All Episodes

January 16, 2024 63 mins

Grab a pint and pull up a chair as we toast to the ever-evolving world of cybersecurity with Digital Boardwalk's very own CTO, James. His 14-year saga at the forefront of IT innovation isn't just a thrilling tale of technology triumphs, it's a roadmap for businesses navigating the treacherous terrain of cyber threats. We share a beer and swap stories, from James's tech-tinged childhood to the professional pivot that positioned him as a captain of industry, all the while unpacking the dense and crucial subject of cybersecurity for small and medium-sized enterprises.

Settle in and savor the wisdom as we dissect the intricacies of crafting custom IT strategies that shield businesses from digital dangers. James takes us behind the scenes of Digital Boardwalk's proactive stance against cybercrime, spotlighting the unsung heroes: their engineers. With the landscape of threats transforming from simple viruses to complex ransomware, we stress the indispensability of multi-layered security measures—think of it as a fortress safeguarding your digital dominion. This discussion isn't just theoretical; it's a vital blueprint for fortifying your enterprise against the next wave of cyber onslaughts.

Our conversation wouldn't be complete without a deep dive into the future of cybersecurity, where the murky waters of AI intersect with our defenses against cybercrime syndicates. Delving into how AI is both an ally and adversary, we underscore the significance of zero-trust policies, cloud computing's role in security, and the importance of verifying the efficacy of protective measures. James illuminates the path forward, inviting you to stay vigilant and informed, ensuring that your business remains an impenetrable fortress in the digital age.

Sponsor of this episode:  Digital Boardwalk
Digital Boardwalk is one of the top 10 Managed IT Service Providers in the United States.  If you are seeking to outsource your IT Management, or if your IT Team could use some help with projects or asset management, give Digital Boardwalk a call today!  They offer a FREE IT Maturity Assessment on their website.  If you want to see how your business's IT scores against industry standards, go to GoModernOffice.com now.

Thanks for listening!
Visit us online at www.thenerdsontap.com
Subscribe to our YouTube Channel
Follow us on Instagram
Like us on Facebook

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Tim Shoop (00:00):
Hey everyone, welcome to another episode of Nerds On
Tap, where we get nerdy forabout an hour with some great,
great guests.
Today we are going to tacklecybersecurity and data
protection.
The name of today's episode isData Protection and Brew
Selection, but, as you can seethose of you that are watching

(00:23):
on video we only have one beerto drink.
Today.
We are not going to be samplingfour different brews.
James is visiting us fromHouston, texas, and, interesting
fact, my kids just went to aRockets game last night and they
loved it.
So let me let's get into Jamesand learn a little bit about

(00:46):
James before we get started withtoday's great nerdy podcast
Nerds On Tap.
So James is the CTO, chiefTechnology Officer, at Digital
Boardwalk.
His responsibilities includeplanning IT infrastructures,
discovering and testing newtechnologies and training James

(01:07):
parents, an electrical engineerand a software programmer,
helped them get into technology.
At a very young age, jamesdeveloped a strong passion for
technology, which led him intothe IT field.
The passion compelled him topursue a degree from the
University of South Florida inTampa, bachelor of Science in

(01:27):
Information Technology.
James was recruited to DigitalBoardwalk over 13 years ago and
I am going to talk about thatinterview process.
So we're going to get into thatin a minute and you can.
James is smiling right nowbecause he knows exactly what
went down.
So anyway, 13 years ago, afterthe company's inception, james

(01:49):
was brought on.
His passion and knowledgehelped to build Digital
Boardwalk into a strong ITservices company in an
ever-changing industry.
In his free time, james enjoysresearching and learning new
technology.
A close second for James isphotography, a hobby he acquired
in college, photographingcityscapes and landscapes.

(02:10):
James, we go way back.
We go back 13,.
Has it been Almost 14.
?
Almost 14 years.
We go back pretty far.
I consider James a very goodfriend.
We hang out sometimes outsideof work.
I'm actually going to be flyinginto Texas Saturday and I hope

(02:34):
you picked a good Tex-Mex place.
That's a little better thanFlorida that we can go.
Go get some good services.

James Todd (02:42):
Absolutely.
I found a Taco Bell right nextto the airport.

Tim Shoop (02:45):
Alright, so yeah, the last time I I don't even want
to talk about that.
I haven't been to a Taco Bellin years, but hope they're not
listening.
So before we get into today'spodcast, I want to tell you
we're going to be talking aboutthree segments implementing

(03:06):
technology for businessoperations.
We're going to get intocybersecurity, cmmc and
insurance, and then we're goingto wrap it up with some
technology trends that arehappening right now in our space
.
Before we do that, let's getinto the beers that James is
drinking and what I'm drinkingtoday.

(03:27):
Let's talk about what James isdrinking first, and after the
first segment, we'll talk aboutwhat I'm drinking.
Take it away suds.
Ladies and gentlemen, welcometo Nerds on Tach.
I'm your Tim Shoop, and Icouldn't be more excited to
embark on this nerdy adventurewith all of you.

(03:50):
So grab your favorite brew,because things are about to get
exciting.

Tim Schaffer (03:58):
Three, two, one go .
Alright.
James is drinking theWarsteiner Dunkel from Warstein,
germany.
It's a rich, dark amber beerwith full flavored, smooth taste
, nicely extened, withsatisfying notes of roasted malt
and subtle bottom fermentingyeast tones.

Tim Shoop (04:16):
Oh, that sounds sexy.

James Todd (04:19):
It does.
I've always been a big fan ofGerman beers, the Dunkel.
You know it's like you take agreat taste.
You malt the hops.
It gives it a little bit moreinteresting flavor, but it still
goes down easy.
I really like it.

Tim Shoop (04:32):
Yeah, I've had the.
I've had the Dunkel.
I like the Dunkel as well.
It's a slower drink for mebecause I in my old age I tend
to gravitate towards pillsnersand loggers and things like that
.
I'm not drinking IPAs as muchanymore, but did have a couple
last night and woke up with aheadache.

