Episodes

4 days ago
4 days ago
John Hansman, an astute business leader and podcast host, is well-versed in the intricacies of cybersecurity challenges faced by small businesses. As the host of the popular "Business Invites" podcast, John provides valuable insights and discussions on prevalent issues such as business email compromises and invoicing scams. With a keen eye on current events, John frequently references real-world cases to highlight the importance of cybersecurity, drawing from notable incidents such as the substantial financial loss faced by "Shark Tank" star Barbara Cochran, who fell victim to a $388,000 invoicing scam. Through his work, John plays a crucial role in educating entrepreneurs on safeguarding their businesses from cyber threats.
Welcome to Episode 21 of the Business and Bytes Podcast! Today's episode kicks off with an essential discussion led by our host, John Hansman, about a prevalent threat to businesses—business email compromises, especially invoicing scams. In the context of a recent incident involving "Shark Tank" star Barbara Cochran, who fell victim to such a scam, John delves into the mechanics of how these deceptions occur and shares crucial tips on what businesses can do to protect themselves from similar pitfalls.
Following this impactful segment, we transition into an inspiring interview with our guest, Dominique Getchman, the Development and Communications Manager at Together, a non-profit in Olympia. Dominique shares her remarkable journey from a teenage mom to a boxing manager and then to a model, underscoring the lessons she's learned in business and life. She offers insights into overcoming obstacles, seizing opportunities, and how all of these experiences have equipped her to make a difference in her current role.
Whether you're looking to safeguard your business or seeking inspiration from real stories of triumph and resilience, this episode promises to deliver valuable insights and motivation. Let's dive in!
00:00 Email Scam: Invoice Fraud Exploit
03:27 Email Security and Red Flags
07:36 Together We Advance Student Wellbeing
11:44 Networking Journey: Lessons and Insights
14:45 Hawaiian Fighter's ESPN Opportunity
18:59 Lessons in Resilience and Belief
21:25 Pursuing a Modeling Career
23:09 Modeling Industry Challenges and Success
26:28 Modeling Industry Challenges
30:14 Balancing Relationships and Self-Interest
34:06 Bridging Gaps in Education System
36:22 Building a Foundation for Success
39:38 "Advice for Aspiring Models"
43:51 Managing Business Stress
45:59 "Supporting Thurston Students Together"

Tuesday Dec 31, 2024
EP20 - The Chinese Hacking Crisis: How Telecom Breaches Impact Your Business
Tuesday Dec 31, 2024
Tuesday Dec 31, 2024
Welcome to the latest episode of the Business and Bytes Podcast. Today, we delve into a critical and timely topic: the recent wave of cyberattacks on telecom companies, reportedly orchestrated by Chinese hackers, and what it means for businesses and individuals alike. I'm your host, John Hansman, joined by my co-host, Emelio Mejia, CEO of AM3 Tech and Cybersecurity, and cybersecurity expert Todd Thorson from Tang Cyber Security.
In this episode, we'll explore how these breaches impact the security of your personal and business communications, the vulnerabilities in our digital infrastructure, and the escalating measures needed to protect sensitive data. We'll hear insights on the importance of security and awareness training for employees, the effectiveness of multiple security layers, and why relying on professional technology consultants is crucial for robust cybersecurity.
Our discussion will touch on the rise of phishing attacks, the economic toll of cyber scams, and the subtleties of messaging security—with recommendations for safer communication practices. Join us as we unpack these issues, bringing you up to date on how to fortify your defenses in an increasingly perilous digital landscape.
Security and awareness training, cybersecurity risks, data transmission security, security layers, professional consultation, telecom breaches, Chinese hackers, Emilio Mejia, Todd Thorson, Tang Cyber Security, AM3 Tech and Cybersecurity, AT&T, Verizon, SMS text vulnerability, RCS messaging, encrypted messaging, WhatsApp security, outdated devices, government espionage, IT support, comprehensive security services, proactive cybersecurity, phishing attacks, cyber-attacks, data breaches, responsibility for cybersecurity, small business cybersecurity, phishing attack volume, economic impact of cyber scams, government-sponsored hacking, social engineering risks.
00:00 Business podcast hosts discuss telecom breaches.
03:47 Hackers spying on conversations; SMS insecurity acknowledged.
09:10 Chinese-sponsored hackers pose threat using information.
11:31 Avoid sending sensitive information via text/SMS.
16:36 Espionage reveals telecom vulnerabilities; protection needed.
17:40 Even huge companies struggle with cybersecurity protection.
22:04 Frequent security attacks blocked successfully. Client surprised.
25:32 Focus on security and awareness training education.
29:55 Ensure data transmission security and encryption tools.
32:50 Prioritize security; diversify and plan wisely.
34:16 Prioritize cybersecurity in IT support services.

