Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
00:00.23 seconds : CLICK! or TAP! That's how long it takes to lose all of your information these days.There is more information stored on cell phones and computers than ever before, and it is much more important than it used to be. Know Tech Talk host Barbara Paluszkiewicz is known for her ability to present highly technical information in a clear and easy to understand manner, educating business owners and executives on how to keep their business data SAFE and SOUND. Data breaches, Cyber-At ...
…
continue reading

1
Why Cloud Identity is Your New Front Line in Cybersecurity
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
…
continue reading

1
The Future of Work: Why the Modern Desktop Experience Changes Everything
10:27
10:27
Play later
Play later
Lists
Like
Liked
10:27Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
…
continue reading

1
IT Lifecycle Management: The Foundation of Secure Operations
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:1540% higher IT costs. Unpatched security gaps. Former employees still accessing company data. These are just a few of the risks businesses face when they don’t have a structured IT lifecycle strategy. Most organizations focus on cybersecurity tools but overlook the foundational issue: lifecycle management. Without a plan for tracking, securing, and …
…
continue reading

1
From Detection to Action: How SOAR Stops Cyberattacks in Minutes
15:40
15:40
Play later
Play later
Lists
Like
Liked
15:40287 days. That’s how long it takes—on average—to detect and contain a breach. Cybercriminals aren’t waiting for you to catch up. With automated attack methods and round-the-clock threats, small to mid-sized businesses (SMBs) can’t afford slow response times. Traditional security tools detect threats - but without automation, attackers have the uppe…
…
continue reading

1
Why SIEM and Threat Detection Are Foundational for SMB Cybersecurity
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Cybercriminals aren’t just targeting enterprises anymore. SMBs are in the crosshairs, and the consequences are costly. A single data breach can cost an SMB over $3 million, yet many businesses still lack the visibility needed to detect threats before it’s too late. In this episode of Perimeter Perspective, hosts Michael Moore and Alyssa Birchfield …
…
continue reading

1
How MXDR Protects SMBs from Cyber Threats
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:2760% of small businesses close within six months of a cyberattack. Cyber threats are evolving, and small to mid-sized businesses are becoming prime targets. Traditional security solutions—like standalone antivirus and firewalls—leave dangerous gaps that attackers exploit. Businesses need a proactive, unified approach to threat detection and response…
…
continue reading

1
Ep. 94 – Automate to Elevate: Barb Talks with George Smith from Rewst
22:10
22:10
Play later
Play later
Lists
Like
Liked
22:10If you're with an IT provider who is slow to respond, constantly missing deadlines or fixing the same issues over and over again, have you ever stopped and wondered why? Maybe it isn't their workload, it's their workflow. Is their checklist in their head? Are they simply forgetting things? Frank Abagnale – famously portrayed by Leonardo DiCaprio in…
…
continue reading

1
Zero Trust SaaS Security: Protecting Your Apps, Identities, and Devices
11:09
11:09
Play later
Play later
Lists
Like
Liked
11:09Ready for SaaS security without the complexity? Managing SaaS security is becoming one of the biggest challenges for IT teams. With employees using apps like Salesforce, Dropbox, and countless others, businesses struggle to keep access secure without adding friction to everyday workflows. Legacy security approaches—like VPNs and standalone logins—f…
…
continue reading

1
How Network as a Service (SASE) Empowers Mid-Market IT Leaders
9:20
9:20
Play later
Play later
Lists
Like
Liked
9:20Are You Ready to Scale Securely? For mid-market businesses, staying secure while growing your IT infrastructure is no easy task. Legacy solutions like VPNs can leave your network vulnerable, while the costs and complexity of piecing together security tools can overwhelm even the best IT teams. What’s the solution? Network as a Service (SASE)—a clou…
…
continue reading

1
How to Prepare Your Business for the End of Windows 10
10:24
10:24
Play later
Play later
Lists
Like
Liked
10:24Are you ready for October 2025? The end of Windows 10 is more than a deadline—it’s a wake-up call for businesses relying on outdated systems. What’s your plan to stay secure, compliant, and ahead of the curve? In this episode of Perimeter Perspective, we dive into the critical implications of Windows 10’s end of life, scheduled for October 14, 2025…
…
continue reading

1
Welcome to Perimeter Perspective: Expanding the Boundaries of Cybersecurity and IT
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52In this inaugural episode of Perimeter Perspective, we introduce the podcast, its mission, and the value it brings to IT leaders, business owners, and tech enthusiasts. Learn what Perimeter Perspective is all about, the topics we’ll cover, and why cybersecurity and IT innovation are more critical than ever. Whether you're navigating zero trust arch…
…
continue reading