(04:54):
That's why I don't drink IPAs awhole lot anymore, but we do
taste them on the show and wehave had a couple really good
IPAs on this show.
So let's get into you, james.
Let's talk about your 14 yearjourney in the field of business
IT, and I want to start offwith that amazing interview
process.
Fourteen years ago it was aremote interview process and

(05:19):
this is back before the internetwas as long as it is with video
conferencing.
So we actually did all thisover the phone and email.
Why don't you fill in ouraudience about that fun process?

James Todd (05:33):
Thank you, tim.
I would love to give my side ofthe story.

Tim Shoop (05:38):
Maybe we should mute them and tell my side of the
story.

James Todd (05:42):
Suds Don't do that.
Alright.
So Brian, who is Tim's partner,getting things off the ground,
he and I went to high schooltogether down in central Florida
.
We were good friends and he wasdown for Christmas I guess the
Christmas of 2009, and this isat the end of the recession of

(06:02):
2008.
I had been applying to jobseverywhere.
Nobody was calling me back.
If I had an interview, nevergot a call back, and it was
pretty tough and I remembertelling them hey, if you hear
about anything opening up, letme know.
And it was a number of weekslater.
He said hey, it looks likewe're going to have a position
opening up here for the IT side,but we also need some help with
the website of things.

(06:23):
I had been going to school, Icould create web servers, things
like that, but I hadn't done alot with web development
specifically, and at the time wewere using, I think, jumla CMS.

Tim Shoop (06:34):
Yep, it was.

James Todd (06:34):
JUMLA.

Tim Shoop (06:36):
Back in the day.

James Todd (06:38):
Yeah, I had to go figure out how all that works.
So in order to do so, I spun upa web server on a virtual
machine on my computer and I gotit up and running.
And it's like when you getJUMLA set up, it takes you
through like an out-of-boxexperience wizard, just so you
can name the site and stuff, soit has something to put in there

(06:58):
to get it off the ground.
And I mean, I'm 21 at the timeand the only thing that I could
think of for a site name wasiHeartBeer.
And I got it up and I sent ascreenshot to Brian just to show
him.
Hey, I got this thing figuredout, I think I can do this.
And so it wasn't long after Iget a call from Tim Shue, who I
had not met before, and hestarted you and you were

(07:20):
inundated on that call James Iwas.
You know it's like I wasn'texpecting it.
We're doing an impromptuinterview.
I've not had a lot of recentluck with interviews so I was
nervous and I just remembergoing through it.
You're asking me questionstrying to figure out what I knew
.
I knew some things.
I know I didn't know everything, but you know I was a pretty

(07:43):
excitable person at the time.
I love technology and gettinginto it.
And then I just remember at thevery end you're like hey,
what's this about iHeartBeer anddead air?
I know that's not the mostprofessional thing that someone
could have and I wasn'texpecting that to cross your
desk, so I was ill prepared forthat.

Tim Shoop (08:05):
So you do realize I asked, I pointed that out to
catch you off guard right to seehow you handled yourself.
And you're still here today.

James Todd (08:14):
So we must have been pretty desperate then.
Huh, you had to troubleshoot.

Tim Shoop (08:18):
The moment you're like, oh god, that's right, let
me go into troubleshooting mode.
But the funny thing is I putyou on the spot.
We brought you up, we hit itoff right away.
We had shortly after that itwas just me, you and Brian.
I think we might have had oneor two texts working with us.

(08:40):
This is once we moved downtown.
We were still in startup mode,and I remember we had a disc
assessment done.
What does that stand for?
Do you remember what discstands for?

James Todd (08:54):
I couldn't tell you.
I can look it up.

Tim Shoop (08:56):
Anyway, it is a personality assessment to see
how individuals jive togetherand work together and what kind
of outcomes you can have withthose personality types.
And my personality typedescribed me as a results driven
individual.

(09:17):
I don't care about the nuts andbolts, I don't care about how
we're going to get there, I justknow what we need to do.
You are a nuts and bolts guyand Brian is a to improve guy,
so so I would come up with theideas.
I knew the vision, brian wouldimprove upon that vision with

(09:40):
how we were going to get there,and then you would fill in all
the cross-septis and dot theeyes with the technology.
Anyway, the the girl Gretchenthat did our assessment 13, 14
years ago.
She came to me and pulled measide one day and she said can I
talk to you?

(10:01):
And I said what's going on?
She goes.
I just want to.
I want to know how you metthese guys.
Well you know, outside ofexplaining to her that you
hearted beer.
I joke.
But I said why do you ask thatquestion?
That's an it's kind of a uniquequestion.
And she said because I dothousands of these and I have

(10:23):
never come across a startupwhere the three individuals, the
three key players, had aperfect puzzle fit.
A perfect puzzle fit.
Usually you'll get two toimprove types or all nuts and
bolts types, but never what wehave built our foundation on,

(10:45):
which is me, you and Brian, andlook where we are today.
I'm fast forward.
At the time it was just threeof us.
We have 33 employees.
We're, you know we're.
We've got a pretty aggressivestance right now to move to 133
employees within the next threeyears.
So I'm very excited about that,absolutely love having you here

(11:09):
, james, and James is our chieftechnology officer.
James does a lot for us, butyou don't want to hear it from
me, folks.
We're going to want to hearthat from James.
So now that we know how wellyou interview, let's talk.
Let's get into some insightsinto how technology can aid
businesses in streamlining theiroperations.

(11:30):
I want to talk about what, whatyou and what we do at digital
boardwalk, specifically, yourrole and how you help customers,
uh, assist in that, how, howdigital boardwalk does it as a
whole.
And then let's dive into yourrole and the importance of that
role.