Wednesday Dec 04, 2024
EP19 - Coworking Spaces: Reducing Loneliness and Boosting Collaboration with Ann Long
Wednesday Dec 04, 2024
Wednesday Dec 04, 2024
Introduction:
Welcome to another insightful episode of the Business and Bytes Podcast. I'm your host, John Hansman, and today, we're diving deep into the evolving world of coworking spaces and cybersecurity. Our special guest is Ann Long, founder of Burbity Workspaces in Spokane, Washington. Ann's mission is to combat the loneliness epidemic and foster a sense of belonging in the workplace. We'll explore how Burbity Workspaces provides flexible office solutions for everyone from sole proprietors to multinational companies, and the unique features that make these spaces ideal for collaboration and networking.
Additionally, we'll discuss vital cybersecurity measures that businesses must adopt, including the use of passkeys, two-factor authentication (2FA), and the significance of employee training against phishing attacks. If you want to learn how coworking can benefit your business and how to keep it secure, this episode is for you. Let's get started!
About John Hansman:
John Hansman has a lifetime of experience in diverse work environments, having navigated nearly every conceivable space configuration. With a career marked by a journey through various sizes and types of spaces, John brings invaluable insights into the world of co-working spaces. He has dedicated several years to understanding and enhancing these collaborative environments, recognizing their immense value to the business community. John's expertise not only spans the practical benefits of co-working spaces but also includes spotting emerging trends that shape how businesses of all sizes operate today. His deep-rooted knowledge and adaptive experiences make him a pivotal figure in the ongoing evolution of collaborative workspaces.
🌟 Special Guest: Ann Long
Ann Long, the visionary behind Burbity Workspaces in Spokane, Washington, shares her journey and insights into the importance of coworking spaces for entrepreneurs, remote workers, and large enterprises. Learn how these spaces are not just about renting desks but fostering a community that promotes connection, collaboration, and, ultimately, business success.
Website:https://burbity.com/
Contact: (509) 255-7275
Email: Ann@burbity.com
Time Stamp
13:50 Started working in Liberty Lake drop-in space.
18:52 Collaboration improved with office return plan.
20:44 Remote work raises trust and efficiency concerns.
25:59 Frequent networking events offered at Sullivan location.
29:07 Office space enhances business professionalism and client interactions.
32:08 Discussing underused two-factor authentication benefits.
34:53 Passkeys enhance security by eliminating code sharing.
37:30 Consider Apple's password tools, password managers.
_______
loneliness epidemic, coworking spaces, Ann Long, Burbity Workspaces, U.S. Surgeon General, Sullivan location, Liberty Lake location, John Hansman, in-person work, remote work, coworking space amenities, enterprise-sized companies, flexible coworking spaces, lease liabilities, commercial rent commitments, shorter lease agreements, new businesses, cost savings, meeting rooms, event spaces, drop-in options, virtual offices, high-walled cubicles, pods, workspace flexibility, satellite offices, networking events, speed networking, business email compromises, two-factor authentication, passkeys.

