it’s implemented. <strong>This week: Protect Your Technology<br></strong><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Oct 2024 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/6140a57c/1087015c.mp3" length="78488512" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3267</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>For Cybersecurity Awareness Month, we decided to do something special. So over the next 3 weeks we will deep-dive on each of these areas and give you a list of what needs to be done, as well as how you can verify that it’s implemented. <strong>This week: Protect Your Technology<br></strong><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Guest" href="https://redrhinonetworks.com/get-in-touch/" img="https://img.transistorcdn.com/oo6PxxUwU0yGzUVLKUxGVpgMN44TYQ0mtcXD7EVagtA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zY2Qz/ZjRjMjNjYTcwZTI3/MjBmODg1NDc0NWZj/ZTI3NC5qcGc.jpg">Barinder Hans</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/6140a57c/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/6140a57c/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/6140a57c/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/6140a57c/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/6140a57c/transcription" type="text/html"/>
    </item>
    <item>
      <title>30. What Exactly Is The Dark Web, Anyway?</title>
      <itunes:title>30. What Exactly Is The Dark Web, Anyway?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">08d90d93-b2b2-428a-bf57-29c0092e5495</guid>
      <link>https://unhacked.live/30</link>
      <description>
        <![CDATA[<p>In today’s episode, we are going to answer the burning question I know you all have: “What in the hell is the Dark Web?” Spoiler alert, we talk about the tame stuff on here. It is a <em>vile</em> place to hang out. That said, our breach breakdown of the week is 23andMe. This is old news, but the proposed settlement is happening now. … Then, as always, we’ll wrap it up with the formula to protect your business from Boris Grishenko. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In today’s episode, we are going to answer the burning question I know you all have: “What in the hell is the Dark Web?” Spoiler alert, we talk about the tame stuff on here. It is a <em>vile</em> place to hang out. That said, our breach breakdown of the week is 23andMe. This is old news, but the proposed settlement is happening now. … Then, as always, we’ll wrap it up with the formula to protect your business from Boris Grishenko. </p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Oct 2024 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/8cf87560/b076b7b4.mp3" length="64831091" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2698</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In today’s episode, we are going to answer the burning question I know you all have: “What in the hell is the Dark Web?” Spoiler alert, we talk about the tame stuff on here. It is a <em>vile</em> place to hang out. That said, our breach breakdown of the week is 23andMe. This is old news, but the proposed settlement is happening now. … Then, as always, we’ll wrap it up with the formula to protect your business from Boris Grishenko. </p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/8cf87560/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8cf87560/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8cf87560/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8cf87560/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/8cf87560/transcription" type="text/html"/>
    </item>
    <item>
      <title>29. Can You Be Sued for NOT Paying the Ransom?</title>
      <itunes:title>29. Can You Be Sued for NOT Paying the Ransom?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">459fc976-6ab8-4811-b13f-c1aec518f00d</guid>
      <link>https://unhacked.live/29</link>
      <description>
        <![CDATA[<p>In today’s episode, we are going to talk about how to spot a phishing email (and how to get your whole company to do the same), dive into a $5 Million lawsuit for not paying the ransom, and as always, wrap it up with the formula to protect your business from Boris Grishenko.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In today’s episode, we are going to talk about how to spot a phishing email (and how to get your whole company to do the same), dive into a $5 Million lawsuit for not paying the ransom, and as always, wrap it up with the formula to protect your business from Boris Grishenko.</p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Sep 2024 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/dc0c28eb/1b0c6513.mp3" length="67614246" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2814</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In today’s episode, we are going to talk about how to spot a phishing email (and how to get your whole company to do the same), dive into a $5 Million lawsuit for not paying the ransom, and as always, wrap it up with the formula to protect your business from Boris Grishenko.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/dc0c28eb/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/dc0c28eb/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/dc0c28eb/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/dc0c28eb/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/dc0c28eb/transcription" type="text/html"/>
    </item>
    <item>
      <title>28. 4 Steps to Securing ALL of Your Critical Data</title>
      <itunes:title>28. 4 Steps to Securing ALL of Your Critical Data</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">170f6c08-2eae-4b3b-a444-f1e1be9b4f51</guid>
      <link>https://unhacked.live/28</link>
      <description>
        <![CDATA[<p>In today’s episode, we are going to talk about how to make sure ALL of your critical data is backed up, we’ll break down 2 specific security events that sent over a quarter million dollars up in smoke, and as always, wrap it up with the formula to protect your business from the likes of Boris Grishenko. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In today’s episode, we are going to talk about how to make sure ALL of your critical data is backed up, we’ll break down 2 specific security events that sent over a quarter million dollars up in smoke, and as always, wrap it up with the formula to protect your business from the likes of Boris Grishenko. </p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Sep 2024 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/e3824d6b/f4649235.mp3" length="78452080" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3266</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In today’s episode, we are going to talk about how to make sure ALL of your critical data is backed up, we’ll break down 2 specific security events that sent over a quarter million dollars up in smoke, and as always, wrap it up with the formula to protect your business from the likes of Boris Grishenko. </p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/e3824d6b/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e3824d6b/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e3824d6b/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e3824d6b/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/e3824d6b/transcription" type="text/html"/>