James Todd (11:51):
So for digital boardwalk, often, we're very
fortunate that most of the timewe're meeting customers, it's
because they have a need, umthere's something that's not
driving the way that they wantedto.
They've got, maybe, a providerthat isn't delivering where they
need to, um, and so when theyapproach us and they're looking
for help, they have a problemthat we need to solve.
And one of the things that Ithink makes us special is we're

(12:13):
not a one size fits all shopwhere we're just making
everybody adopt the same type oftechnologies across the board.
We understand the issues thatthey're having, uh, despite how
it's described to us, and wecome up with a custom plan for
them on how we're going toachieve that.
And this is, uh.
The reason I think that's soimportant is because we work
with companies in all sorts ofverticals, um, although it'd be

(12:35):
very easy if we were just in one, like medical or legal, um.
The fact that we've got to spanall these means that we've got
to be creative and how we goabout it, but it also benefits
us because, at the same time,we're getting the experience in
all these verticals, we'regetting a taste and exposure to
things that otherwise wewouldn't have had access to, and
that makes us even more robustwhen we're coming up with

(12:55):
solutions for our customers.
Um, you know, back in the day, alot of businesses, you know
they were providing a service ormaking a thing, like there was
something tangible that they hadto offer and that's how they
were getting paid.
But in this day and age,everything's based on computers.
Data is the most important partof what they have, and
protecting them, protecting thatdata, learning from that data,

(13:18):
helping the data get to theright people more efficiently,
can save businesses literallythousands.
Um, and that's where we cancome in Now.
One of the things that'schallenging for us is because
we're not the developers, we'renot the manufacturers, we're not
creating the technology.
Sometimes we do feel like ourhands are tied because we're,
you know, only able to usewhat's available to us, but

(13:39):
we're always trying to figureout, you know, what can we do to
solve this problem, and that'sone of the bigger roles for me
at digital boardwalk is whatother solutions are out there.
You know, sometimes we havesomething that's worked really
well for a number of years, butnow it's just fallen a little
short.
So we go out there, meet thecompetition.
See, is what we're using up tosnuff, our other changes
happening and then that'ssomething we can take to our

(14:00):
customers and help improve someof those inefficiencies.

Tim Shoop (14:04):
You know it's interesting.
You mentioned um that we don'tdo a niche.
We're we're SMBs um across theboard.
I actually was on a call umwith a uh, let's just uh with
somebody yesterday um where theyasked me that specific question
.
They said they were talking toanother MSP that felt that you

(14:29):
know, if you were working withan MSP, it's always good to have
an MSP that's uh niche driven.
And he asked why?
And he said because you canscale the company faster because
you're only doing one thing.
Now the problem I see there is,you know, I know companies that
have that are niche driven umother MSPs that are niche driven

(14:52):
and the problem is that one ofthem shoot in the hospitality
industry.
When COVID hit, they shrink byhalf to two thirds.
And the problem with that isthe other businesses they're
dealing with are now sufferingbecause all the resources there

(15:12):
that they were used to havingall the brains, all the talent,
most of it was gone because theyhad to scale down.
Um.
Me personally, I think thatdriving across the entire SMB
space is great A for the talentto be able to drive their skill
set uh higher and be moremarketable.

(15:32):
So we actually help our talentget smarter.
Um, but we help our businessesbecause by dealing with so many
SMBs, when you're dealing with asmall business and you've
already encountered these sameissues with another small
business, maybe in that samevertical let's say it's an
insurance company and you'redealing with a line of uh uh,

(15:54):
business application orsomething specific to that
industry we already know it.
Um, so, yes, as a niche, youwould already know it.
But, uh, we already know it.
But we already know it, butwe're going to think outside of
the box of just that, hey, we'regoing to, we're going to fit
you into one box, sort of thing.
Is that along the lines of whatyou're saying, james?

James Todd (16:15):
Absolutely, and I mean don't mean to be critical,
but in Pensacola you havelimited reach if you pick a
particular vertical as well.

Tim Shoop (16:25):
I agree too, yeah, um , and we had to.
We had to be able to scale toget the talent, and if you don't
have the talent, you're justanother IT company.
Any company is about the talentthat's on board, but
specifically in our space, youwant very, very smart engineers,
um, and we're able to get thembecause of where we have scaled

(16:49):
to.
So let's talk about that.
Let's get into what we do.
Let's talk about the importanceof data protection in the
digital age.
I mean cybersecurity.
When we when digital boardwalkwas created, it was all about
helping companies by beingproactive and dealing,
delivering proactive solutionsto the small business so we

(17:12):
could keep them working in thefirst place.
Then hackers got smarter.
The bad actors started playing,you know, in with all kinds of
new tools that became handy.
So our goal has been to buildout an entire cybersecurity
department to be able to protectour small businesses, that

(17:35):
small to medium sized businessesthat we work with, to stay one
step ahead of those bad actorsso they never have to deal with
a ransomware event.
Talk to me about that, james.
Talk to me about how digitalboardwalk implements those
strategies.
Talk about the multiple layersand and what that means to our
audience that may not knowanything about cybersecurity,

(17:57):
but they may be an entrepreneurlistening out there and if you
are, you'll want to hear this,because this is super important
and we're not just making thesethings up.
This is what we do for smallbusinesses Go, thank you.

James Todd (18:11):
So I think it's important here to start off with
some backstory.
Simple fact is, when we startedthis project 13 years ago, most
of the threats that we'refacing businesses were viruses
or worms, things that werenuisance, but they weren't
really costing the businessthousands or more of dollars.
You know, maybe an employee'scomputer was going to be down

(18:32):
for a little bit it wasn't thewhole organization, and so a
simple antivirus programs andthings like that really were
satisfactory.
But the catalyst that changedall of that was these bad actors
figured out how to monetizetheir efforts and so, through
ransomware and phishing attacks,they weren't just annoying you,

(18:53):
they were holding your datahostage until you paid them to
get it back, or they were ableto intercept emails and change
you know wiring addresses,things like that.
So they were directly gettingpaid, and so this took.
You know, this took off in sucha way that businesses actually
formed in these overseascountries for them to just go

(19:13):
after businesses to make as muchmoney as possible.
And it's almost comical whenyou look at they have business
structures and you know theyhave a chain of command and it
looks just like a traditionalbusiness.
But it's all about committingcrime.
But now that we have that toface with.
You know, things that couldhave been exploited.
But we're really that risky Now.
We're always being exploitedbecause, like you mentioned,

(19:36):
they've got the nifty tools.
They're automating things justas we are, and so we do have to
stay a step ahead, and,unfortunately for us and
unfortunately for everyone,there isn't an end all be all to
cybersecurity.
We can't just roll out a program, call today and then, you know,
pat ourselves on the back, andso that's where the layers come
in.
It's all about creatingmultiple layers of safety nets

(19:58):
for you.
So if one component misses anattack or doesn't block it,
you've got something else thereto back it up.
Two key components of this aregoing to be our DNS security
tool and our email threatprotection tool.
Our email threat protectiontool is very good at looking at
emails and determining what'sthe content of this.
Okay, it appears that it's fromMicrosoft.