Wednesday Nov 20, 2024
Wednesday Nov 20, 2024
Welcome to Episode 18 of the Business and Bytes Podcast! In this engaging episode, our host John Hansman sits down with cybersecurity expert and entrepreneur Reginald Andre. Andre shares his compelling journey from working 18-hour days for nine years only to face financial turmoil and a restrictive non-compete agreement. Forced to start anew, he founded Arc Solvers from his mother’s house, initially targeting residential clients.
As cybersecurity threats grew, Andre pivoted to serve commercial clients with a proactive, subscription-based model. He draws parallels to the strategic shift seen in transportation from taxis to Uber. Through his media appearances, consistent podcasting, and strategic social media presence, Andre has built a reputable and rapidly growing cybersecurity firm.
Join us as we dive deep into his entrepreneurial journey, the challenges he faced, the strategies he employed, and his insights on creating a proactive cybersecurity culture. Alongside, host John Hansman reflects on his own experiences, paralleling Andre’s journey with adapting business strategies during the Covid pandemic. Get ready for an inspiring conversation rich with lessons on resilience, innovation, and the power of building a positive digital footprint.
00:00 Start with awareness, training, communication, and policies.
03:35 Improve cybersecurity through employee training and awareness.
08:25 Multimillionaire offers partnership in technology business.
13:00 Grinding, building relationships, despite obstacles, knocking doors.
14:17 Evolving threats prompted cybersecurity business model upgrade.
17:39 Business shifted to at-home computer repair service.
21:25 Prepare concise comments; contact news stations promptly.
24:24 Producer verification crucial for live TV appearances.
28:37 Showcase connections to genuinely engage and sell.
29:57 First podcast interview for a reboot! Grateful.
Andre's info
Website: https://arksolvers.com/
Security Squawk Podcast:https://podcasts.apple.com/us/podcast/security-squawk-the-business-of-cybersecurity/id1544342775

Wednesday Nov 20, 2024
EP17 - Lets talk Reboot
Wednesday Nov 20, 2024
Wednesday Nov 20, 2024
We're going to talk ab out how we're rebooting the Business and Bytes Podcast.

Monday May 13, 2024
Monday May 13, 2024
Welcome back to the Business and Bytes Podcast, where we dive deep into the strategies and technologies essential for protecting your business in our digital world. I'm your host, Emelio Mejia, joined by my co-host, John Hansman.
In today's episode, Part II of our series on cybersecurity, we continue to explore the critical measures to safeguard your business against cyberthreats. We'll discuss the importance of encryption, from your emails to hard drives, and why backing up your data is not just a good practice but a necessity for business continuity.
John will share his personal insights on being prepared for emergencies, emphasizing the significance of a rehearsed plan for cyber incidents. We'll also touch on the pivotal role of employee training in strengthening your company’s cyber defenses, and why even small businesses should consider specialized security support.
Stay tuned as we lay down the fundamentals of web gateway security, mobile device management, and firewalls to secure your digital assets. By the end of this episode, you'll have a clearer understanding of how to prevent, identify, and react to cybersecurity threats in our continuously evolving digital landscape. So, let's get into it!
Support the show by subscribing to our Facebook Account: https://www.facebook.com/businessandbytesAM3 I.T. & CyberSecurity : https://web.facebook.com/AM3TechnologyTruit : https://web.facebook.com/truitmsp
Timestamps for your reference:
00:00 Solopreneurs need to focus on these 15 ways.
05:51 Warning about using same passwords across platforms.
08:30 Data logs critical for investigation, time-sensitive retrieval.
12:58 Quick response to security issue, customer appreciation.
14:35 Extend Microsoft logs retention with real-time ingestion.
19:30 Tech bubble restricts access, adds security layers.
20:38 Employers offering secure phone options to employees.
25:37 Encrypt sensitive data, especially when traveling.
29:33 Backups are crucial for business data protection.
33:31 Plan ahead to avoid panicked decision-making.
35:33 Agree on the need for cybersecurity insurance.
38:10 Contact us for nationwide compliance support.