1
Ep. 93 – Cyber Safe or Sorry: Navigating Insurance and Warranties in Digital Defense with Nick Wolf from Cork
18:44
18:44
Play later
Play later
Lists
Like
Liked
18:44A ransomware attack occurs every 14 seconds. Cyber attacks occur once every 39 seconds. The average ransomware attack costs a company $170,000! Does your business need cyber insurance? Is cyber insurance really worth the investment? What is a cyber warranty? Barb speaks with Nick Wolf, part of Cork’s Leadership Team about Cyber Warranties. 0:00 – B…
…
continue reading

1
Ep. 92 – AI Unleashed: Steering The Transformation Of Our New Reality with Jimmy Hatzell from Hatz AI
25:19
25:19
Play later
Play later
Lists
Like
Liked
25:19AI – It's everywhere nowadays, reshaping our reality in ways we’ve only begun to explore. Barb goes in depth with Jimmy Hatzell – the intrepid co-founder and CEO of Hatz AI – exploring his vision and expertise to see how AI can empower, enhance and encourage transformation for MSPs and their clients. 0:00 – Barb's Introduction 0:46 – Who is Jimmy H…
…
continue reading

1
Ep. 91 – Selling Your MSP – Insider Advice and Avoiding Mistakes with Michael Contento from F12.net
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24Our guest, Michael Contento, is a seasoned expert who has journeyed through the whole life cycle of an MSP. We hear about Michael's story and gain invaluable insights on the MSP landscape in Canada, the dynamics of mergers, what to look for in an acquisition, and the hurdles owner-operated MSPs face. Whether you're a budding MSP looking to scale or…
…
continue reading

1
Ep. 90 – Guarding The Gates: The Power Of IT Assessments with Matthew K. Koenig from Nodeware
29:44
29:44
Play later
Play later
Lists
Like
Liked
29:44Small businesses require a simple plan to protect themselves from cyber crime. Cyber attacks are unexpected, and these attacks seem to be on the increase. The good news is the majority of cyber crimes can be prevented, and a network assessment performed by an MSP is pivotal to improving security within an organization. Matthew K. Koenig from Nodewa…
…
continue reading

1
Ep. 89 – Unlocking the Symphony: Managing IT Environments with Precision and Harmony with Shawn Sailer from Liongard
19:27
19:27
Play later
Play later
Lists
Like
Liked
19:27In this grand symphony of small business IT, every instrument, every section plays its part. But as we know, in any great performance, a single note change can influence the whole piece. This raises a crucial question: How does a business keep track of all the subtle changes in each section? Shawn Sailer from Liongard joins Barb to explain how tool…
…
continue reading

1
Ep. 88 – Unveiling the Secrets of the MSP Industry: Insights from a 20-Year Technology Journalist - Rich Freeman
30:47
30:47
Play later
Play later
Lists
Like
Liked
30:47In today's fast-paced business environment, technology has become an integral part of almost every aspect of operations. From communications, marketing to supply chain management and Cyber Security, ALL businesses rely heavily on technology. Journalists behind industry publications, conferences, social media and research reports provide a deep unde…
…
continue reading

1
Ep. 87 – Cybersecurity For Main Street: Cyberfit in 21 Days with Ann Westerheim of Ekaru
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20Consider this: 99% of the world doesn’t speak geek, nor do they understand cybersecurity and how to protect their digital assets. For the 1% of people who are familiar with terms like Privilege Escalation, Lateral movement and Seim, you might want to continue listening to understand how to communicate effectively to the rest of the world. Joining B…
…
continue reading

1
Ep. 86 – Does Your Business Need Cyber Insurance? With Desraie Thomas of DataStream Cyber Insurance
25:23
25:23
Play later
Play later
Lists
Like
Liked
25:23Does your business need cyber insurance? Truth is, cyber criminals are targeting smaller organizations because the smaller your business, the less prepared it is to guard itself against a cyber attack. Cyber insurance policies and riders have grown popular over the last decade as cybercriminals have become more cunning. Because of this, cyber insur…
…
continue reading

1
Ep. 85 – After the Acquisition With Michael Einbinder-Schatz
47:19
47:19
Play later
Play later
Lists
Like
Liked
47:19If you are thinking about selling your IT company chances are you have come full circle. The majority of MSPs are tech turned owner operators that grew a respectable businesses and now are done and want out. They can now take that long overdue vacation, treat themselves to something nice, pay back that line of credit and finally have some REAL mone…
…
continue reading

