Biz and Tech Podcasts > Business > Business & Bytes Podcast
Last Episode Date: 04/02/2025
Total Episodes: Not Available
John Hansman, an astute business leader and podcast host, is well-versed in the intricacies of cybersecurity challenges faced by small businesses. As the host of the popular "Business Invites" podcast, John provides valuable insights and discussions on prevalent issues such as business email compromises and invoicing scams. With a keen eye on current events, John frequently references real-world cases to highlight the importance of cybersecurity, drawing from notable incidents such as the substantial financial loss faced by "Shark Tank" star Barbara Cochran, who fell victim to a $388,000 invoicing scam. Through his work, John plays a crucial role in educating entrepreneurs on safeguarding their businesses from cyber threats. Welcome to Episode 21 of the Business and Bytes Podcast! Today's episode kicks off with an essential discussion led by our host, John Hansman, about a prevalent threat to businesses—business email compromises, especially invoicing scams. In the context of a recent incident involving "Shark Tank" star Barbara Cochran, who fell victim to such a scam, John delves into the mechanics of how these deceptions occur and shares crucial tips on what businesses can do to protect themselves from similar pitfalls. Following this impactful segment, we transition into an inspiring interview with our guest, Dominique Getchman, the Development and Communications Manager at Together, a non-profit in Olympia. Dominique shares her remarkable journey from a teenage mom to a boxing manager and then to a model, underscoring the lessons she's learned in business and life. She offers insights into overcoming obstacles, seizing opportunities, and how all of these experiences have equipped her to make a difference in her current role. Whether you're looking to safeguard your business or seeking inspiration from real stories of triumph and resilience, this episode promises to deliver valuable insights and motivation. Let's dive in! 00:00 Email Scam: Invoice Fraud Exploit 03:27 Email Security and Red Flags 07:36 Together We Advance Student Wellbeing 11:44 Networking Journey: Lessons and Insights 14:45 Hawaiian Fighter's ESPN Opportunity 18:59 Lessons in Resilience and Belief 21:25 Pursuing a Modeling Career 23:09 Modeling Industry Challenges and Success 26:28 Modeling Industry Challenges 30:14 Balancing Relationships and Self-Interest 34:06 Bridging Gaps in Education System 36:22 Building a Foundation for Success 39:38 "Advice for Aspiring Models" 43:51 Managing Business Stress 45:59 "Supporting Thurston Students Together"
Welcome to the latest episode of the Business and Bytes Podcast. Today, we delve into a critical and timely topic: the recent wave of cyberattacks on telecom companies, reportedly orchestrated by Chinese hackers, and what it means for businesses and individuals alike. I'm your host, John Hansman, joined by my co-host, Emelio Mejia, CEO of AM3 Tech and Cybersecurity, and cybersecurity expert Todd Thorson from Tang Cyber Security. In this episode, we'll explore how these breaches impact the security of your personal and business communications, the vulnerabilities in our digital infrastructure, and the escalating measures needed to protect sensitive data. We'll hear insights on the importance of security and awareness training for employees, the effectiveness of multiple security layers, and why relying on professional technology consultants is crucial for robust cybersecurity. Our discussion will touch on the rise of phishing attacks, the economic toll of cyber scams, and the subtleties of messaging security—with recommendations for safer communication practices. Join us as we unpack these issues, bringing you up to date on how to fortify your defenses in an increasingly perilous digital landscape. Security and awareness training, cybersecurity risks, data transmission security, security layers, professional consultation, telecom breaches, Chinese hackers, Emilio Mejia, Todd Thorson, Tang Cyber Security, AM3 Tech and Cybersecurity, AT&T, Verizon, SMS text vulnerability, RCS messaging, encrypted messaging, WhatsApp security, outdated devices, government espionage, IT support, comprehensive security services, proactive cybersecurity, phishing attacks, cyber-attacks, data breaches, responsibility for cybersecurity, small business cybersecurity, phishing attack volume, economic impact of cyber scams, government-sponsored hacking, social engineering risks. 00:00 Business podcast hosts discuss telecom breaches. 03:47 Hackers spying on conversations; SMS insecurity acknowledged. 09:10 Chinese-sponsored hackers pose threat using information. 11:31 Avoid sending sensitive information via text/SMS. 16:36 Espionage reveals telecom vulnerabilities; protection needed. 17:40 Even huge companies struggle with cybersecurity protection. 22:04 Frequent security attacks blocked successfully. Client surprised. 25:32 Focus on security and awareness training education. 29:55 Ensure data transmission security and encryption tools. 32:50 Prioritize security; diversify and plan wisely. 34:16 Prioritize cybersecurity in IT support services.