    </item>
    <item>
      <title>27. Joseph Brunsman - How to Make Sure Your Cyber Insurance Policy Pays Out in a Disaster</title>
      <itunes:title>27. Joseph Brunsman - How to Make Sure Your Cyber Insurance Policy Pays Out in a Disaster</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f97265f3-a64b-4398-a1f1-bf6f970f4570</guid>
      <link>https://unhacked.live/27</link>
      <description>
        <![CDATA[<p>In this week's episode, we help business owners get proper cyber security insurance coverage, and make sure it’s paid in an emergency. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this week's episode, we help business owners get proper cyber security insurance coverage, and make sure it’s paid in an emergency. </p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Sep 2024 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/4cb4606e/1df5059b.mp3" length="88280488" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3675</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this week's episode, we help business owners get proper cyber security insurance coverage, and make sure it’s paid in an emergency. </p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Guest" href="https://www.thebrunsgroup.com/" img="https://img.transistorcdn.com/lulMAXL4XJ27Vzw-CXQzPFpCWeHXkmR0jqGNkyD_p38/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zZmQ0/MTg5NDVhMTMzMWE1/YTFhYTllYjlmMGE5/MzU2MC53ZWJw.jpg">Joseph Brunsman</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/4cb4606e/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4cb4606e/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4cb4606e/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4cb4606e/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/4cb4606e/transcription" type="text/html"/>
    </item>
    <item>
      <title>26. Pop Up Alerts Can Be Good Or Bad – How Do We Know The Difference?</title>
      <itunes:title>26. Pop Up Alerts Can Be Good Or Bad – How Do We Know The Difference?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4e949b4c-0ba6-437e-8bf0-7b1515fabc1d</guid>
      <link>https://unhacked.live/26</link>
      <description>
        <![CDATA[<p>In this episode, we talk about how to know the difference between good and bad popup alerts, break down the largest data leak ever, and as always, wrap it up with the formula to protect your business from Russian hackers.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we talk about how to know the difference between good and bad popup alerts, break down the largest data leak ever, and as always, wrap it up with the formula to protect your business from Russian hackers.</p>]]>
      </content:encoded>
      <pubDate>Tue, 20 Aug 2024 07:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/d5a24afe/c4b50842.mp3" length="57576821" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2396</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, we talk about how to know the difference between good and bad popup alerts, break down the largest data leak ever, and as always, wrap it up with the formula to protect your business from Russian hackers.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/d5a24afe/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d5a24afe/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d5a24afe/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d5a24afe/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/d5a24afe/transcription" type="text/html"/>
    </item>
    <item>
      <title>25. Working From Home: Security, Productivity, and Culture</title>
      <itunes:title>25. Working From Home: Security, Productivity, and Culture</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9b32cac5-ea02-4040-b4eb-ccd26ed95682</guid>
      <link>https://unhacked.live/25</link>
      <description>
        <![CDATA[<p>In prepping for this episode, I ran a quick survey of those who work from home. There was a consistent theme: the flexibility is nice but the loneliness is real. Here's how to help your team deal with the challenges while ensuring security and productivity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In prepping for this episode, I ran a quick survey of those who work from home. There was a consistent theme: the flexibility is nice but the loneliness is real. Here's how to help your team deal with the challenges while ensuring security and productivity.</p>]]>
      </content:encoded>
      <pubDate>Tue, 13 Aug 2024 07:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/ededf8e1/f3a16d20.mp3" length="77740834" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3234</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In prepping for this episode, I ran a quick survey of those who work from home. There was a consistent theme: the flexibility is nice but the loneliness is real. Here's how to help your team deal with the challenges while ensuring security and productivity.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/ededf8e1/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ededf8e1/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ededf8e1/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ededf8e1/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/ededf8e1/transcription" type="text/html"/>
    </item>
    <item>
      <title>24. 6 Steps to Protect Against Bank Fraud</title>
      <itunes:title>24. 6 Steps to Protect Against Bank Fraud</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">66e05d46-e40d-4560-847d-ed2b647d84be</guid>
      <link>https://unhacked.live/24</link>
      <description>
        <![CDATA[<p>This week we discuss bank fraud and lessons learned from the CrowdStrike debacle.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week we discuss bank fraud and lessons learned from the CrowdStrike debacle.  </p>]]>
      </content:encoded>
      <pubDate>Tue, 06 Aug 2024 07:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/68e713a7/efb3b204.mp3" length="54310012" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2260</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This week we discuss bank fraud and lessons learned from the CrowdStrike debacle.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/68e713a7/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/68e713a7/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/68e713a7/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/68e713a7/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/68e713a7/transcription" type="text/html"/>
    </item>
    <item>
      <title>23. CDK is Breached, Auto Industry Crippled, and What it Means for Your Company</title>
