Tech for Business

By Computer Integration Technologies (CIT)

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Business

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 181

Description

Overwhelmed by technology acronyms? Stressing about cybersecurity? Join team members from CIT and their guests as they discuss technology for small to medium businesses.


Episode Date
Weekly AI News Recap
Apr 29, 2026
AI Live Chats: Show Me the ROI
Apr 08, 2026
AI Live Chats: The Prompt Doctor
Mar 24, 2026
Tech insights from GENIANS
Mar 18, 2026
AI Live Chats: Enhancing Business Operations
Mar 11, 2026
South Korea's Basic AI Act
Mar 04, 2026
Master Prompting: Strategies for Success
Feb 18, 2026
Navigating AI Models: Finding the Right Fit
Feb 11, 2026
Growth through Modern File Storage
Feb 04, 2026
Level up your Security
Jan 28, 2026
Tech Trends 2026
Jan 21, 2026
Empowering Your Business with AI: The Journey begins
Dec 17, 2025
AI in Business: Find Your First Project
Dec 10, 2025
The Vendor Due Diligence Process
Nov 12, 2025
Building a Security Culture
Nov 05, 2025
Cyber Essentials for Infrastructure
Oct 29, 2025
Insights from Experience
Oct 22, 2025
Unmasking Ransomware as a Service
Oct 15, 2025
Securing Your Home Network
Oct 08, 2025
The Rise of Deepfakes
Oct 01, 2025
Building Strong Business Partnerships: Insights from Barracuda Networks
Sep 25, 2025
AI is transforming IT Support
Sep 17, 2025
Essentials of Incident Response: Part 2
Aug 27, 2025
Essentials of Incident Response: Part 1
Aug 20, 2025
SonicWall Vulnerability Breakdown
Aug 13, 2025
City of St. Paul Cyber Incident
Aug 06, 2025
CIT Origins: AI First
Jul 30, 2025
Cyber tips for summer trips
Jul 23, 2025
The End of VPNs
Jul 16, 2025
AI: Focus on Ethics
Jul 09, 2025
AI Adoption: Security First
Jun 25, 2025
Your AI Policy guide
Jun 18, 2025
Agentic AI
Jun 11, 2025
AI Advocate: Why Your Workplace Needs You
Jun 04, 2025
Tech Solutions: Spotlight on LastPass
May 14, 2025
The Power of Aura Acceleration
Apr 23, 2025
Mastering Copilot Prompts
Apr 16, 2025
Top Tech Priorities
Apr 09, 2025
Navigating AI Compliance
Apr 02, 2025
The ROI of Zero Trust
Mar 26, 2025
Is your business ready for AI?
Mar 19, 2025
IT Skills Gap: Insights from the field
Mar 12, 2025
Workflow Automation: Insights from Experts
Mar 05, 2025
HIPAA Updates 2025
Feb 26, 2025
DMARC for PCI DSS
Feb 19, 2025
DeepSeek: AI Disruptor
Feb 12, 2025
What is Passwordless?
Feb 05, 2025
Your Role in Incident Response
Jan 29, 2025
Cybersecurity Trends 2025
Jan 22, 2025
Tech Trends 2025
Jan 15, 2025
Maximizing Your End-of-Year IT Budget
Dec 18, 2024
How to Navigate Healthcare Cybersecurity Incidents
Dec 11, 2024
How to Balance Profitability & Risk: A CEO’s Guide
Dec 04, 2024
Importance of Disaster Recovery Plans
Nov 20, 2024
What is Network Access Control?
Nov 13, 2024
What is DMARC?
Nov 06, 2024
What Keeps Business Leaders Up at Night?
Oct 29, 2024
Navigating EOL
Oct 21, 2024
What is Smishing?
Oct 15, 2024
Password Security 101
Oct 08, 2024
MFA: The basics
Oct 01, 2024
Tech strategies for Government
Sep 25, 2024