Introduction: Welcome to another insightful episode of the Business and Bytes Podcast. I'm your host, John Hansman, and today, we're diving deep into the evolving world of coworking spaces and cybersecurity. Our special guest is Ann Long, founder of Burbity Workspaces in Spokane, Washington. Ann's mission is to combat the loneliness epidemic and foster a sense of belonging in the workplace. We'll explore how Burbity Workspaces provides flexible office solutions for everyone from sole proprietors to multinational companies, and the unique features that make these spaces ideal for collaboration and networking. Additionally, we'll discuss vital cybersecurity measures that businesses must adopt, including the use of passkeys, two-factor authentication (2FA), and the significance of employee training against phishing attacks. If you want to learn how coworking can benefit your business and how to keep it secure, this episode is for you. Let's get started! About John Hansman: John Hansman has a lifetime of experience in diverse work environments, having navigated nearly every conceivable space configuration. With a career marked by a journey through various sizes and types of spaces, John brings invaluable insights into the world of co-working spaces. He has dedicated several years to understanding and enhancing these collaborative environments, recognizing their immense value to the business community. John's expertise not only spans the practical benefits of co-working spaces but also includes spotting emerging trends that shape how businesses of all sizes operate today. His deep-rooted knowledge and adaptive experiences make him a pivotal figure in the ongoing evolution of collaborative workspaces. 🌟 Special Guest: Ann Long Ann Long, the visionary behind Burbity Workspaces in Spokane, Washington, shares her journey and insights into the importance of coworking spaces for entrepreneurs, remote workers, and large enterprises. Learn how these spaces are not just about renting desks but fostering a community that promotes connection, collaboration, and, ultimately, business success. Website:https://burbity.com/ Contact: (509) 255-7275 Email: Ann@burbity.com Time Stamp 13:50 Started working in Liberty Lake drop-in space. 18:52 Collaboration improved with office return plan. 20:44 Remote work raises trust and efficiency concerns. 25:59 Frequent networking events offered at Sullivan location. 29:07 Office space enhances business professionalism and client interactions. 32:08 Discussing underused two-factor authentication benefits. 34:53 Passkeys enhance security by eliminating code sharing. 37:30 Consider Apple's password tools, password managers. _______ loneliness epidemic, coworking spaces, Ann Long, Burbity Workspaces, U.S. Surgeon General, Sullivan location, Liberty Lake location, John Hansman, in-person work, remote work, coworking space amenities, enterprise-sized companies, flexible coworking spaces, lease liabilities, commercial rent commitments, shorter lease agreements, new businesses, cost savings, meeting rooms, event spaces, drop-in options, virtual offices, high-walled cubicles, pods, workspace flexibility, satellite offices, networking events, speed networking, business email compromises, two-factor authentication, passkeys.