Friday Apr 26, 2024
EP15 - Combating Cyber Crimes: Why Understanding Basics Matters
Friday Apr 26, 2024
Friday Apr 26, 2024
"It doesn't matter how many security tools you have in place if the person is just going to open the front door and let them in."
Welcome to Episode 15 of the Business and Bytes Podcast, where we delve into the critical world of cybersecurity basics under the shadow of a concerning trend: ransomware gangs joining forces.
I'm your host Emelio Mejia, accompanied by co-host John Hansman. Today, we're inspired by a recent high-profile cyberattack on the MGM Grand, which experienced a staggering $100 million loss due to the nefarious activities of a newly formed American ransomware group collaborating with seasoned cybercriminals from Russia.
In this episode, we'll explore the pivotal role of social engineering in this attack and the broader challenges businesses face in securing their digital frontiers. We'll discuss why cybersecurity isn't just about technology but also about understanding human behavior, the critical importance of regular and robust security training, and why relying on free antivirus tools might be a risky move for businesses.
Furthermore, we'll break down why multifactor authentication is a must-have in today's digital age, and highlight the real-world consequences of cyber incidents—from financial losses to power outages. Join us as we unpack these topics and equip you with a 15-point checklist to safeguard your business from such dire cybersecurity threats. Stay tuned!
Support the show by subscribing to our Facebook Account: https://www.facebook.com/businessandbytes
Timestamps for your reference:
00:00 Attacks on IT infrastructure, password reset breach.07:16 Big companies need new vetting processes for calls.10:27 Cybersecurity is crucial due to real consequences.14:50 US hacker providing tips to foreign hackers.15:34 Cybercriminals wait, learn about your behavior. Importance of cybersecurity for small businesses.19:04 Security assessment is just the starting point.24:58 Ransomware often comes through socially engineered email.27:11 Security awareness training essential for business protection.30:09 Free antivirus and technology come with costs.33:09 Importance of multifactor authentication in cloud security.35:43 Discussion about the importance of computer updating.39:27 Issues with cybersecurity policy and ongoing management.

Saturday Apr 13, 2024
EP14 - Alyssa Bryson on Building Engaged Audiences in Today's Media Landscape
Saturday Apr 13, 2024
Saturday Apr 13, 2024
"I have not bought any ads in the four years that company has existed. I have not purchased one ad. I have not. Not on Google, not on Facebook, nowhere. I've just focused on making really great content and making sure that the search on the back end pulls up."
Welcome back to the Business and Bytes Podcast! I'm your host, John Hansman, joined by my co-host, Emelio Mejia. Today, in Episode 14, we have a fantastic guest joining us – Alyssa Bryson, the vice president of community development at Work P2P and former director at King Five.
Alyssa has a wealth of experience in traditional media and business development, and we're diving deep into how businesses can create an audience and loyal fans in today's shifting media landscape.
In this episode, Alyssa shares her journey from managing a large team at King Five to steering event logistics at Work P2P. We'll talk about the intricacies of handling logistics for massive events, transitioning from traditional media to leveraging AI tools like cast magic for podcast production, and the strategies to enhance podcast visibility.
Moreover, we'll explore the delicate balance between utilizing technology and maintaining a human touch in content creation. Alyssa emphasizes the importance of having a clear message and brand story, which she learned from her experience in publishing and television. We'll also tackle the ever-present threat of AI voice scams and the precautionary measures one can take to safeguard against them.
Tune in as we delve into the practicality of podcasting for different business models and discuss the potential of YouTube as a powerful platform for reaching audiences. Alyssa's insights on SEO, niche targeting, and the shift towards self-serving marketing tools will equip you with the knowledge to grow your audience effectively.
Don't miss this engaging conversation with Alyssa Bryson on the Business and Bytes Podcast, where we discuss the intersection of business know-how and the latest in digital technology. Let's get started!
Support the show by subscribing to our Facebook Account: https://www.facebook.com/businessandbytes
Timestamps for your reference:
00:00 Experienced individual with roots in small town.07:24 Son’s Crohn's diagnosis prompted magazine career break.13:13 Rebranded business serving large corporate clients globally.19:27 Creating pop culture magazine, seeking contributors.23:26 Google Analytics favored, WordPress user for analytics.29:16 Personal website uses AI to improve content.36:24 Transcribe video with caution, typos matter.40:16 Podcast aims to support business owners' growth.45:52 Media landscape constantly changes, good stories remain.50:26 Use web programs to create fake audio.56:03 Need parents conversation about email security importance.01:01:36 Personal website: elisebryson.com, sobercurator.com. Google for more.

Let's grow our businesses together!
We're excited to help business thrive by providing content that gets at the heart of all the things we, as business owners do, deal with and struggle through! We all make mistakes, but hopefully, we can learn from the successes and learning experiences of others as we tackle business discussions one guest at a time. Additionally, being cyber security experts, we will bring content that gives you the knowledge to protect your business.
Let's grow and thrive together!
- John and Emilio