Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Overwhelmed by technology acronyms? Stressing about cybersecurity? Join team members from CIT and their guests as they discuss technology for small to medium businesses.
| Episode | Date |
|---|---|
|
Weekly AI News Recap
|
Apr 29, 2026 |
|
AI Live Chats: Show Me the ROI
|
Apr 08, 2026 |
|
AI Live Chats: The Prompt Doctor
|
Mar 24, 2026 |
|
Tech insights from GENIANS
|
Mar 18, 2026 |
|
AI Live Chats: Enhancing Business Operations
|
Mar 11, 2026 |
|
South Korea's Basic AI Act
|
Mar 04, 2026 |
|
Master Prompting: Strategies for Success
|
Feb 18, 2026 |
|
Navigating AI Models: Finding the Right Fit
|
Feb 11, 2026 |
|
Growth through Modern File Storage
|
Feb 04, 2026 |
|
Level up your Security
|
Jan 28, 2026 |
|
Tech Trends 2026
|
Jan 21, 2026 |
|
Empowering Your Business with AI: The Journey begins
|
Dec 17, 2025 |
|
AI in Business: Find Your First Project
|
Dec 10, 2025 |
|
The Vendor Due Diligence Process
|
Nov 12, 2025 |
|
Building a Security Culture
|
Nov 05, 2025 |
|
Cyber Essentials for Infrastructure
|
Oct 29, 2025 |
|
Insights from Experience
|
Oct 22, 2025 |
|
Unmasking Ransomware as a Service
|
Oct 15, 2025 |
|
Securing Your Home Network
|
Oct 08, 2025 |
|
The Rise of Deepfakes
|
Oct 01, 2025 |
|
Building Strong Business Partnerships: Insights from Barracuda Networks
|
Sep 25, 2025 |
|
AI is transforming IT Support
|
Sep 17, 2025 |
|
Essentials of Incident Response: Part 2
|
Aug 27, 2025 |
|
Essentials of Incident Response: Part 1
|
Aug 20, 2025 |
|
SonicWall Vulnerability Breakdown
|
Aug 13, 2025 |
|
City of St. Paul Cyber Incident
|
Aug 06, 2025 |
|
CIT Origins: AI First
|
Jul 30, 2025 |
|
Cyber tips for summer trips
|
Jul 23, 2025 |
|
The End of VPNs
|
Jul 16, 2025 |
|
AI: Focus on Ethics
|
Jul 09, 2025 |
|
AI Adoption: Security First
|
Jun 25, 2025 |
|
Your AI Policy guide
|
Jun 18, 2025 |
|
Agentic AI
|
Jun 11, 2025 |
|
AI Advocate: Why Your Workplace Needs You
|
Jun 04, 2025 |
|
Tech Solutions: Spotlight on LastPass
|
May 14, 2025 |
|
The Power of Aura Acceleration
|
Apr 23, 2025 |
|
Mastering Copilot Prompts
|
Apr 16, 2025 |
|
Top Tech Priorities
|
Apr 09, 2025 |
|
Navigating AI Compliance
|
Apr 02, 2025 |
|
The ROI of Zero Trust
|
Mar 26, 2025 |
|
Is your business ready for AI?
|
Mar 19, 2025 |
|
IT Skills Gap: Insights from the field
|
Mar 12, 2025 |
|
Workflow Automation: Insights from Experts
|
Mar 05, 2025 |
|
HIPAA Updates 2025
|
Feb 26, 2025 |
|
DMARC for PCI DSS
|
Feb 19, 2025 |
|
DeepSeek: AI Disruptor
|
Feb 12, 2025 |
|
What is Passwordless?
|
Feb 05, 2025 |
|
Your Role in Incident Response
|
Jan 29, 2025 |
|
Cybersecurity Trends 2025
|
Jan 22, 2025 |
|
Tech Trends 2025
|
Jan 15, 2025 |
|
Maximizing Your End-of-Year IT Budget
|
Dec 18, 2024 |
|
How to Navigate Healthcare Cybersecurity Incidents
|
Dec 11, 2024 |
|
How to Balance Profitability & Risk: A CEO’s Guide
|
Dec 04, 2024 |
|
Importance of Disaster Recovery Plans
|
Nov 20, 2024 |
|
What is Network Access Control?
|
Nov 13, 2024 |
|
What is DMARC?
|
Nov 06, 2024 |
|
What Keeps Business Leaders Up at Night?
|
Oct 29, 2024 |
|
Navigating EOL
|
Oct 21, 2024 |
|
What is Smishing?
|
Oct 15, 2024 |
|
Password Security 101
|
Oct 08, 2024 |
|
MFA: The basics
|
Oct 01, 2024 |
|
Tech strategies for Government
|
Sep 25, 2024 |
|
Hardware Solutions for Designers
|
Sep 18, 2024 |
|
What are Development Services?