      <itunes:title>23. CDK is Breached, Auto Industry Crippled, and What it Means for Your Company</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c3e292bc-a1a8-4cf7-96ef-72172cba0c96</guid>
      <link>https://unhacked.live/23</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Tue, 23 Jul 2024 08:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/38a7cced/bb0031cc.mp3" length="54027314" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2248</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/38a7cced/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/38a7cced/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/38a7cced/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/38a7cced/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/38a7cced/transcription" type="text/html"/>
    </item>
    <item>
      <title>22. Pros and Cons of Moving to the Cloud</title>
      <itunes:title>22. Pros and Cons of Moving to the Cloud</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c4824532-31f9-41a5-9cfa-b977b1ca7d22</guid>
      <link>https://unhacked.live/22</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Thu, 18 Jul 2024 18:36:19 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/bc34f7c5/36f1f8b9.mp3" length="81717013" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3402</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/bc34f7c5/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/bc34f7c5/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/bc34f7c5/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/bc34f7c5/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/bc34f7c5/transcription" type="text/html"/>
    </item>
    <item>
      <title>21. Cybersecurity for the Road Warrior</title>
      <itunes:title>21. Cybersecurity for the Road Warrior</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5c0fdf4b-b6f0-4743-b448-ba75b60322e5</guid>
      <link>https://unhacked.live/21</link>
      <description>
        <![CDATA[<p>What do Mormon Crickets have to do with cybersecurity? TBD. Meanwhile, here are some crucial protections you need to have in place before you leave for that next business trip or family vacation.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What do Mormon Crickets have to do with cybersecurity? TBD. Meanwhile, here are some crucial protections you need to have in place before you leave for that next business trip or family vacation.</p>]]>
      </content:encoded>
      <pubDate>Fri, 14 Jun 2024 15:20:17 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/24a58e43/83891a67.mp3" length="75115252" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3126</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What do Mormon Crickets have to do with cybersecurity? TBD. Meanwhile, here are some crucial protections you need to have in place before you leave for that next business trip or family vacation.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/24a58e43/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/24a58e43/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/24a58e43/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/24a58e43/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/24a58e43/transcription" type="text/html"/>
    </item>
    <item>
      <title>20. Cybersecurity and Productivity on a Budget</title>
      <itunes:title>20. Cybersecurity and Productivity on a Budget</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f4486edb-597f-468e-a29d-29e8e8d1f969</guid>
      <link>https://unhacked.live/20</link>
      <description>
        <![CDATA[<p>Unconventional Tricks for Maximizing Tech ROI</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Unconventional Tricks for Maximizing Tech ROI</p>]]>
      </content:encoded>
      <pubDate>Fri, 07 Jun 2024 13:42:52 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/242752d4/5c970508.mp3" length="77142890" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3211</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Unconventional Tricks for Maximizing Tech ROI</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/242752d4/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/242752d4/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/242752d4/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/242752d4/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/242752d4/transcription" type="text/html"/>
    </item>
    <item>
      <title>19. The Benefits and Risks of Using AI in Your Business</title>
      <itunes:title>19. The Benefits and Risks of Using AI in Your Business</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5fb002bd-e588-4ae2-8339-d6e308c18511</guid>
      <link>https://unhacked.live/19</link>
      <description>
        <![CDATA[<p>Leveraging AI in your small business may be the most important thing you do. But make these mistakes, and it may be game-over.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Leveraging AI in your small business may be the most important thing you do. But make these mistakes, and it may be game-over.</p>]]>
      </content:encoded>
      <pubDate>Fri, 31 May 2024 16:29:11 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/4f2a05f5/be76acf5.mp3" length="101244691" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>4216</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Leveraging AI in your small business may be the most important thing you do. But make these mistakes, and it may be game-over.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Guest" href="https://redrhinonetworks.com/get-in-touch/" img="https://img.transistorcdn.com/oo6PxxUwU0yGzUVLKUxGVpgMN44TYQ0mtcXD7EVagtA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zY2Qz/ZjRjMjNjYTcwZTI3/MjBmODg1NDc0NWZj/ZTI3NC5qcGc.jpg">Barinder Hans</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/4f2a05f5/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4f2a05f5/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4f2a05f5/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4f2a05f5/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/4f2a05f5/transcription" type="text/html"/>
    </item>
    <item>
      <title>18. Cloud Security: 4 Things Business Owners Need to Know</title>
      <itunes:title>18. Cloud Security: 4 Things Business Owners Need to Know</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6ef936be-7b00-44b6-ab85-3c76d41ab8d2</guid>
      <link>https://unhacked.live/18</link>
      <description>