Hardware Solutions for Designers
Sep 18, 2024
What are Development Services?
Sep 11, 2024
Rendering Reality: Elevating Commercial Dealership Experiences
Sep 03, 2024
Real Talk: Explaining IT Partnerships with Commercial Furniture Dealerships
Aug 28, 2024
Cultivate Collaboration: Inside the MSP Partnership
Aug 21, 2024
Weathering the CrowdStrike Delta Storm: The Importance of Business Continuity
Aug 08, 2024
The AI Advantage: Tools, Tactics, & Truths
Aug 07, 2024
How much tech is too much?
Jul 24, 2024
Navigating the Cyber Storm: CrowdStrike
Jul 23, 2024
Fight AI with AI
Jul 17, 2024
Tech Solutions: Spotlight on ThreatLocker
Jul 10, 2024
Pioneering IAM Solutions
Jun 26, 2024
SIEM Simplified: Securing Financial Institutions
Jun 18, 2024
Tech Solutions: Spotlight on Datto
Jun 05, 2024
IAM Unlocked: Elevating Business Security
May 29, 2024
Secure Horizons: Optimal Zero Trust
May 15, 2024
Defend & Protect: Navigating CMMC
May 08, 2024
Ascent to Advanced Zero Trust
May 01, 2024
Awareness to Action: Protecting National Assets
Apr 24, 2024
Zero Trust in Motion
Apr 17, 2024
Celebrating 100 Episodes
Apr 10, 2024
Navigate Zero Trust: Traditional
Apr 03, 2024
Cybersecurity Strategies for Thriving Commercial Workspaces
Mar 27, 2024
Securing Government Agencies: Cybersecurity Best Practices
Mar 20, 2024
The HaaS Advantage
Mar 13, 2024
Cyber Insurance & Compliance: A powerful partnership
Mar 06, 2024
Microsoft Copilot: Powering Productivity
Feb 28, 2024
Cybersecurity Best Practices for Manufacturing
Feb 21, 2024
Eliminating VPNs
Feb 14, 2024
Tech Solutions: Spotlight on Scale Computing
Feb 07, 2024
Embrace the Future: Spotlight On VMware
Jan 31, 2024
Zero Trust Demystified
Jan 24, 2024
Cybersecurity Trends 2024
Jan 17, 2024
Technology trends 2024
Jan 10, 2024
Common Compliance Questions
Dec 13, 2023
Cybersecurity Unveiled: Part 2
Dec 06, 2023
Cybersecurity Unveiled: Part 1
Nov 29, 2023
Is it malicious or marketing?
Nov 15, 2023
Seamless Server Lifecycle
Nov 08, 2023
Transformative Connections: The Strategic Advantage
Nov 01, 2023
Integrated power of cybersecurity
Oct 25, 2023
Incident Insights: Tales from the Frontlines
Oct 18, 2023
Incident Insights: Infiltration
Oct 11, 2023
Incident Insights: Real-Life Close Calls
Oct 04, 2023
Designers in the Digital Age
Sep 27, 2023
Hardware lifecycle: Maximizing efficiency
Sep 20, 2023
Bridging the Gap: Top 5 questions to ask your business leaders
Sep 13, 2023
Revolutionize Leadership: Top 5 questions to ask your IT team
Sep 06, 2023
Proactive Defense: Risk Assessment
Aug 30, 2023
Government Regulations: The Basics
Aug 23, 2023
Deep Dive: What are RTOs & RPOs?
Aug 16, 2023
Quality IT on Limited Budget
Aug 09, 2023
Why you need a tech partner
Aug 02, 2023
AI: Best Practices
Jul 26, 2023
Deep Dive into Cybercrime
Jul 19, 2023
Do We Trust Deep Learning Too Much?
Jul 12, 2023
Preparing for NIST CSF 2.0
Jul 05, 2023
CIT Origins: Manufacturing
Jun 28, 2023
PAM for Banks
Jun 21, 2023
PAM for SMBs
Jun 14, 2023
Transforming Commercial Workspaces
Jun 09, 2023
Compliance in the Future
