QPC Security - Breakfast Bytes cover art

QPC Security - Breakfast Bytes

QPC Security - Breakfast Bytes

Written by: qpcsecurity
Listen for free

About this listen

Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, and your time. Felicia is the vCISO and security architect at QPC Security / Quality Plus Consulting.

🎧 Let’s Talk Cybersecurity—Together
With over 25 years of hands-on experience in network-layer protection and cybersecurity strategy, we’re here to make security simple and accessible. Whether you’re a homeowner, a family, a retired professional, or running a small to medium-sized business, we’ve got solutions tailored just for you.

💡 No minimum seat count required—if you need help, we’re here for you.

🔒 Tune in, subscribe at qpcsecurity.podbean.com, and let’s build a safer digital world—one episode at a time.
🌐 Visit our website at qpcsecurity.com to learn more and book your appointment today!

Copyright QPC Security All rights reserved.
Economics Management Management & Leadership Politics & Government
Episodes
  • Is the Signature Worth the Squeeze? The Truth About Centralized Email Signatures
    Jan 5 2026
    Felicia King opens Breakfast Bytes with a sharp, practical question: is the “juice” you get from a centralized email signature platform worth the “squeeze” it takes to implement it? Through a series of real-world examples and clear stakes, she walks listeners from small teams that should keep signatures simple to larger organizations that need policy, tooling, and operational rigor. Along the way she exposes the conflict: marketing wants shiny banners, IT worries about deliverability and DNS changes, and third parties may see your outbound mail or inject tracking pixels. When signatures are mishandled, the consequence is not just ugly formatting — it can become a genuine business problem, even a “sales prevention” issue. Felicia closes with practical resolution: write a policy, empower managers, and choose platforms that preserve data sovereignty and utilize role-based control. It’s a compact, candid roadmap for anyone deciding whether to centralize email signatures — and how to do it without breaking email. Felicia discussed the implications of email signature management platforms, highlighting security risks and operational challenges while emphasizing the need for organizations to weigh benefits against potential drawbacks. She provided guidance on email signature policies, recommending manual management for small organizations and centralized systems for larger ones, while stressing the importance of written policies and technical implementation tools. Felicia advocated for empowering managers to independently handle email signatures through appropriate training and accountability, contrasting this approach with organizations that rely on IT support, and emphasized the benefits of centralized platforms for branding, compliance, and data integrity. Email Signature Management Security Risks Felicia discussed the implications of using email signature management platforms, emphasizing the need to weigh the benefits against potential security risks and operational challenges. She highlighted that email signatures can affect email deliverability, as elements like hyperlinks and embedded graphics are subject to security scanning by recipient email systems, potentially leading to emails being marked as spam or blocked. Felicia also noted that many platforms are IT-centric, limiting staff involvement, and suggested considering whether department managers could handle email signature management effectively. Email Signature Management Guidelines Felicia discussed email signature policies, explaining that organizations with fewer than 10 employees should manage signatures manually through a written policy and staff training. For larger organizations, she recommended implementing a centralized email signature management system to handle the increased volume of business. Email Signature Policy Implementation Felicia emphasized the importance of having a written email signature policy, especially for organizations with 10 or more employees, to prevent the inclusion of excessive hyperlinks in outbound emails, which can lead to poor email scores. She highlighted the need for technical policy implementation tools and advised against attempting to configure email security settings like SPF, DKIM, and DMARC without involving a CTO, as many IT professionals still struggle with these configurations. Felicia also stressed that requesting whitelisting from recipients due to poor email deliverability is counterproductive and undermines an organization's security posture. Email Signature Management Best Practices Felicia emphasized the importance of professional assistance for DNS record and email signature implementations, warning against self-service approaches that often lead to poor outcomes. She highlighted the need for organizations to remove existing email signatures from end-user devices and modify onboarding policies to prevent signature-related issues. Felicia also raised concerns about third-party email signature platforms' practices of injecting tracking pixels, suggesting that Crossware offers a more privacy-friendly solution by deploying its platform in the client's own Azure tenant. Email Signature Management Empowerment Felicia discussed the benefits of hosting email management platforms, emphasizing data sovereignty and control over email visibility. She highlighted the importance of empowering managers to directly manage email signatures for their teams, rather than relying on the IT department. Felicia suggested a tool that allows authorized individuals to manage email signatures for specific groups within an organization, avoiding broad administrative access that could lead to inefficiencies in larger or more complex entities. Email Signature Management Empowerment Felicia emphasized the importance of empowering employees to manage their email signatures independently, requiring operational maturity and clear policies. She argued against the common practice of involving IT to assist ...
    Show More Show Less
    28 mins
  • AI, Fraud & the CTO: Navigating Counterparty Risk
    Dec 4 2025

    Host Felicia King weaves a sharp, personal narrative that ties together AI, fraud, vendor selection, and the critical role of a competent CTO. With candid anecdotes and hard-earned lessons, she explains why tightly-scoped AI — used by skilled experts with robust governance — can feel like a $150K colleague, and why poorly governed AI or flashy vendor promises can be catastrophic.

    Felicia recounts real examples: AI misestimating project hours, DDoS services sold as a bargain that hide downstream costs, and an enterprise outsourcing APIs to a freelance developer — each story revealing the hidden risks that lurk when counterparty relationships, transparency, and technical competency are ignored.

    Through clear guidance and provocative questions about trust and vendor behavior, she urges listeners to prioritize people they know, insist on disclosure, and secure CTO-level expertise to interpret AI claims and perform rigorous risk assessments. This episode is a practical wake-up call for leaders navigating the modern intersection of AI and operational risk.