Welcome to Episode 18 of the Business and Bytes Podcast! In this engaging episode, our host John Hansman sits down with cybersecurity expert and entrepreneur Reginald Andre. Andre shares his compelling journey from working 18-hour days for nine years only to face financial turmoil and a restrictive non-compete agreement. Forced to start anew, he founded Arc Solvers from his mother’s house, initially targeting residential clients. As cybersecurity threats grew, Andre pivoted to serve commercial clients with a proactive, subscription-based model. He draws parallels to the strategic shift seen in transportation from taxis to Uber. Through his media appearances, consistent podcasting, and strategic social media presence, Andre has built a reputable and rapidly growing cybersecurity firm. Join us as we dive deep into his entrepreneurial journey, the challenges he faced, the strategies he employed, and his insights on creating a proactive cybersecurity culture. Alongside, host John Hansman reflects on his own experiences, paralleling Andre’s journey with adapting business strategies during the Covid pandemic. Get ready for an inspiring conversation rich with lessons on resilience, innovation, and the power of building a positive digital footprint. 00:00 Start with awareness, training, communication, and policies. 03:35 Improve cybersecurity through employee training and awareness. 08:25 Multimillionaire offers partnership in technology business. 13:00 Grinding, building relationships, despite obstacles, knocking doors. 14:17 Evolving threats prompted cybersecurity business model upgrade. 17:39 Business shifted to at-home computer repair service. 21:25 Prepare concise comments; contact news stations promptly. 24:24 Producer verification crucial for live TV appearances. 28:37 Showcase connections to genuinely engage and sell. 29:57 First podcast interview for a reboot! Grateful. Andre's info Website: https://arksolvers.com/ Security Squawk Podcast:https://podcasts.apple.com/us/podcast/security-squawk-the-business-of-cybersecurity/id1544342775
We're going to talk ab out how we're rebooting the Business and Bytes Podcast.
Welcome back to the Business and Bytes Podcast, where we dive deep into the strategies and technologies essential for protecting your business in our digital world. I'm your host, Emelio Mejia, joined by my co-host, John Hansman. In today's episode, Part II of our series on cybersecurity, we continue to explore the critical measures to safeguard your business against cyberthreats. We'll discuss the importance of encryption, from your emails to hard drives, and why backing up your data is not just a good practice but a necessity for business continuity. John will share his personal insights on being prepared for emergencies, emphasizing the significance of a rehearsed plan for cyber incidents. We'll also touch on the pivotal role of employee training in strengthening your company’s cyber defenses, and why even small businesses should consider specialized security support. Stay tuned as we lay down the fundamentals of web gateway security, mobile device management, and firewalls to secure your digital assets. By the end of this episode, you'll have a clearer understanding of how to prevent, identify, and react to cybersecurity threats in our continuously evolving digital landscape. So, let's get into it! Support the show by subscribing to our Facebook Account: https://www.facebook.com/businessandbytes AM3 I.T. & CyberSecurity : https://web.facebook.com/AM3Technology Truit : https://web.facebook.com/truitmsp Timestamps for your reference: 00:00 Solopreneurs need to focus on these 15 ways. 05:51 Warning about using same passwords across platforms. 08:30 Data logs critical for investigation, time-sensitive retrieval. 12:58 Quick response to security issue, customer appreciation. 14:35 Extend Microsoft logs retention with real-time ingestion. 19:30 Tech bubble restricts access, adds security layers. 20:38 Employers offering secure phone options to employees. 25:37 Encrypt sensitive data, especially when traveling. 29:33 Backups are crucial for business data protection. 33:31 Plan ahead to avoid panicked decision-making. 35:33 Agree on the need for cybersecurity insurance. 38:10 Contact us for nationwide compliance support.
"It doesn't matter how many security tools you have in place if the person is just going to open the front door and let them in." Welcome to Episode 15 of the Business and Bytes Podcast, where we delve into the critical world of cybersecurity basics under the shadow of a concerning trend: ransomware gangs joining forces. I'm your host Emelio Mejia, accompanied by co-host John Hansman. Today, we're inspired by a recent high-profile cyberattack on the MGM Grand, which experienced a staggering $100 million loss due to the nefarious activities of a newly formed American ransomware group collaborating with seasoned cybercriminals from Russia. In this episode, we'll explore the pivotal role of social engineering in this attack and the broader challenges businesses face in securing their digital frontiers. We'll discuss why cybersecurity isn't just about technology but also about understanding human behavior, the critical importance of regular and robust security training, and why relying on free antivirus tools might be a risky move for businesses. Furthermore, we'll break down why multifactor authentication is a must-have in today's digital age, and highlight the real-world consequences of cyber incidents—from financial losses to power outages. Join us as we unpack these topics and equip you with a 15-point checklist to safeguard your business from such dire cybersecurity threats. Stay tuned! Support the show by subscribing to our Facebook Account: https://www.facebook.com/businessandbytes Timestamps for your reference: 00:00 Attacks on IT infrastructure, password reset breach. 07:16 Big companies need new vetting processes for calls. 10:27 Cybersecurity is crucial due to real consequences. 14:50 US hacker providing tips to foreign hackers. 15:34 Cybercriminals wait, learn about your behavior. Importance of cybersecurity for small businesses. 19:04 Security assessment is just the starting point. 24:58 Ransomware often comes through socially engineered email. 27:11 Security awareness training essential for business protection. 30:09 Free antivirus and technology come with costs. 33:09 Importance of multifactor authentication in cloud security. 35:43 Discussion about the importance of computer updating. 39:27 Issues with cybersecurity policy and ongoing management.
