UnHacked - Cybersecurity Made Simple for Small Businesses cover art

UnHacked - Cybersecurity Made Simple for Small Businesses

UnHacked - Cybersecurity Made Simple for Small Businesses

Written by: Phoenix IT Advisors
Listen for free

About this listen

When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best practices that give the highest ROI.© 2026 Phoenix IT Advisors Economics Leadership Management & Leadership
Episodes
  • 78. The Real Perimeter: Why Every Device in Your Business Is a Target
    Feb 26 2026

    Hosts:
    Justin Shelley - https://www.phoenixitadvisors.com/
    Mario Zaki - https://www.mazteck.com/
    Bryan Lachapelle - https://www.b4networks.ca/

    What happens when your laptop gets stolen and you forgot to lock it? In this episode of UnHacked, our hosts dive deep into endpoint security - the real perimeter of your business in today's digital world.

    Justin, Bryan, and Mario explore real-world examples of how endpoints (computers, phones, VPNs, smart devices) are compromised and share practical CEO-level guidance on protecting these critical access points. From VPN vulnerabilities to improperly configured guest networks, learn why 97% of breaches could be prevented with basic security measures.

    Key topics include: the four essential endpoint protection checks every CEO should perform, why "it's in the cloud" doesn't mean you're protected, the importance of detection systems alongside prevention, and how to hold your IT team accountable.

    Whether you're paying for managed IT services or handling security in-house, this episode provides actionable steps to verify your endpoints are truly protected. Don't wait until your business is the next cautionary tale.

    Show More Show Less
    49 mins
  • 77. The Hidden Cyber Threats Lurking in Your Business (That Your IT Guy Doesn't Even Know About)
    Feb 19 2026

    Hosts:
    Justin Shelley - https://www.phoenixitadvisors.com/
    Mario Zaki - https://www.mazteck.com/

    You can't secure what you can't see. In this critical episode of our baseline security series, Justin and Mario expose the dangerous reality of "shadow IT" - the hidden software, devices, and vulnerabilities lurking in your business that could be costing you everything.

    From TeamViewer installations left wide open to former vendors still having backdoor access years later, discover why even the most well-intentioned businesses are sitting ducks for ransomware attacks. Learn the shocking truth about unprotected home computers accessing corporate data, outdated backup software creating attack surfaces, and why "we moved to the cloud" doesn't mean you're safe.

    This episode delivers actionable steps every CEO needs to take THIS WEEK to identify their digital assets and close dangerous security gaps. Don't wait until you're the next headline - your business depends on knowing what you're protecting.

    Show More Show Less
    47 mins
  • 76. Courts Can Now Use Your ChatGPT History Against You (And Other Identity Nightmares)
    Feb 13 2026

    Hosts:
    Justin Shelley - https://www.phoenixitadvisors.com/
    Mario Zaki - https://www.mazteck.com/
    Bryan Lachapelle - https://www.b4networks.ca/

    Episode 76 kicks off a comprehensive multi-part series on baseline cybersecurity with a deep dive into identity and access control. The hosts reveal why courts can now pull your ChatGPT conversations in legal proceedings, and break down the critical difference between passwords and passphrases. Learn why shared accounts are a business owner's worst nightmare, discover the three essential Microsoft 365 security settings most companies miss, and understand why your ego might be your biggest security vulnerability. From conditional access policies to employee onboarding checklists, this episode provides non-technical business owners with actionable steps to protect their greatest asset - their business. The conversation includes real-world horror stories of access control failures and practical solutions for companies of all sizes.

    Show More Show Less
    50 mins
No reviews yet