        <![CDATA[<p>I can't tell you how many times I've heard, "I've moved to the cloud, now I'm safe!" Nothing could be farther from the truth. In fact, a recent study of 600 organizations found that 95% had suffered some form of a cloud-related breach. We have to stop this! Listen to Episode 18 to find out how.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>I can't tell you how many times I've heard, "I've moved to the cloud, now I'm safe!" Nothing could be farther from the truth. In fact, a recent study of 600 organizations found that 95% had suffered some form of a cloud-related breach. We have to stop this! Listen to Episode 18 to find out how.</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 May 2024 14:01:08 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/6d3d512d/f2db985b.mp3" length="65344894" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2720</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>I can't tell you how many times I've heard, "I've moved to the cloud, now I'm safe!" Nothing could be farther from the truth. In fact, a recent study of 600 organizations found that 95% had suffered some form of a cloud-related breach. We have to stop this! Listen to Episode 18 to find out how.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/6d3d512d/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/6d3d512d/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/6d3d512d/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/6d3d512d/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/6d3d512d/transcription" type="text/html"/>
    </item>
    <item>
      <title>17. But... What If I DO Get Hacked?</title>
      <itunes:title>17. But... What If I DO Get Hacked?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">20e9ea7f-d630-433e-961e-b98560fe0b44</guid>
      <link>https://unhacked.live/17</link>
      <description>
        <![CDATA[<p>I like to say that once you've been hit, you can never get UnHacked. Well, let's take a look at the worst-case scenario and create a plan. Just in case.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>I like to say that once you've been hit, you can never get UnHacked. Well, let's take a look at the worst-case scenario and create a plan. Just in case.</p>]]>
      </content:encoded>
      <pubDate>Fri, 03 May 2024 16:07:08 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/f572ec27/f39713ff.mp3" length="56390497" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2347</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>I like to say that once you've been hit, you can never get UnHacked. Well, let's take a look at the worst-case scenario and create a plan. Just in case.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:person role="Guest" href="https://redrhinonetworks.com/get-in-touch/" img="https://img.transistorcdn.com/oo6PxxUwU0yGzUVLKUxGVpgMN44TYQ0mtcXD7EVagtA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zY2Qz/ZjRjMjNjYTcwZTI3/MjBmODg1NDc0NWZj/ZTI3NC5qcGc.jpg">Barinder Hans</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/f572ec27/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/f572ec27/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/f572ec27/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/f572ec27/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/f572ec27/transcription" type="text/html"/>
    </item>
    <item>
      <title>16. A Security-Minded Culture is Your Best Defense in the War on Cyber Crime</title>
      <itunes:title>16. A Security-Minded Culture is Your Best Defense in the War on Cyber Crime</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5f999982-d386-474d-bf0a-393fc5cf59a6</guid>
      <link>https://unhacked.live/16</link>
      <description>
        <![CDATA[<p>In this episode, the hosts discuss the importance of company culture in cybersecurity. They emphasize the need for businesses to prioritize cybersecurity and create a culture that values and promotes security practices. They share stories and examples that highlight the consequences of neglecting cybersecurity and the benefits of implementing a strong security culture. The hosts stress the importance of ongoing training and education for employees, as well as the need for leadership to set the tone and lead by example. They also discuss the financial implications of a breach and the relatively low cost of investing in cybersecurity compared to the potential losses from a breach.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, the hosts discuss the importance of company culture in cybersecurity. They emphasize the need for businesses to prioritize cybersecurity and create a culture that values and promotes security practices. They share stories and examples that highlight the consequences of neglecting cybersecurity and the benefits of implementing a strong security culture. The hosts stress the importance of ongoing training and education for employees, as well as the need for leadership to set the tone and lead by example. They also discuss the financial implications of a breach and the relatively low cost of investing in cybersecurity compared to the potential losses from a breach.</p>]]>
      </content:encoded>
      <pubDate>Thu, 25 Apr 2024 17:13:26 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/fc5abfc0/76c8e715.mp3" length="47249072" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1966</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, the hosts discuss the importance of company culture in cybersecurity. They emphasize the need for businesses to prioritize cybersecurity and create a culture that values and promotes security practices. They share stories and examples that highlight the consequences of neglecting cybersecurity and the benefits of implementing a strong security culture. The hosts stress the importance of ongoing training and education for employees, as well as the need for leadership to set the tone and lead by example. They also discuss the financial implications of a breach and the relatively low cost of investing in cybersecurity compared to the potential losses from a breach.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/fc5abfc0/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/fc5abfc0/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/fc5abfc0/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/fc5abfc0/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/fc5abfc0/transcription" type="text/html"/>
    </item>
    <item>
      <title>15. The War Room - Surviving Cyber Attacks</title>
      <itunes:title>15. The War Room - Surviving Cyber Attacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">abe2e5e6-79c5-4295-a0e7-a4eef8ace76e</guid>
      <link>https://unhacked.live/15</link>
      <description>
        <![CDATA[<p>In a very literal sense, without the proper formula for cyber security, your business is likely to suffer an attack from which you may never recover. This episode could save the life of your business. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In a very literal sense, without the proper formula for cyber security, your business is likely to suffer an attack from which you may never recover. This episode could save the life of your business. </p>]]>
      </content:encoded>