"I have not bought any ads in the four years that company has existed. I have not purchased one ad. I have not. Not on Google, not on Facebook, nowhere. I've just focused on making really great content and making sure that the search on the back end pulls up." Welcome back to the Business and Bytes Podcast! I'm your host, John Hansman, joined by my co-host, Emelio Mejia. Today, in Episode 14, we have a fantastic guest joining us – Alyssa Bryson, the vice president of community development at Work P2P and former director at King Five. Alyssa has a wealth of experience in traditional media and business development, and we're diving deep into how businesses can create an audience and loyal fans in today's shifting media landscape. In this episode, Alyssa shares her journey from managing a large team at King Five to steering event logistics at Work P2P. We'll talk about the intricacies of handling logistics for massive events, transitioning from traditional media to leveraging AI tools like cast magic for podcast production, and the strategies to enhance podcast visibility. Moreover, we'll explore the delicate balance between utilizing technology and maintaining a human touch in content creation. Alyssa emphasizes the importance of having a clear message and brand story, which she learned from her experience in publishing and television. We'll also tackle the ever-present threat of AI voice scams and the precautionary measures one can take to safeguard against them. Tune in as we delve into the practicality of podcasting for different business models and discuss the potential of YouTube as a powerful platform for reaching audiences. Alyssa's insights on SEO, niche targeting, and the shift towards self-serving marketing tools will equip you with the knowledge to grow your audience effectively. Don't miss this engaging conversation with Alyssa Bryson on the Business and Bytes Podcast, where we discuss the intersection of business know-how and the latest in digital technology. Let's get started! Support the show by subscribing to our Facebook Account: https://www.facebook.com/businessandbytes Timestamps for your reference: 00:00 Experienced individual with roots in small town. 07:24 Son’s Crohn's diagnosis prompted magazine career break. 13:13 Rebranded business serving large corporate clients globally. 19:27 Creating pop culture magazine, seeking contributors. 23:26 Google Analytics favored, WordPress user for analytics. 29:16 Personal website uses AI to improve content. 36:24 Transcribe video with caution, typos matter. 40:16 Podcast aims to support business owners' growth. 45:52 Media landscape constantly changes, good stories remain. 50:26 Use web programs to create fake audio. 56:03 Need parents conversation about email security importance. 01:01:36 Personal website: elisebryson.com, sobercurator.com. Google for more.