(20:21):
Where did it come from?
Ooh, it did not come fromMicrosoft.
We're going to go ahead andquarantine this.
We'll let the user know that itcame across, but we're not
going to give them the email.
But if somebody is trying to doa phishing email from, let's say
, one of your vendors or one ofyour customers.
The email filter is not goingto be able to tell that as they
are.
There's not going to be able totell that as easily.

(20:42):
For example, your customervendor may not have the
necessary definitions out therethat say, hey, these are our
trusted mail servers.
And so the spam filter looks atit and says, okay, this link
isn't on any known bad list.
You know the content in herelooks, you know, innocent enough
.
We're going to let it through,because that is the delicate

(21:02):
balance that these email filtershave.
They can't just hold all email,because then you can't get any
work done, but they can't justlet everything through.
So at some point it's got tomake a decision.
And it's not 100%, although itis getting better.
But so let's say you get thatemail, you get the link and you
click on it.
We had an issue a couple ofyears ago where an attorney in

(21:23):
town got compromised and wassending these phishing emails to
their contact list, a few ofwhich were our customers.
The email filter didn't catchit because it was coming from a
known, trusted place, from theserver that it knows these
emails to come from.
But when one of our usersclicked the link, our DNS
security tool blocked it, andthat's why these layers are so
important.

(21:43):
Beyond that, we do have endpoint security software on every
computer, every server, so it'swatching all the files,
scanning things periodically totry to detect malware.
And also, if you downloadattachments files or add flash
drives to the machine, we've gota ransomware detection tool
that's monitoring the system forthe ways that ransomware runs,

(22:04):
so it can detect it early, shutdown the computer so it can't
continue to run.
Probably the most entertainingone that we roll out is a
phishing simulation testing.
This is where we will sendeverybody in a company a bogus
phishing email once a month andwe report on how they handle it.
Are they, you know, deletingthe email?
Are they opening it up and notclicking the link?

(22:24):
Do they open it up and clickthe link?
And if they do those things,you know we can provide a report
to our customer and it sayshere's everybody who did it the
right way, here's everybody whoneeds some help.
And that way we can, you know,work with those users
specifically to help get themstronger In a lot of cases, it's
the decision maker too.

Tim Shoop (22:42):
Clicking on that email.

James Todd (22:44):
I will give Brian's, the one in our company who
usually puts those together.
He must be clear of why and orsomething, because every so
often he'll get send just theright thing, like a Kelly Blue
Book thing, right aftersomeone's been in an accident,
and they click on and they'relike no.

Tim Shoop (22:58):
Yeah, yeah.
So let's, before you get intothe rest of it, it's some some
interesting things that youbrought up, and one of them was
the layers how wide layering isso important.
Now, we talked about layers.
You explained it in geek speak.
Let's let's kind of let's take,take it a step back and let's

(23:19):
kind of compare it to something.
Maybe everyone in our audienceis familiar with the security in
their own house.
Right Now.
We can only do this to acertain degree, but it does give
them an idea of what we'redoing with layering, right.
So if you have an intruder, youknow, or if you have a
potential intruder approachingyour house, right, maybe the

(23:42):
privacy fence is the first layerof defense.
So they've got to get over that.
It's not too hard, they getover it.
That might be what James thefirewall.

James Todd (23:58):
Privacy fence.
Let's call that the emailthreat protection.
Okay.

Tim Shoop (24:01):
So email threat protection.
So let's talk about it Now.
The second part to my analogyis the inconveniences of these
things.
They do pose a slightinconvenience and humans do not
like change.
Right, Change is is justsomething that humans have to
adapt to.
It's important to change as youevolve, but we just don't like

(24:22):
it.
It's not in our, you know,general human nature.
You know multi-factorauthentication, MFA if you will
which is where you, you know youmight have an authenticator on
your phone and you've, you've,you get sent a code and you've
got to go to your authenticator.
Or when you access your bankaccount, they send you a pin,

(24:45):
maybe by texting it to you, orwhatever things like that.
It's an inconvenience.
It's an extra step or two thatyou've got to take to get to
your, to your bank account.
Same thing with email threatprotection.
I mean, I review tons of spamevery morning and that's
basically spam email that I getevery morning.

(25:06):
I get multiple because I'm inmultiple email boxes, so I have
to review, I think, sevendifferent spam filtered emails
and basically it's a list of allthese emails that are trapped
on a third party server beforeit reaches our network and
before I've clicked on any ofthose attachments.
That's a shout out, by the way,to someone in one of our skits.

(25:30):
And Mr Devin Brown, he's ourservice manager and he, if he
watches this episode, I'll knowwhat I talk about.
He likes to click onattachments.
That's a joke, by the way,ladies and gentlemen.
He really doesn't, but he'llget this if he listens.
So there are inconveniencesinvolved, right, James, but it's
a necessary evil, correct it is?

James Todd (25:51):
The more roadblocks we create for ourselves are the
more roadblocks we're creatingfor the attackers, and it just
adds to the security.
It's like having multiple doorswith different types of locks
on your house, but theseinconveniences don't have to be
inconveniences.

Tim Shoop (26:05):
If you look at it like what would be the real
inconveniences if I was attackedand that bad actor said, no,
you're going to pay me $1million or 200, doesn't matter
what it is, it's still money offyour bottom line and it can put
a lot of small businesses outof business.
You know and you hear about itall the time with big businesses

(26:26):
, but the SMBs are the numberone attack space or the number
one attack demographic out there.
Now, because you know thesepeople and we did a PowerPoint
presentation a while back calledBad Bob, give us a little bit
of a little bit called Bad Bob,get to know Bad Bob and who Bad

(26:49):
Bob is.
We created this character, thisfictitious character, but he
was based on what we knew fromfacts, not just from what we
learned within our industry atconferences, but also in the
media.
These guys have families.
They go to work just like youand me.