      <pubDate>Fri, 12 Apr 2024 17:11:04 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/f2d65f31/63473db8.mp3" length="122225965" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>5090</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In a very literal sense, without the proper formula for cyber security, your business is likely to suffer an attack from which you may never recover. This episode could save the life of your business. </p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/f2d65f31/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/f2d65f31/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/f2d65f31/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/f2d65f31/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/f2d65f31/transcription" type="text/html"/>
    </item>
    <item>
      <title>14. Internet of Things (IoT) - Is Your Fridge a Member of the Russian Mafia?</title>
      <itunes:title>14. Internet of Things (IoT) - Is Your Fridge a Member of the Russian Mafia?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f1912bab-c8af-4521-ac54-138a6e123fcf</guid>
      <link>https://unhacked.live/14</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Thu, 28 Mar 2024 16:24:43 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/64c08dc8/9f2bc1d4.mp3" length="89308939" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3718</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/64c08dc8/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/64c08dc8/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/64c08dc8/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/64c08dc8/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/64c08dc8/transcription" type="text/html"/>
    </item>
    <item>
      <title>13. Passwords Are a Huge PITA! Let's Fix That</title>
      <itunes:title>13. Passwords Are a Huge PITA! Let's Fix That</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">16f0d2ed-3646-423e-b2f7-8021a73d67f6</guid>
      <link>https://unhacked.live/13</link>
      <description>
        <![CDATA[<p>I like to say, "If cybersecurity protections aren't a giant pain in the ass, you're probably not doing it right." Passwords come to mind. Super long, super complex, never use the same one twice, and change it every 30 - 90 days. That's a pain in the ass right there! </p><p>But... Here's why it's important and how to keep it simple (well, simple-ish).</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>I like to say, "If cybersecurity protections aren't a giant pain in the ass, you're probably not doing it right." Passwords come to mind. Super long, super complex, never use the same one twice, and change it every 30 - 90 days. That's a pain in the ass right there! </p><p>But... Here's why it's important and how to keep it simple (well, simple-ish).</p>]]>
      </content:encoded>
      <pubDate>Thu, 21 Mar 2024 15:58:58 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/14ca2202/73bb82f8.mp3" length="78136608" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3253</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>I like to say, "If cybersecurity protections aren't a giant pain in the ass, you're probably not doing it right." Passwords come to mind. Super long, super complex, never use the same one twice, and change it every 30 - 90 days. That's a pain in the ass right there! </p><p>But... Here's why it's important and how to keep it simple (well, simple-ish).</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/14ca2202/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/14ca2202/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/14ca2202/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/14ca2202/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/14ca2202/transcription" type="text/html"/>
    </item>
    <item>
      <title>12. Keystroke Loggers: Is Your Janitor The Problem?</title>
      <itunes:title>12. Keystroke Loggers: Is Your Janitor The Problem?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e534df8a-55c4-404d-90be-77c0129fbf25</guid>
      <link>https://unhacked.live/12</link>
      <description>
        <![CDATA[<p>Your janitor has keys to your office and is expected to enter the building when nobody's home. What if they were paid to plant spy equipment on your computers? True story! How do you protect against that?!?! Well... we'll tell you exactly how!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Your janitor has keys to your office and is expected to enter the building when nobody's home. What if they were paid to plant spy equipment on your computers? True story! How do you protect against that?!?! Well... we'll tell you exactly how!</p>]]>
      </content:encoded>
      <pubDate>Mon, 04 Mar 2024 17:11:39 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/e67d8def/605e35c4.mp3" length="73895005" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3076</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Your janitor has keys to your office and is expected to enter the building when nobody's home. What if they were paid to plant spy equipment on your computers? True story! How do you protect against that?!?! Well... we'll tell you exactly how!</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/e67d8def/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e67d8def/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e67d8def/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e67d8def/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/e67d8def/transcription" type="text/html"/>
    </item>
    <item>
      <title>11. Make It Happen To Somebody Else</title>
      <itunes:title>11. Make It Happen To Somebody Else</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c11846ac-642e-4f7e-81da-42ad1cd315c0</guid>
      <link>https://unhacked.live/11</link>
      <description>
        <![CDATA[<p>The sad reality of cybercrime (and crime in general) is that there will always be criminals. Like I was taught when I worked as an armed guard for an armored car company: our goal is not to eradicate crime, our goal is simply to make it happen to somebody else. Cybercriminals WILL steal money. The question is: will it be YOU? Don't be low hanging fruit. Listen to this episode as we teach you how to "Make It Happen To Somebody Else".</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The sad reality of cybercrime (and crime in general) is that there will always be criminals. Like I was taught when I worked as an armed guard for an armored car company: our goal is not to eradicate crime, our goal is simply to make it happen to somebody else. Cybercriminals WILL steal money. The question is: will it be YOU? Don't be low hanging fruit. Listen to this episode as we teach you how to "Make It Happen To Somebody Else".</p>]]>
      </content:encoded>
      <pubDate>Mon, 19 Feb 2024 11:16:35 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/0660192e/47c80847.mp3" length="63992111" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2663</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The sad reality of cybercrime (and crime in general) is that there will always be criminals. Like I was taught when I worked as an armed guard for an armored car company: our goal is not to eradicate crime, our goal is simply to make it happen to somebody else. Cybercriminals WILL steal money. The question is: will it be YOU? Don't be low hanging fruit. Listen to this episode as we teach you how to "Make It Happen To Somebody Else".</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/0660192e/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/0660192e/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/0660192e/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/0660192e/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/0660192e/transcription" type="text/html"/>