1
Ep. 84 – How To Keep Your Computer Safe From Crippling Pop-ups, Viruses, Spyware, & Spam, While Avoiding Expensive IT Bills? With Eddie Phillips of Malwarebytes
18:07
18:07
Play later
Play later
Lists
Like
Liked
18:07What is Malware? Do you constantly get hammered by pop-up ads that come from nowhere and infuriate you when using your computer? Does your computer run slow, act funny, or crash unexpectedly? Are you getting tons of spam from unknown senders? Did your internet browser suddenly change? If so, then your computer might be infected with malicious progr…
…
continue reading

1
Ep. 83 – What to know about NEW IT Security Threats and Cyber Insurance Coverage with Colin Knox from Gradient MSP
28:34
28:34
Play later
Play later
Lists
Like
Liked
28:34When was the last time you thought about the security and the health of your computer network? I know you are so darn busy running your business that you simply forget, until something major happens. Consider this a friendly reminder to get your network checked out – if nothing else, it’s a good way to get a third party review of your network’s sec…
…
continue reading

1
Ep. 82 – How to Manage All Your IT Hardware, Warranties and End Of Life Dates with Dan Wensley from ScalePad
26:57
26:57
Play later
Play later
Lists
Like
Liked
26:57Let me ask you a controversial question: When was the last time you took inventory of all the computers and devices in your organization? What is being backed up? Have you checked it? If you don’t know what hardware you own, or what software subscriptions you are paying for then you might be overpaying or getting underserved. Think of this. If you …
…
continue reading

1
Ep. 81 – How To Recharge When You Feel Drained With Ryan Markel from Markel.me
39:25
39:25
Play later
Play later
Lists
Like
Liked
39:25Did you know you are not supposed to use your mobile phone while it’s charging? When you use your phone while it’s charging, you are using more power than its being fed, and this screws up the battery. Did you also know that charging your phone overnight hurts the phone battery life? According to lifeside.com it is recommended that you charge your …
…
continue reading

1
Ep. 80 – No Geek Speak with Paul Green From MSP Marketing
25:38
25:38
Play later
Play later
Lists
Like
Liked
25:38How do you decide who to hire when you reach the point in your business when you realize – I need help with the IT? IT companies can look all the same, but who can you trust to partner with? It’s no secret that everyone preaches prevention, customer service. So how do you make sure you are comparing apples to apples instead of oranges to grapefruit…
…
continue reading

1
Ep. 79 - What Every Small Business Owner Must Know About Protecting And Preserving Their Company's Critical Data And Computer Systems with Fred Voccola CEO Kaseya
32:01
32:01
Play later
Play later
Lists
Like
Liked
32:01Businesses are spending more money on IT this year. Gartner predicts the global IT spend could reach $4.4 trillion this year and that’s despite rising inflation, the Russian invasion, chip shortages and talent shortages. Since we’re all leveraging technology as a competitive advantage, and looking to technology to solve our problems today, we’re go…
…
continue reading

1
Ep. 78 - What You Should Expect To Pay For IT Support For Your Business With Colin Knox
16:00
16:00
Play later
Play later
Lists
Like
Liked
16:00What should you expect to pay for IT support for your business? How do you make sure you know exactly what you are paying for? What are all the services you are buying to keep your business cyber safe? The computer industry is still young, and there are not many guides in place to protect consumers. How do you determine if the fees that are billed …
…
continue reading

1
Ep. 77 – How To Avoid Being Put Out Of Business By A Cyber Attack With Matt Lee
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41Our world has shifted online and it’s important that all of us make cybersecurity a priority. Let’s protect ourselves, our communities and our collective future. Remember: Human beings, devices, and applications all have identities. In your business, it is important to identify who your employees are, what account access they have and understanding…
…
continue reading

1
Ep. 76 - Password Policy Pitfalls. How Poor Password Practices Plague Personal Protection, Privacy and Patience
15:22
15:22
Play later
Play later
Lists
Like
Liked
15:22Have you ever locked yourself out of your own system because you can't remember your own password? How do you know you are actually talking to someone from your tech support department? Forced password resets can be a catch 22 because changing your password all the time creates problems and so does not ever changing your password. Announcing Jimmy …
…
continue reading

1
Ep. 75 – 2022 Cybersecurity Trends: How To Avoid Being A Victim Of A Cyber Attack With A Remote Workforce with Eric Anthony
18:42
18:42
Play later
Play later
Lists
Like
Liked
18:42Congratulations! if you haven’t had to deal with a cyber attack, or if you were compromised the consequences weren’t significant. It seems like every day has a new cyber attack. The new computer virus’ that are out there are much like all the new “covid variants.” They’re polymorphic which means they have the ability to change their code to evade d…
…
continue reading