Jun 07, 2023
How Can EDR Save My Business? - Deep Dive
May 31, 2023
Why doctors refuse to use MFA
May 24, 2023
vCISO: Is it Right for Your Business?
May 17, 2023
Cybersecurity: Staying Informed
May 10, 2023
Addressing the Cybersecurity Labor Shortage
May 03, 2023
Cybersecurity Best Practices for Healthcare
Apr 27, 2023
Should you take your meetings in the Metaverse?
Apr 26, 2023
Networking and Cloud Security - The Future
Apr 19, 2023
Can you afford $100,000 a month in HIPAA fines?
Apr 12, 2023
AI: Balancing Innovation and Ethics
Apr 07, 2023
Employee Engagement from the Leadership Perspective
Apr 05, 2023
AI - Is it replacing workers?
Mar 31, 2023
Taking IT From Cost Center to Revenue Driver
Mar 29, 2023
Insights from the 2022 IC3 Report
Mar 29, 2023
How Do I Choose the Right SIEM?
Mar 22, 2023
Protecting the Education Industry: Best Cybersecurity Practices
Mar 22, 2023
Do You Fear Technology?
Mar 15, 2023
What Is EDR?
Mar 08, 2023
The Death of Active Directory
Mar 01, 2023
Glass Shattering Moments
Feb 22, 2023
The Future of PCI DSS 4.0: New Standards for Data Security in a Rapidly Evolving World
Feb 15, 2023
Ways to Win Over: Navigating User Adoption in Technology
Feb 08, 2023
Decoding the Future: Navigating Chat GPT and the Cybersecurity Landscape
Feb 02, 2023
Privacy at work and at home
Feb 02, 2023
Technology and Employee Engagement
Jan 25, 2023
Cybersecurity Issues In The Finance Industry, And What To Do About It
Jan 18, 2023
I have backups, why should I be worried about ransomware?
Jan 11, 2023
Happy Holidays - The FUD Edition
Nov 09, 2022
Email Security (What Is It)
Nov 04, 2022
Your Guide to Cybersecurity Insurance
Oct 26, 2022
How To Recognize And Report Phishing
Oct 19, 2022
Don’t Skip Updates
Oct 12, 2022
Let's Talk About Deepfakes
Oct 05, 2022
Auto Dealers And The New Federal Trade Commission (FTC) Safeguards Rule - Part 2
Sep 28, 2022
Auto Dealers And The New Federal Trade Commission (FTC) Safeguards Rule - Part 1
Sep 27, 2022
Social Media Strategy & Cybersecurity
Sep 21, 2022
Technology Trends 2023
Sep 14, 2022
Cybersecurity Trends 2023
Sep 14, 2022
CIT Origins: Office Locations
Sep 07, 2022
CIT Origins: Late 80's to Early 90's
Aug 31, 2022
Are passwords going away?
Aug 24, 2022
The Trust Factor: Recent Events, Password Managers, & More
Aug 17, 2022
Return on Technology Investment
Aug 10, 2022
What Should You Ask a Potential Tech Partner?
Aug 03, 2022
Zero Trust Part II: How Do I Get Started?
Jul 27, 2022
Cloud vs. On Prem: The Smackdown
Jul 20, 2022
How Do I Budget for IT?
Jul 13, 2022
Zero Trust Part I: What Is It?
Jun 29, 2022
Maturity Model
Jun 22, 2022
Myths of Managed Services
Jun 15, 2022
Healthcare Cybersecurity Act 2022
Jun 08, 2022
Physical Security (Cameras, Sensors, & more!)
Jun 01, 2022
Choosing a Managed Service Provider (MSP)
May 25, 2022
Budgeting Migrating to the Cloud
May 18, 2022
U.S. Securities and Exchange Commission (SEC) Compliance
May 11, 2022
Technology planning for SMBs
May 04, 2022
Multi-Factor Authentication (MFA): The basics and why does my business need it?
Apr 27, 2022