    </item>
    <item>
      <title>10. The Russians Are Coming! and what to do about it</title>
      <itunes:title>10. The Russians Are Coming! and what to do about it</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8f97be09-6c85-4954-b33f-fad1055036e3</guid>
      <link>https://unhacked.live/10</link>
      <description>
        <![CDATA[<p>In most episodes we talk about the devastating financial and emotional cost of a breach. This time, as far as public record goes, "The company does not expect the incident to have a material impact".</p><p>A Russian state-sponsored attack on HPE (Hewlett Packard Enterprise) "targeted 'a small percentage of HPE mailboxes' used by staff in cybersecurity...." Hmmmmm. Ok...?</p><p>Well, public record is what it is. That said, what can we learn? Take a listen and we'll break it down for you!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In most episodes we talk about the devastating financial and emotional cost of a breach. This time, as far as public record goes, "The company does not expect the incident to have a material impact".</p><p>A Russian state-sponsored attack on HPE (Hewlett Packard Enterprise) "targeted 'a small percentage of HPE mailboxes' used by staff in cybersecurity...." Hmmmmm. Ok...?</p><p>Well, public record is what it is. That said, what can we learn? Take a listen and we'll break it down for you!</p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Feb 2024 14:59:47 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/dca1ba1b/1467b61c.mp3" length="58234191" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2423</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In most episodes we talk about the devastating financial and emotional cost of a breach. This time, as far as public record goes, "The company does not expect the incident to have a material impact".</p><p>A Russian state-sponsored attack on HPE (Hewlett Packard Enterprise) "targeted 'a small percentage of HPE mailboxes' used by staff in cybersecurity...." Hmmmmm. Ok...?</p><p>Well, public record is what it is. That said, what can we learn? Take a listen and we'll break it down for you!</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/dca1ba1b/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/dca1ba1b/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/dca1ba1b/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/dca1ba1b/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/dca1ba1b/transcription" type="text/html"/>
    </item>
    <item>
      <title>9. Sorry You Were Hacked - Here's a $480M Lawsuit to Brighten Your Day</title>
      <itunes:title>9. Sorry You Were Hacked - Here's a $480M Lawsuit to Brighten Your Day</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">07b8ed2c-6de3-4219-8154-fb4272040948</guid>
      <link>https://unhacked.live/9</link>
      <description>
        <![CDATA[<p>An Ontario hospital system is hit with ransomware. 20,000 appointments cancelled. 267,000 patient records leaked. 3,000 employee records leaked. </p><p>That's all you've got?? Child's play! Here's a $480 million class action lawsuit to go with it. Enjoy!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>An Ontario hospital system is hit with ransomware. 20,000 appointments cancelled. 267,000 patient records leaked. 3,000 employee records leaked. </p><p>That's all you've got?? Child's play! Here's a $480 million class action lawsuit to go with it. Enjoy!</p>]]>
      </content:encoded>
      <pubDate>Thu, 25 Jan 2024 15:04:34 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/e273dfb5/8436df7e.mp3" length="73223982" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>3048</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>An Ontario hospital system is hit with ransomware. 20,000 appointments cancelled. 267,000 patient records leaked. 3,000 employee records leaked. </p><p>That's all you've got?? Child's play! Here's a $480 million class action lawsuit to go with it. Enjoy!</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/e273dfb5/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e273dfb5/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e273dfb5/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e273dfb5/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/e273dfb5/transcription" type="text/html"/>
    </item>
    <item>
      <title>8. MGM CyberNightmare</title>
      <itunes:title>8. MGM CyberNightmare</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">711b2e0c-a131-4ca5-a4d4-b85ca402c40e</guid>
      <link>https://unhacked.live/8</link>
      <description>
        <![CDATA[<p>Key point: It's all about the people. We are the weakest link in the cybersecurity chain. Training, policies and procedures, and 3rd party assessments are your friend.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Key point: It's all about the people. We are the weakest link in the cybersecurity chain. Training, policies and procedures, and 3rd party assessments are your friend.</p>]]>
      </content:encoded>
      <pubDate>Thu, 21 Dec 2023 15:37:14 -0600</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/3321e141/abbd575e.mp3" length="59170769" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2462</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Key point: It's all about the people. We are the weakest link in the cybersecurity chain. Training, policies and procedures, and 3rd party assessments are your friend.</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.b4networks.ca/bryan-l/" img="https://img.transistorcdn.com/9za2f6X-Ltf3lfkMSf9L_5VJelyhTbUbby7Erb4jS6A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTNmYTJmNmEt/MmZkYi00MDkwLWFj/YzUtMDMxYmFkMjRi/ODVhLzE3MDg0NzA5/ODQtaW1hZ2UuanBn.jpg">Bryan Lachapelle</podcast:person>
      <podcast:person role="Host" href="https://www.mazteck.com/about-us/" img="https://img.transistorcdn.com/lUZUBg6XQIQ5mDsseJ0Tl1nz2XkOeZff3GLhxuccBR0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNTIwYjI0ZTct/MTVkNS00NWI4LThj/ZmEtNGVhNzMzNzRl/NjgzLzE3MDg0NzE2/MDItaW1hZ2UuanBn.jpg">Mario Zaki</podcast:person>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/3321e141/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3321e141/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3321e141/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3321e141/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/3321e141/transcription" type="text/html"/>
    </item>
    <item>
      <title>7. Tony Rucci - Counterintelligence Special Agent (Retired)</title>