(27:10):
They catch the local metro,they stop at their coffee shop,
they clock in.
They're actually going into acall center, clocking in,
sitting down at a cubicle.
But once they sit down, theirjob is what James Attacking
American businesses.
Attacking American businesses,that's what they spend all their

(27:32):
time doing.
And once they plant the seed inyour network, they're going to
come back Once they collect dataand they have, they could be in
your network for weeks.
Now tell our audience how weget in the way of their
impedance.

James Todd (27:57):
Fortunately, as you know, we have a way that
everybody uses a system and thenwe find out how people are
exploiting it.
Then the industry responds bycoming up with a way to thwart
that, and so there is a lot ofback and forth, but the industry
is moving to more sophisticatedmeetings for adding these
protections and where this comesfrom, like multi-factor

(28:19):
authentication.
We also have conditional accessrules and things like that.
What I mean by conditionalaccess rules is we can basically
define a set of parameters thatare required in order for a
successful login to happen, andwhat this really means is that
if you are a trusted person withtrusted information, untrusted
devices, you don't have to jumpthrough all the same hoops that

(28:42):
somebody who's outside yournetwork that doesn't have the
same information would need togo through.
Now, a lot of these do requirepreliminary work to be done to
allow these things to be trusted, so it does create some more
work for your IT company, butfor the end users and for the
people in the business that aremaking it work, it becomes a lot
more simple for them, and Iwill say I think the thing I'm

(29:04):
most excited about is thepasswordless future, where they
were all working towards.
This isn't something that's100% yet, but it's definitely
getting closer.
But using things like hardware,tokens and biometrics, we can
eventually get rid of the needfor passwords.
We can still have a zero trustset up for all of our IT needs,
so we have the maximumprotection in place but the

(29:27):
least amount of hurdles foremployees.

Tim Shoop (29:30):
So it makes it a little easier for the employees
to a lot easier for theemployees to access their
desktop right and their data andtheir data.
And that takes me back againbecause we didn't really finish
our analogy as far as layering.
So layering from a digitalstandpoint, from an IT

(29:53):
standpoint we've got firewall,we've got endpoint, we've got
email threat protection, dnsprotection.
Go on, james, come on.

James Todd (30:05):
Windows patching.

Tim Shoop (30:07):
Windows patching, windows hardening Windows
hardening.

James Todd (30:14):
Fishing simulation testing Fishing simulation
testing.
So there's security wheretraining?

Tim Shoop (30:20):
Training Eight, and there's, there's more.
I think we're up too close to adozen layers.
So, to put that in aperspective with your house we
talked about, maybe email threatprotection equals your privacy
fence.
So they get over the privacyfence, they approach your house.

(30:44):
Now they're going to look foran open door window.
That might be maybe a hole inthe in the router, right, maybe
they've got, maybe maybe they'vegot something forwarded, you
know, like maybe they'reconnected to a third party data
source or third party softwareapplication, so they had to

(31:07):
punch a hole in the routerthrough port forwarding.
Well, that's like opening awindow in your house.
Because now what that bad actorin that cubicle in China or
Russia or Romania is going to do?
He's going to run scanningtools and those scanning tools

(31:29):
are going to find that openwindow.
And actually, more so than that, he's going to, he's going to
leverage a bot net, right?
Absolutely All that is automatedExplain to our audience how
they cluster machines and createa bot network and how much more

(31:50):
powerful that is than justrunning a scanning tool directly
on your network.
I mean to find the initialopening right.
Yeah, so Not to put you on thespot.
I know we didn't discuss this,but go ahead.

James Todd (32:05):
Botnet serve multiple advantages for
attackers.
Number one it's multipledevices working together, which
is the same as having one reallybig machine, but we're
spreading the load acrossmultiple Instead of one box
trying to scan everything.
We can give each box a littleportion of that to scan.
What we're also doing is we'redoing the work in much less time

(32:28):
because each part's doing onepiece of the pie, but when you
put all the parts together,you're getting the whole pie in
the same amount of time.
It would take just thatfraction to be accomplished.
The other benefit of it is, astechnology evolves, we get
smarter firewalls, intrusiondetection devices and intrusion
prevention devices.

(32:49):
Ibs and IPS devices are becomingmuch more common.
These are able to look at thetraffic that's hitting the
firewall and it's just applyinga yes or no rule to that traffic
.
It's able to say, hey, this wastraffic I sent, that's coming
back and going to allow itthrough.
It can also look and be likethis is coming from an unknown
area, I'm going to startdiscarding this.
It can also say, hey, thislooks like it's trying to do an

(33:12):
attack on me.
I'm just going to block allthis traffic.
But when you use a botnet, it'snot just one connection coming
in doing something mischievous.
It's lots of small connectionscoming from all over.
It also makes it harder forthese IPS and IPS devices to
detect it and block all of it.
So point being is, byleveraging the botnet, they're

(33:32):
getting the work done morequickly.
It's harder to detect and it'sharder to stop.

Tim Shoop (33:37):
So instead of just having one soldier approach you,
you've got a multitude ofrobots behind that soldier where
he's leveraging AI to basicallycome after you.
So in the physical world youwould have a thousand and your
chances of survival or less thanhaving that one soldier.

(34:01):
Absolutely Just trying to throwsome weird analogies out here
and get a reaction from you.

James Todd (34:08):
They're very creative and I enjoy it.

Tim Shoop (34:09):
Good.
So with that Suds, why don'tyou tell our audience about what
I'm drinking today before wedive into the importance of
cybersecurity?
We're going to take a deeperdive into cybersecurity by
talking about CMMC and theimportance of insurance for the
small to medium sized business.

(34:30):
Go.

Tim Schaffer (34:32):
All right, tim is drinking a beer from the
unbranded brewing company inHylia, florida.
Hylia Light is a golden lagerbrewed with Pilsner malt and CTS
hops.
It's as unfiltered, with acrispy, bitter finish.

Tim Shoop (34:48):
That is a tasty boat beer right there.
I could drink a few of thosecruising around on a boat.

Tim Schaffer (34:57):
That bell will get you in trouble If you ring it
too much.