|
Sep 11, 2024 |
|
Rendering Reality: Elevating Commercial Dealership Experiences
|
Sep 03, 2024 |
|
Real Talk: Explaining IT Partnerships with Commercial Furniture Dealerships
|
Aug 28, 2024 |
|
Cultivate Collaboration: Inside the MSP Partnership
|
Aug 21, 2024 |
|
Weathering the CrowdStrike Delta Storm: The Importance of Business Continuity
|
Aug 08, 2024 |
|
The AI Advantage: Tools, Tactics, & Truths
|
Aug 07, 2024 |
|
How much tech is too much?
|
Jul 24, 2024 |
|
Navigating the Cyber Storm: CrowdStrike
|
Jul 23, 2024 |
|
Fight AI with AI
|
Jul 17, 2024 |
|
Tech Solutions: Spotlight on ThreatLocker
|
Jul 10, 2024 |
|
Pioneering IAM Solutions
|
Jun 26, 2024 |
|
SIEM Simplified: Securing Financial Institutions
|
Jun 18, 2024 |
|
Tech Solutions: Spotlight on Datto
|
Jun 05, 2024 |
|
IAM Unlocked: Elevating Business Security
|
May 29, 2024 |
|
Secure Horizons: Optimal Zero Trust
|
May 15, 2024 |
|
Defend & Protect: Navigating CMMC
|
May 08, 2024 |
|
Ascent to Advanced Zero Trust
|
May 01, 2024 |
|
Awareness to Action: Protecting National Assets
|
Apr 24, 2024 |
|
Zero Trust in Motion
|
Apr 17, 2024 |
|
Celebrating 100 Episodes
|
Apr 10, 2024 |
|
Navigate Zero Trust: Traditional
|
Apr 03, 2024 |
|
Cybersecurity Strategies for Thriving Commercial Workspaces
|
Mar 27, 2024 |
|
Securing Government Agencies: Cybersecurity Best Practices
|
Mar 20, 2024 |
|
The HaaS Advantage
|
Mar 13, 2024 |
|
Cyber Insurance & Compliance: A powerful partnership
|
Mar 06, 2024 |
|
Microsoft Copilot: Powering Productivity
|
Feb 28, 2024 |
|
Cybersecurity Best Practices for Manufacturing
|
Feb 21, 2024 |
|
Eliminating VPNs
|
Feb 14, 2024 |
|
Tech Solutions: Spotlight on Scale Computing
|
Feb 07, 2024 |
|
Embrace the Future: Spotlight On VMware
|
Jan 31, 2024 |
|
Zero Trust Demystified
|
Jan 24, 2024 |
|
Cybersecurity Trends 2024
|
Jan 17, 2024 |
|
Technology trends 2024
|
Jan 10, 2024 |
|
Common Compliance Questions
|
Dec 13, 2023 |
|
Cybersecurity Unveiled: Part 2
|
Dec 06, 2023 |
|
Cybersecurity Unveiled: Part 1
|
Nov 29, 2023 |
|
Is it malicious or marketing?
|
Nov 15, 2023 |
|
Seamless Server Lifecycle
|
Nov 08, 2023 |
|
Transformative Connections: The Strategic Advantage
|
Nov 01, 2023 |
|
Integrated power of cybersecurity
|
Oct 25, 2023 |
|
Incident Insights: Tales from the Frontlines
|
Oct 18, 2023 |
|
Incident Insights: Infiltration
|
Oct 11, 2023 |
|
Incident Insights: Real-Life Close Calls
|
Oct 04, 2023 |
|
Designers in the Digital Age
|
Sep 27, 2023 |
|
Hardware lifecycle: Maximizing efficiency
|
Sep 20, 2023 |
|
Bridging the Gap: Top 5 questions to ask your business leaders
|
Sep 13, 2023 |
|
Revolutionize Leadership: Top 5 questions to ask your IT team
|
Sep 06, 2023 |
|
Proactive Defense: Risk Assessment
|
Aug 30, 2023 |
|
Government Regulations: The Basics
|
Aug 23, 2023 |
|
Deep Dive: What are RTOs & RPOs?
|
Aug 16, 2023 |
|
Quality IT on Limited Budget
|
Aug 09, 2023 |
|
Why you need a tech partner
|
Aug 02, 2023 |
|
AI: Best Practices
|
Jul 26, 2023 |
|
Deep Dive into Cybercrime
|
Jul 19, 2023 |
|
Do We Trust Deep Learning Too Much?
|
Jul 12, 2023 |
|
Preparing for NIST CSF 2.0
|
Jul 05, 2023 |
|
CIT Origins: Manufacturing
|
Jun 28, 2023 |
|
PAM for Banks
|
Jun 21, 2023 |
|
PAM for SMBs
|
Jun 14, 2023 |
|
Transforming Commercial Workspaces
|
Jun 09, 2023 |
|
Compliance in the Future
|
Jun 07, 2023 |
|
How Can EDR Save My Business? - Deep Dive
|
May 31, 2023 |
|
Why doctors refuse to use MFA
|
May 24, 2023 |
|
vCISO: Is it Right for Your Business?