      <itunes:title>7. Tony Rucci - Counterintelligence Special Agent (Retired)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dfdb0d29-1bde-417c-bb23-f45820435e45</guid>
      <link>https://unhacked.live/7</link>
      <description>
        <![CDATA[<p>Antonio A. Rucci is a retired Counterintelligence Special Agent and US Army Warrant Officer, with more than 39 years of technical security experience. Tony runs a private CyberSecurity Consulting Firm in Knoxville, TN performing Penetration Testing, Passive Network Assessments and Incident Response Professional Services to both private government and commercial entities throughout the country.</p><p>Tony ran technical espionage and computer crimes investigations for a good portion of his operational career. He served as the Counterintelligence Operations Officer at The White House; serving two administrations from 1998-2004. He led the technical accreditation for a critical facility at one of the DOE National Labs before being recruited to move to Reno, Nevada to build a data center for one of the beltway bandits. Since then, Tony has started three of his own companies; served as the Chief Security Officer for two others; and ran Incident Response &amp; Threat Intelligence for two others before stepping back into Private Consulting. Tony continues to serve national security efforts with his CyberSecurity Consulting Firm in Knoxville, and gets in the way a lot while Pam, his wife of 39 years, is taking care of their three beautiful grand babies!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Antonio A. Rucci is a retired Counterintelligence Special Agent and US Army Warrant Officer, with more than 39 years of technical security experience. Tony runs a private CyberSecurity Consulting Firm in Knoxville, TN performing Penetration Testing, Passive Network Assessments and Incident Response Professional Services to both private government and commercial entities throughout the country.</p><p>Tony ran technical espionage and computer crimes investigations for a good portion of his operational career. He served as the Counterintelligence Operations Officer at The White House; serving two administrations from 1998-2004. He led the technical accreditation for a critical facility at one of the DOE National Labs before being recruited to move to Reno, Nevada to build a data center for one of the beltway bandits. Since then, Tony has started three of his own companies; served as the Chief Security Officer for two others; and ran Incident Response &amp; Threat Intelligence for two others before stepping back into Private Consulting. Tony continues to serve national security efforts with his CyberSecurity Consulting Firm in Knoxville, and gets in the way a lot while Pam, his wife of 39 years, is taking care of their three beautiful grand babies!</p>]]>
      </content:encoded>
      <pubDate>Thu, 07 Sep 2023 15:28:22 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/9ef3438f/0e2ed1e7.mp3" length="106670910" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/lWf-cFnYn_Ez7QLdEo9p175q2BasQ7DQQC_AJ_vwC6M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0OTQwODkv/MTY5NDExODUwMi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>4443</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Antonio A. Rucci is a retired Counterintelligence Special Agent and US Army Warrant Officer, with more than 39 years of technical security experience. Tony runs a private CyberSecurity Consulting Firm in Knoxville, TN performing Penetration Testing, Passive Network Assessments and Incident Response Professional Services to both private government and commercial entities throughout the country.</p><p>Tony ran technical espionage and computer crimes investigations for a good portion of his operational career. He served as the Counterintelligence Operations Officer at The White House; serving two administrations from 1998-2004. He led the technical accreditation for a critical facility at one of the DOE National Labs before being recruited to move to Reno, Nevada to build a data center for one of the beltway bandits. Since then, Tony has started three of his own companies; served as the Chief Security Officer for two others; and ran Incident Response &amp; Threat Intelligence for two others before stepping back into Private Consulting. Tony continues to serve national security efforts with his CyberSecurity Consulting Firm in Knoxville, and gets in the way a lot while Pam, his wife of 39 years, is taking care of their three beautiful grand babies!</p>]]>
      </itunes:summary>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/9ef3438f/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9ef3438f/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9ef3438f/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9ef3438f/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/9ef3438f/transcription" type="text/html"/>
    </item>
    <item>
      <title>6. 80% of Cyber Incidents Caused by Human Error - And how to fix it</title>
      <itunes:title>6. 80% of Cyber Incidents Caused by Human Error - And how to fix it</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1163a914-1132-410a-9152-1c7807f5e029</guid>
      <link>https://unhacked.live/6</link>
      <description>
        <![CDATA[Cybersecurity awareness training us usually an afterthought at best. The conversation is usually about securing technology. Until this changes, we will continue to be on the losing end of the battle.]]>
      </description>
      <content:encoded>
        <![CDATA[Cybersecurity awareness training us usually an afterthought at best. The conversation is usually about securing technology. Until this changes, we will continue to be on the losing end of the battle.]]>
      </content:encoded>
      <pubDate>Tue, 14 Jun 2022 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/cb670162/de61157c.mp3" length="60924536" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2534</itunes:duration>
      <itunes:summary>Cybersecurity awareness training us usually an afterthought at best. The conversation is usually about securing technology. Until this changes, we will continue to be on the losing end of the battle.</itunes:summary>
      <itunes:subtitle>Cybersecurity awareness training us usually an afterthought at best. The conversation is usually about securing technology. Until this changes, we will continue to be on the losing end of the battle.</itunes:subtitle>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
    </item>
    <item>
      <title>5. Hi I'm From the FBI and I'm Here to Help!</title>
      <itunes:title>5. Hi I'm From the FBI and I'm Here to Help!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e662ba1f-e879-4664-b8cb-ee7fefb92982</guid>
      <link>https://unhacked.live/5</link>
      <description>
        <![CDATA[Sometimes the FBI believes a security problem is bad enough that they feel justified breaking into your network to fix the problem for you. Which is a federal offense. You can go to federal prison for this. Unless you are the FBI. So... get your house in order, or roll out the red carpet for the government to come in and do it for you.]]>