Tim Shoop (35:01):
Yeah, well, I may have to ring it in a minute
because I'm almost out in my mughere, so we may have to talk
Suds, but I appreciate that, Iappreciate bringing that beer to
me today Suds, because I'mactually quite enjoying it.
So let's dive in to CMMC andinsurance James.
Let's talk about that Now.
I know digital boardwalk reallygot heavy into CMMC back when

(35:24):
it was still coined as NIST andwe got involved with some
Florida wide organizations andwe had a government contract
customer.
That really pushed us hard andwe leverage.
We like that.
We like when customers use usbecause we learn from one

(35:44):
another and then we growtogether and it allows us to
deploy better technology and andand better things to all of our
you know, our customerlandscapes.
So let's take a deep dive intoit.
Let's talk about the critical,critical topic of cybersecurity

(36:07):
and its significance forbusiness before we dive in to
CMMC.
Now you already talked aboutlayering, but start by telling
the small to medium sizedbusiness owner out there why it
is critical, why it is socritical for them to listen to
this and not just blow it offbecause they think they won't be

(36:27):
attacked.

James Todd (36:29):
Yeah, there's a few areas that we can go with this.
But you know, I think a lot ofthe SMBs that I meet with now
are thinking, oh, all of mystuff's in the cloud, I don't
have anything to worry about.
But from our side,unfortunately, we've seen this
real hand.
Cloud is such an ambiguous termbecause all it really means is
your server is being managed bysomeone else and you're trusting

(36:51):
that they're taking care ofthat and the backup, saying the
cybersecurity.
And the fact is they may not be, especially, I mean, a lot of
these businesses.
There's a lot of cost behind adata center.
They need to get this to marketASAP, you know, because the
money is kind of run out andcybersecurity unfortunately
tends to come afterfunctionality for a lot of these

(37:12):
businesses.
So bottom line there being inthe cloud isn't a guarantee that
your data is safe.
Now the second part of this isI mentioned earlier, our
businesses are all data driventoday.
We still may be manufacturingthings, we still may be
performing services, but our AR,our AP, our client information

(37:34):
is all managed on computers.
And if all that goes away, ifyou couldn't look up a report on
who you owe money to or whoowes you money.
You know how do you keep thebusiness operational Right.

Tim Shoop (37:48):
And it's such a hot topic right now too.
I mean, cybersecurity should befront and center for every SMB
out there, right?
Because you know, I meaneverybody's focused on what they
do.
Whether you're an insurancecompany, whether you're selling
tacos like our last guest inhere, Gio, what a great guest

(38:10):
that episode's coming out thisweek or whether you're a law
firm or a healthcareorganization or a retail candy
shop, it doesn't matter.
You are vulnerable to theseattacks and I've seen them.
I've seen them happen firsthand.
They are not fun to go through.
Why don't we?

(38:32):
Before we get into CMMC, let'stalk about an event.
Let's talk about a ransomwareevent.
If someone were to have aransomware event, okay, let's
talk about who you report thatto and what the process is.
Now from digital boardwalkspoint of view.
We have an obligation to an SMBif they were to be attacked.

(38:54):
Now, we haven't had.
We haven't had to deal with itin a long time because of how.
You know how layered we are andhow how much we protect our
business.
We protect our customers.
But I've heard it from otherMSPs at conferences hey, my
customer got attacked, blah,blah, blah.
Take me down that path, tellour audience what happened.

(39:16):
So I've been attacked.
I've been attacked.
I have a ransomware event.
The hacker wants I don't know,let's, let's use a small amount,
let's say 280,000.
He only wants $280,000.
Do I pay him?
No, no, so why do I not pay him?

(39:37):
What does that do?
When I pay him, what?
What chain of events does thatset off?

James Todd (39:43):
The reason ransomware is so rampant these
days is because they're gettingpaid.
And if we like a great example,early days of ransomware would
just hit and start running toaffect as many files as it could
as quickly as possible.
Then later generations watchedand learned the network and
tried to find the backups first.

(40:04):
Then it would encrypt thebackups and then the rest of
your files.
So you couldn't, you know,delete the data and recover from
your backups.
These people know that if theycan go after you and get your
data hostage, however that's,you know, possible that you were
going to pay for it, Otherwiseyou will have to shut down the
business.
And so we've got to make surewe have the backups.

(40:25):
We try to keep these guys out,Otherwise it's a grim, if I'm
being honest.

Tim Shoop (40:33):
So the backups?
Every company backs up theirdata.
I hope, I would hope, by nowthat every company's backing up
their data and every MSP says,hey, we back up your data.
Not a big deal, we back up yourdata.
But I know firsthand that a lotof MSPs rely on automation.

(40:53):
To you know, take care of thatbackup.
But automation breaks, doesn'tit, Jacks?

James Todd (41:00):
Absolutely.
Automation is also dependent ona few assumptions.
They're assuming that this datastore is online, or that this
data store is accessible, orthat the process executing the
automation has permissions toaccess the data that you want
protected.

Tim Shoop (41:17):
Yeah, but you know, what does digital boardwalk do
differently?
Digital boardwalk has humans,right, humans sitting behind
that automation to make surethat if something breaks I mean
even the data, the automateddata protection that we deploy
it still could break it'stechnology.

(41:38):
Technology breaks, ladies andgentlemen, believe it or not,
otherwise we wouldn't have jobs.
So we actually have human eyes.
We'll have a ticket generatedif something breaks and our
human eyes are constantlyauditing those tickets to make
sure and going through andmaking sure that that the
automation is working asintended and the data is landing

(42:00):
in the right places as intended.
Isn't that correct?

James Todd (42:04):
Yeah, so we actually approach this in two ways.
Number one, we configure all ofour systems to run in an
automated fashion and we do havea connection between our backup
systems and our ticketingsystem that, if anything ever
happens, it notifies, creates aticket and, like you said, an
engineer gets that ticket andresponds to it right away.