|
May 17, 2023 |
|
Cybersecurity: Staying Informed
|
May 10, 2023 |
|
Addressing the Cybersecurity Labor Shortage
|
May 03, 2023 |
|
Cybersecurity Best Practices for Healthcare
|
Apr 27, 2023 |
|
Should you take your meetings in the Metaverse?
|
Apr 26, 2023 |
|
Networking and Cloud Security - The Future
|
Apr 19, 2023 |
|
Can you afford $100,000 a month in HIPAA fines?
|
Apr 12, 2023 |
|
AI: Balancing Innovation and Ethics
|
Apr 07, 2023 |
|
Employee Engagement from the Leadership Perspective
|
Apr 05, 2023 |
|
AI - Is it replacing workers?
|
Mar 31, 2023 |
|
Taking IT From Cost Center to Revenue Driver
|
Mar 29, 2023 |
|
Insights from the 2022 IC3 Report
|
Mar 29, 2023 |
|
How Do I Choose the Right SIEM?
|
Mar 22, 2023 |
|
Protecting the Education Industry: Best Cybersecurity Practices
|
Mar 22, 2023 |
|
Do You Fear Technology?
|
Mar 15, 2023 |
|
What Is EDR?
|
Mar 08, 2023 |
|
The Death of Active Directory
|
Mar 01, 2023 |
|
Glass Shattering Moments
|
Feb 22, 2023 |
|
The Future of PCI DSS 4.0: New Standards for Data Security in a Rapidly Evolving World
|
Feb 15, 2023 |
|
Ways to Win Over: Navigating User Adoption in Technology
|
Feb 08, 2023 |
|
Decoding the Future: Navigating Chat GPT and the Cybersecurity Landscape
|
Feb 02, 2023 |
|
Privacy at work and at home
|
Feb 02, 2023 |
|
Technology and Employee Engagement
|
Jan 25, 2023 |
|
Cybersecurity Issues In The Finance Industry, And What To Do About It
|
Jan 18, 2023 |
|
I have backups, why should I be worried about ransomware?
|
Jan 11, 2023 |
|
Happy Holidays - The FUD Edition
|
Nov 09, 2022 |
|
Email Security (What Is It)
|
Nov 04, 2022 |
|
Your Guide to Cybersecurity Insurance
|
Oct 26, 2022 |
|
How To Recognize And Report Phishing
|
Oct 19, 2022 |
|
Don’t Skip Updates
|
Oct 12, 2022 |
|
Let's Talk About Deepfakes
|
Oct 05, 2022 |
|
Auto Dealers And The New Federal Trade Commission (FTC) Safeguards Rule - Part 2
|
Sep 28, 2022 |
|
Auto Dealers And The New Federal Trade Commission (FTC) Safeguards Rule - Part 1
|
Sep 27, 2022 |
|
Social Media Strategy & Cybersecurity
|
Sep 21, 2022 |
|
Technology Trends 2023
|
Sep 14, 2022 |
|
Cybersecurity Trends 2023
|
Sep 14, 2022 |
|
CIT Origins: Office Locations
|
Sep 07, 2022 |
|
CIT Origins: Late 80's to Early 90's
|
Aug 31, 2022 |
|
Are passwords going away?
|
Aug 24, 2022 |
|
The Trust Factor: Recent Events, Password Managers, & More
|
Aug 17, 2022 |
|
Return on Technology Investment
|
Aug 10, 2022 |
|
What Should You Ask a Potential Tech Partner?
|
Aug 03, 2022 |
|
Zero Trust Part II: How Do I Get Started?
|
Jul 27, 2022 |
|
Cloud vs. On Prem: The Smackdown
|
Jul 20, 2022 |
|
How Do I Budget for IT?
|
Jul 13, 2022 |
|
Zero Trust Part I: What Is It?
|
Jun 29, 2022 |
|
Maturity Model
|
Jun 22, 2022 |
|
Myths of Managed Services
|
Jun 15, 2022 |
|
Healthcare Cybersecurity Act 2022
|
Jun 08, 2022 |
|
Physical Security (Cameras, Sensors, & more!)
|
Jun 01, 2022 |
|
Choosing a Managed Service Provider (MSP)
|
May 25, 2022 |
|
Budgeting Migrating to the Cloud
|
May 18, 2022 |
|
U.S. Securities and Exchange Commission (SEC) Compliance
|
May 11, 2022 |
|
Technology planning for SMBs
|
May 04, 2022 |
|
Multi-Factor Authentication (MFA): The basics and why does my business need it?
|
Apr 27, 2022 |