      </description>
      <content:encoded>
        <![CDATA[Sometimes the FBI believes a security problem is bad enough that they feel justified breaking into your network to fix the problem for you. Which is a federal offense. You can go to federal prison for this. Unless you are the FBI. So... get your house in order, or roll out the red carpet for the government to come in and do it for you.]]>
      </content:encoded>
      <pubDate>Tue, 19 Apr 2022 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/17e495d1/41fdc8ef.mp3" length="41928747" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1743</itunes:duration>
      <itunes:summary>Sometimes the FBI believes a security problem is bad enough that they feel justified breaking into your network to fix the problem for you. Which is a federal offense. You can go to federal prison for this. Unless you are the FBI. So... get your house in order, or roll out the red carpet for the government to come in and do it for you.</itunes:summary>
      <itunes:subtitle>Sometimes the FBI believes a security problem is bad enough that they feel justified breaking into your network to fix the problem for you. Which is a federal offense. You can go to federal prison for this. Unless you are the FBI. So... get your house in </itunes:subtitle>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/17e495d1/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/17e495d1/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/17e495d1/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/17e495d1/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/17e495d1/transcription" type="text/html"/>
    </item>
    <item>
      <title>4. A Day in the Life...</title>
      <itunes:title>4. A Day in the Life...</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">704850d1-d2b9-47f9-9b4f-f824ef2873ae</guid>
      <link>https://unhacked.live/4</link>
      <description>
        <![CDATA[What goes on behind the scenes in the world of cybersecurity?]]>
      </description>
      <content:encoded>
        <![CDATA[What goes on behind the scenes in the world of cybersecurity?]]>
      </content:encoded>
      <pubDate>Tue, 12 Apr 2022 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/abe1f434/13c81d18.mp3" length="43482465" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1808</itunes:duration>
      <itunes:summary>What goes on behind the scenes in the world of cybersecurity?</itunes:summary>
      <itunes:subtitle>What goes on behind the scenes in the world of cybersecurity?</itunes:subtitle>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
    </item>
    <item>
      <title>3. If You Don't Have a CISO, You ARE the CISO</title>
      <itunes:title>3. If You Don't Have a CISO, You ARE the CISO</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">165a640a-d53d-4862-9186-0b83ca8a7580</guid>
      <link>https://unhacked.live/3</link>
      <description>
        <![CDATA[In the event of a breach, SOMEONE will be held accountable. Investigations, fines, lawsuits. It's never pretty. If you haven't properly protected your technology (or hired someone to do it), it's YOUR neck on the line. ]]>
      </description>
      <content:encoded>
        <![CDATA[In the event of a breach, SOMEONE will be held accountable. Investigations, fines, lawsuits. It's never pretty. If you haven't properly protected your technology (or hired someone to do it), it's YOUR neck on the line. ]]>
      </content:encoded>
      <pubDate>Tue, 05 Apr 2022 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/4d98a6d9/15ca3064.mp3" length="46322271" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1926</itunes:duration>
      <itunes:summary>In the event of a breach, SOMEONE will be held accountable. Investigations, fines, lawsuits. It's never pretty. If you haven't properly protected your technology (or hired someone to do it), it's YOUR neck on the line. </itunes:summary>
      <itunes:subtitle>In the event of a breach, SOMEONE will be held accountable. Investigations, fines, lawsuits. It's never pretty. If you haven't properly protected your technology (or hired someone to do it), it's YOUR neck on the line. </itunes:subtitle>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
    </item>
    <item>
      <title>2. Hacked Websites</title>
      <itunes:title>2. Hacked Websites</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c6840750-6d50-4daa-b887-fbc6d17a6c41</guid>
      <link>https://unhacked.live/2</link>
      <description>
        <![CDATA[One of the most overlooked steps you need to take to protect your organization.]]>
      </description>
      <content:encoded>
        <![CDATA[One of the most overlooked steps you need to take to protect your organization.]]>
      </content:encoded>
      <pubDate>Tue, 29 Mar 2022 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/843bb9fe/59f03bc9.mp3" length="37538425" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>1560</itunes:duration>
      <itunes:summary>One of the most overlooked steps you need to take to protect your organization.</itunes:summary>
      <itunes:subtitle>One of the most overlooked steps you need to take to protect your organization.</itunes:subtitle>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
    </item>
    <item>
      <title>1. War</title>
      <itunes:title>1. War</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d92b5ea7-7276-457d-bca8-435913d0095a</guid>
      <link>https://unhacked.live/1</link>
      <description>
        <![CDATA[As Russia and Ukraine both include cyber attacks in their war effort, what does this mean for the rest of us?]]>
      </description>
      <content:encoded>
        <![CDATA[As Russia and Ukraine both include cyber attacks in their war effort, what does this mean for the rest of us?]]>
      </content:encoded>
      <pubDate>Tue, 22 Mar 2022 06:00:00 -0500</pubDate>
      <author>Phoenix IT Advisors</author>
      <enclosure url="https://media.transistor.fm/f8797e4c/111c7757.mp3" length="65032871" type="audio/mpeg"/>
      <itunes:author>Phoenix IT Advisors</itunes:author>
      <itunes:duration>2706</itunes:duration>
      <itunes:summary>As Russia and Ukraine both include cyber attacks in their war effort, what does this mean for the rest of us?</itunes:summary>
      <itunes:subtitle>As Russia and Ukraine both include cyber attacks in their war effort, what does this mean for the rest of us?</itunes:subtitle>
      <itunes:keywords>Technology, Cyber Security, Hacking, Data Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.phoenixitadvisors.com/about-justin-media-focus/" img="https://img.transistorcdn.com/L3ozwiu1hWjKoN2i-pSvJB8tGvrelDTweT3MO9veWjg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYTM2NWVmYWYt/ZGI5NC00ZWI5LTgy/OTctNjM4NmI5MjA4/ZWYwLzE3MDg0NzM2/NDItaW1hZ2UuanBn.jpg">Justin Shelley</podcast:person>
    </item>
  </channel>
</rss>