"because while marketing is a lot of creativity, and that's one of my favorite pieces, it's a lot of analytics as well, and you have to be able to read those results and read those reports to understand how to do better in the future. Otherwise, you're kind of just guessing." In this enlightening Episode 13 of the Business and Bytes Podcast, hosts Ceci Robinson, Emelio Mejia, and John Hansman delve into the multifaceted realm of marketing strategies. The discussion begins with Ceci Robinson highlighting the necessity of dedicated planning time for marketing strategies, followed by Emelio Mejia's revelation on his initial confusion between marketing and sales, and the vital role of relationship building. The trio then navigates the use and benefits of CRM systems for maintaining sales communication and leads management, cautioning against the use of consumer email services for business communication due to security and access risks. They reflect on personal experiences of using free email accounts versus domain emails, the implications for trust and professionalism, and the appearance of credibility. The conversation covers the significance of brand awareness and lead generation, particularly at trade shows, and the indirect impact marketing has on sales. Emelio and John encourage frequent and strategic engagement with leads, using trade shows as timely opportunities to expand one's network. Technical difficulties briefly interrupt the audio, but the hosts press on to discuss marketing's role in business growth, the ideal budget allocations for marketing, and the necessity of understanding social media platforms based on customer behaviors. As the chat progresses, hosts debate the cost-effectiveness of various marketing tools, the importance of consistent branding, and strategic allocation of a marketing budget considering business age and type. The episode concludes with insights on aligning IT with business goals, understanding analytics for marketing improvement, and the strategic use of social media platforms for engaging content. It’s an episode brimming with insider knowledge tailored to refine marketing approaches and cultivate business success. Support the show by subscribing to our Facebook Account: https://www.facebook.com/businessandbytes Timestamps for your reference: 00:00 Establish marketing budget based on revenue percentage. 05:39 Business owner reluctant to use Instagram, unsure. 07:58 Choose platforms based on customer behavior and intent. 14:04 Utilize customer data for personalized experiences efficiently. 16:46 CRM coaching for effective platform utilization options. 20:02 Allocate funds wisely for effective marketing partnerships. 23:59 Used various strategies for marketing, seeking advice. 25:01 Diverse marketing strategies cater to different businesses. 29:53 Engage differently based on time span. Email introduction. 34:31 Build relationships, not push products. Nurture leads. 38:09 Importance of brand foundations and marketing plan. 39:34 Plan marketing strategy to ensure successful campaigns. 42:37 Ensure targeting right leads and nurture relationships. 46:09 Businesses should avoid using consumer email services. 49:38 CRM platforms do not support Gmail linkage. 52:50 Noise, open windows, Gmail account for professionalism. 56:03 Expresses gratitude and acknowledges everyone present. Book a Consultation with Ceci at www.therpcreatives.com
"So rest is just like the sports season. There's a season for every part of your life in business. And the rest season, this is your slow season, right? And so it's time to rebuild, recharge, refocus. What worked well, what didn't. And this is you can apply this to your team, you can apply this to your own life, to your family, but also in that rest season, you're asking yourself, what is allowed to go in this season and what is not allowed to go in this season? Because that's where we get stuck, right? Is we try to do all the things all the time, but in order." Welcome back to Business and Bytes Podcast. In this eye-opening episode, "EP12 - Cheree Sauer's Guide to Avoiding Burnout and Building a Sustainable Business," hosts Emelio Mejia and John Hansman sit down with Cheree Sauer, CEO of Success Without Sacrifice, to tackle the critical issue of entrepreneurial burnout. Cheree brings valuable insights on maintaining balance, preventing burnout, and the "ramp method" – a framework that helps entrepreneurs navigate their own rest, align, master, and peak seasons. Additionally, the episode delves into the significance of recognizing and addressing the various symptoms of burnout, from chronic fatigue to a loss of motivation, all through the lens of personal experiences shared by our hosts and guest. On the tech front, we're covering the heightened need for cybersecurity in today's digital era, discussing recent incidents like the supply chain attack on three CX and a concerning data breach at Microsoft. Our discussion underscores the importance of implementing layered security measures to protect your business. Join us for an episode brimming with invaluable advice that's sure to resonate with entrepreneurs, small business owners, and C-level executives alike. Support the show by subscribing to our Facebook Account: https://www.facebook.com/businessandbytes Timestamps for your reference: 00:00 Being a stay-at-home mom taught self-care importance. 07:01 Embrace present, stop chasing, prioritize self-care. 12:07 Athletes need rest for peak performance. 16:33 Building a sustainable business takes time. 22:47 Questioning worthiness, people pleasing, and uncovering beliefs. 28:21 Entrepreneur shares experience, expands business with help. 35:50 Assess your energy, offload what's draining you. 38:11 Understanding motivation and leadership for business owners. 43:30 Listen to your body's signs and signals. 53:46 Microsoft has many security tools available. 55:39 Microsoft under threat after Russian retaliation, small businesses vulnerable. 01:00:20 Grateful for Cherie, stay tuned for more.
Discover new partners and
collaboration opportunities —right in your inbox.
Get notified about new partnerships