    Quick recap

    Felicia discussed the proper implementation of artificial intelligence in business operations, emphasizing its value as a tool when used correctly under human oversight. She addressed the growing threat of AI-driven fraud and the importance of robust identity verification processes, introducing a service to help build trust between service providers and customers. Felicia stressed the significance of selecting IT vendors based on trust and transparency, advocating for the role of a Chief Technology Officer to navigate complex technical and business risks while ensuring proper risk management and security standards are maintained.

    AI Implementation and Human Oversight

    Felicia discussed the convergence of several interconnected topics, including artificial intelligence, fraud detection, and vendor selection. She emphasized the importance of proper AI implementation, highlighting its potential to act as a valuable asset when used correctly. Felicia also addressed the limitations of AI, noting that it excels at analyzing pre-engineered designs but should not be relied upon to create them. She stressed the need for human oversight and expertise when using AI tools, cautioning against the dangers of substituting AI for skilled professionals in critical roles.

    AI Fraud Prevention Strategies

    Felicia discussed the increasing threat of AI-driven fraud, highlighting the low financial and time investment required for criminals to create convincing deepfakes. She emphasized the importance of robust Know Your Customer (KYC) processes and multi-factor authentication, noting that these systems often create unnecessary friction for non-technical users. Felicia introduced a service called Professional Residential to address these issues, providing ongoing training and support to build trust between service providers and customers. She also explained the importance of validating customer identities, particularly for sensitive operations like vault access, and stressed that effective fraud prevention relies on maintaining consistent, human relationships with customers.

    Trust and Transparency in IT Vendors

    Felicia discussed the importance of selecting IT service providers based on trust and transparency rather than solely on technical metrics or past performance. She emphasized the need for open communication and mutual trust, warning against vendors who might be dishonest or introduce counterparty risk. Felicia also highlighted the importance of understanding the technical details of a vendor's offerings, using an example of a UCAS system where she discovered undisclosed technology through AI analysis.

    CTO's Role in Risk Management

    Felicia discussed the importance of having a Chief Technology Officer (CTO) to navigate complex technical and business risks. She shared examples of issues that could arise without proper risk assessment, such as high costs for unneeded services and lack of visibility into traffic. Felicia emphasized that only a CTO could identify these risks and make informed decisions. She also highlighted the dangers of using APIs without adhering to security standards and the importance of supply chain risk management. Felicia concluded that organizations need a CTO to help navigate these complex issues and avoid being vulnerable to potential threats.

    Show More Show Less
    28 mins
  • Choose Competence, Not Cheap: Smart Vendor Selection for Leaders
    Oct 30 2025

    On this episode of Breakfast Bytes, Felicia King tells the story of how simple, everyday choices—like a tax method or an internet contract—become high-stakes business decisions. Through vivid examples about mileage rates, S‑corp elections, and a seven‑year ISP contract that could cost tens of thousands, she reveals how knowledge turns ambiguity into power.

    As the narrative unfolds, you’ll follow a CEO learning to ask the right questions, to spot public‑facing security failures, and to judge vendors by demonstrated competence rather than the lowest price. Each example becomes a lesson in risk, cost of ownership, and contextual trust.

    By the end of the episode, you’ll have a clear, story‑driven framework: arm yourself with focused expertise, engage strategically with advisors, and select partners who earn their place through competence—because smart decisions protect your business and its future.

    Felicia emphasized the importance of informed decision-making in business, particularly when selecting vendors and service providers, and discussed the value of building a knowledge base through regular engagement with strategic advisors. She highlighted the significance of understanding complex topics like S-Corp taxation and evaluating competency when selecting professionals, while also stressing the need for thorough research and consultation with experts. Felicia also discussed the importance of assessing counterparty risk and selecting IT service providers based on competency rather than just cost, emphasizing the need for professional management and active participation in risk management discussions. Informed Decision-Making for Business Leaders Felicia King discussed the importance of informed decision-making in business, particularly when selecting vendors and service providers. She used examples like tax planning and internet connection choices to illustrate how having a basic level of expertise allows business leaders to better evaluate competency and make strategic decisions. Felicia emphasized that while business leaders don't need to handle every detail themselves, they should be well-informed enough to make key risk management and strategic decisions, potentially saving significant amounts of money over time. Strategic Advice for Informed Decisions Felicia discussed the importance of building a knowledgebase through regular engagement and discourse with strategic advisors, such as a chief technology officer, to prevent problems and make informed decisions. She used the example of choosing between the standard mileage rate and actual mileage for tax purposes, emphasizing the need to understand the implications and burden of compliance. Felicia highlighted the value of expert advice in strategic decisions, such as determining the most suitable method based on specific use cases like frequent vehicle changes. S-Corp Taxation Considerations Felicia discussed the complexities of S-Corp taxation and its implications for businesses, emphasizing the importance of understanding the costs and benefits before making an election. She highlighted the need for thorough research and consultation with professionals to avoid compliance issues. Felicia also stressed the significance of evaluating competency when selecting professionals, using examples from both accounting and technology industries to illustrate her points. Counterparty Risk Assessment Importance Felicia discussed the importance of assessing counterparty risk, noting that organizations often fail quickly in these assessments. She emphasized that a poor public-facing security posture can deter potential clients and reflect poorly on the organization's overall IT capabilities. Felicia highlighted that many security issues are relatively easy to fix and suggested that professional management is necessary for maintaining a secure configuration. IT Provider Selection Strategy Felicia discussed the importance of selecting IT service providers based on competency rather than just cost, emphasizing that trust must be contextual and not blanket. She highlighted that organizations should engage in informed decision-making processes, read technical documents, and participate actively in risk management discussions. Felicia also advised against comparing IT spending with peers due to varying business needs and encouraged businesses to allocate at least 15% of their revenue to technology expenditures, especially for those with under $20 million in revenue.
    Show More Show Less
    28 mins
No reviews yet