(42:26):
But the second part to this iswe have monthly audits for every
single customer on one of ourbackup solutions and every type
of backup solution, because wedo have multiple ones and we
just take a look at the backups.
We log in manually.
It does not matter if aautomated report has been

(42:46):
created or not.
We will log in.
We make sure what are webacking up so that we know what
we're backing up, is what wethink we're backing up.
We make sure that it's runningand we do a test restore to make
sure that what's being backedup is readable and not corrupted
.
And our goal here is to justnever be in a situation where we
need the backups but only nowfinding out that we need them,

(43:06):
that something is going to lie.
So we tested monthly.

Tim Shoop (43:09):
It's so important.
It's so important to have.
I mean, we rely a lot ontechnology these days, but it's
really important to merge thattechnology with the human
element and create kind of a twofold approach to it, using
humans and automation, insteadof just relying solely on
automation Absolutely, andthat's so true for everything.

(43:32):
So that takes us to CMMC.
So and I'm sorry, I, while youwere talking, I'm used to
drinking out of these littleflights.
I was drinking out of my mugand I missed my mouth.

James Todd (43:44):
So you've developed a drinking problem.

Tim Shoop (43:48):
Yeah, yeah, one mouth and in two hands, so anyway.
So let's talk about CMMC.
Let's talk about it's, thecybersecurity maturity model,
certification and it's impact onorganizations.
Talk to us about the importanceof following CMMC framework and

(44:09):
why it's important that digitalboardwalk takes that framework.
Where does that front?
First of all, where does thatframework come from?
Who developed that framework?
The government.
So if the government'sprotecting America, right, using
that CMMC framework within thegovernment, it's, it's, it's

(44:33):
best in class, right.

James Todd (44:36):
This is a part of it .
So the NIST 800-171 rule thatCMMC applies to isn't for
classified data, but it is forcontrolled unclassified data,
which is sensitive data that wewant protected.
But it's not so sensitive it'scategorized as classified.

Tim Shoop (44:59):
Okay, keep going so.

James Todd (45:03):
I guess the way that this all came about.
Nist has been doing their thingfor a long time I couldn't tell
you how long and they've come upwith different rules on how the
government should be doingthings, and all the branches
from government reference theserules on how they are allowed to
operate.
Now the DOD is taking this astep further and saying, hey,
our supply chain also has tofollow these rules.

(45:24):
Now, conveniently, the DOD toldall the suppliers that you have
to follow this and miraculously, all the suppliers testified
that they were all alreadyfollowing it and everything was
good and the DOD didn't need toworry about anything.
But there is obvious evidencethat the enemy is getting this
information that the DOD istrying to protect and they know

(45:45):
that the self attestationprocess that has been in place
is not working.
Now, one thing that it'simportant to know the DOD what
they know that a company isviolating their contract.
And if the contractspecifically requires you follow
NIST 800-171 and you don't,they will sue for damages.
There are some years that theyrecover over $10 billion from

(46:10):
their billion.

Tim Shoop (46:13):
That's a lot of money .

James Todd (46:14):
Yeah.
So you definitely don't want tobe found in breach of contract.
You should be following this.
But to make it better, the DODhas formed the cyber AB, which
their job is to implement.
Cmmc, which is a rule that theDOD has made and is working its
way through the governmentapproval process now.

(46:36):
But essentially, nist is therule that everybody has to
follow and CMMC is how that rulewill be assessed and certified
so that businesses can continueto offer services to the
Department of Defense.
Now this isn't official yet,but it does look like other
branches of government are goingto want to tap into the CMMC

(46:57):
process for their contractors aswell.
So right now it is very muchthe defense industrial base, but
we do expect this to expand inthe future.

Tim Shoop (47:05):
Ladies and gentlemen, if you want to learn more about
CMMC and cyber AB, go to ourwebsite at digitalboardwalkcom.
That's digitalboardwalkcom orgomodernofficecom.
When you get to the website,the top menu will be split and

(47:27):
there will be a CMMC option.
When you select that, it'lltake you down and you can learn
a lot more about cyber AB andCMMC.
Take the time to do it, readabout it, contact
digitalboardwalk if you want tolearn more and appreciate that.
So that takes us into insurance.
So why is it important?
Let's explore the role ofinsurance in mitigating those

(47:51):
cybersecurity risks.
Now we carry I think it's a twoor three million dollar policy
that backs us up from any kindof negligence.
If one of our people doessomething yada, yada yada, if we
have a cyber event, forinstance, it's going to back us
up.
But our customers we like themto also have cybersecurity

(48:15):
insurance.
Why is that important?
Why is it important for ouraudience to carry cybersecurity
insurance and how does thatmitigate cyber risks?

James Todd (48:27):
It is so important for companies today to carry
cybersecurity insurance simplybecause when a threat happens
that could keep your businessafloat Whether you're losing
revenue because you can't billor things like that, or if you
need the money just to rebuildthe infrastructure that you had
in place it can literally saveyour business after an event.

Tim Shoop (48:51):
So keep going, sorry, all right.

James Todd (48:55):
Cybersecurity insurance right now is a lot
like the wild wild West.
Carriers know that companiesneed this protection, but they
don't have enough data to reallyhave consistent plans, costs,
fee schedules, things like that,and so they are underwriting a
lot of these policies, but theydon't know if that's enough to

(49:15):
even cover the payout or if it'sgood enough for what they need.
When cybersecurity first wascoming out, they had a list of
requirements of everything youneeded to be covered by that
particular carrier and, I'll behonest, 90% of our customers
wouldn't have met it at thattime and those premiums, those
premiums, james, are increasingyear over year over year.

Tim Shoop (49:39):
Suds can attest to that, and it's because of all
the events.
It's not just the events thatSMBs are facing, but the events
that MSPs are facing from theirSMBs that they enforce Now
digital boardwalk.
We're not one of those guysbecause we go over the top with

(50:02):
cybersecurity with all of ourcustomers, but not everybody
does.

James Todd (50:06):
Well, and you know, you mentioned that we have
cybersecurity insurance, whichwe absolutely need, but the
reason we need our customers toalso have it is our insurance
only covers negligence on ourteam.
Yeah, most of the time that acustomer is affected, it's
because one of their employeesclicked a link that they weren't
supposed to do, like theattachment, so like a, like a,
like a Daven.
Exactly, and so our insurancecan't, won't, won't step in and

(50:32):
for that protection, and that'swhere your own protection helps.

Tim Shoop (50:37):
So how?
How can businesses prepare forCMMC compliance?
How do they prepare for this?
I mean, we can talk about ittill we're blue in the face.
What do they need to do?

James Todd (50:50):
They need to either have somebody on staff or they
need to find somebody who hasgone through all of the controls
, understands what is requiredto meet the NIST 800-171 rule
and help them implement it.
Now I will tell you, on thedigital boardwalk side, we help
out with a lot of controls, butwe don't help out with all of

(51:11):
them.
Many of the controls that arein there are operational pieces
for that company staff.
That digital boardwalk cannotsatisfy for you.
That you have to satisfyin-house.
And so our best relationshipsare with customers that have a
champion internally and achampion on our side, that work
together to cover all thecontrols.

(51:32):
And we'll even create what'scalled a shared responsibility
matrix to say, hey, these arethe controls we're responsible
for, these are the controlsyou're responsible for, and that
way we've got a clear divisionof responsibility.

Tim Shoop (51:45):
Yeah, it's so important in today's day and age
.
Ladies and gentlemen, I meanyou'll, you'll notice all of our
shows are sponsored by digitalboardwalk and SmarterWeb.
Both companies own BIOS,obviously, so they are funding
this operation.
But I will tell you thatcybersecurity, of all the things

(52:05):
that we do, is one of the mostimportant and, following CMMC
framework and being part of thecyber A B, taking care of small
businesses, it is a.
I mean, we are obligated, in myopinion, and not all IT
companies think the same way butwe are obligated to protect you

(52:28):
.
We are obligated.
It is our reputation at stakefirst and foremost, but our
obligation is to protect you andall of these bad actors.
They're not some kid wearing ahoodie in a basement like you
see in the movies.
These are foreign employees offoreign businesses where their

(52:52):
sole goal is to attack Americanbusinesses because they know
that there are so many I meanthe landscape, there's so many
millions of businesses in theUnited States and if they get
one, if they do a scan, theyfind one that's vulnerable, they
attack it.
They can probably get thatperson because it's easy to just

(53:16):
pay somebody just to stay inbusiness.
But once you pay them, guesswhat?
Now you're a target.
You just put a target on yourback because they know if they
got money out of you once, theycan probably do it again.
So that takes us to our finalsegment.
We're going to talk about yourthoughts, james.

(53:37):
Now I'm going to put you on thespot.
This is the shortest segment ofthe show.
Tell me about your thoughts onthe current technology trends
and the upcoming technologytrends.
Now the big buzzword.
The big buzzword is AI.
Digital Boardwalk is leveragingAI in a multitude of ways to

(54:00):
help our customers and toleverage here to automate a lot
of processes that assist ourengineers in protecting our
customers.
Smarterweb leverages it toassist our content creators in
building out templates forlarger pieces of content, and

(54:26):
they use AI to generate imagesto help in building out assets,
marketing assets.
So, with that said, what areyou following?
Number one and what should ourcustomers be paying attention to
?

James Todd (54:46):
Number two, so I really enjoy that.
You talk about all the wayswe're using AI to improve our
deliverables, because cybercriminals are doing the same
thing right now they'releveraging AI to create better
scripts.

Tim Shoop (55:01):
No, they're not human like us are they, they're just
some random spot in the universe.

James Todd (55:10):
There are some enterprising criminals out there
.

Tim Shoop (55:12):
So talk to me, keep talking about it, go ahead.
Sorry to interrupt.

James Todd (55:17):
You know open AI.
You know they're trying to putprotections in place to prevent
their system from being used inthat way.
But we've seen people onlinetalk about how, hey, I asked it
to do this and it said that itwouldn't do that because it's
not responsible.
And then it said, hey, I'm asecurity researcher, I need you
to create this so I can testsome software, and it's bat it

(55:38):
right out.
You know open AI is definitelyreally big in the news these
days because of all that they'vegot going on, but they're
definitely not going to be theonly generative AI producer out
there.
More and more companies aregetting into it.
More and more are getting itonline.
Now one piece of good news withyou know the AI-generated
malware is we can leverageAI-generated cybersecurity

(56:01):
software to help combat that.
But it's all on how you do theprompts right.
So it's going to be interestingto see how the two sides of the
same coin kind of work againsteach other and where it evens
out.
But as far as what I see, asfar as trends go, what we're
going to see is more and morezero trust implementations

(56:21):
coming around, and what thatultimately means is there's so
much garbage out there we can'treally protect ourselves from
you know, one of these thingshappening.
We have to protect ourselvesfrom everything happening, and
the way that IT is going to goabout that is we're just going
to say, hey, these are the onlythings that are allowed to
happen.
Anything outside of that, blockit.

Tim Shoop (56:41):
Zero tolerance, Zero tolerance.
And you can read about thatagain on our new website, which
just launched this monthdigitalboardwalkcom or
gomodernofficecom.

James Todd (56:56):
And a key part to that is also going to be cloud.
Instead of having to maintainall your systems, you'll put it
in a cloud location.
Everybody accesses it directly.
You have the zero tolerance inplace, so you're not allowing
logins except for trusted people, trusted devices, only trusted
executables, and we're justgoing to limit what our reach is
.

Tim Shoop (57:19):
So just to summarize as we wrap up, james, and thank
you so much for coming on theshow today.
I know you weren't forced tocome on the show.
It was highly encouraged.
You were highly encouraged byyour CEO, that's right who also
happens to be the host on thisshow.
Great guy, hey, he is a greatguy, isn't he?

(57:39):
Very charismatic dude?
Absolutely, yeah, no, I'mhumble, I'm humble, so tell our
audience, finally, just tosummarize, what
digitalboardwalk's role is inhelping them to stay
technologically competitive andto stay secure, and what can

(58:02):
they do.
What is a good call to actionthat they could do today, that
we could help them?
Aka some sort of assessment.
Talk to our customers.

James Todd (58:14):
It's funny you mentioned assessment, because
we're not far from getting somenew assessment tools in place
that are going to help us out alot as far as more quickly
identifying where our customer'sweek spots are, but the simple
fact of the matter is there isno set it and forget it when it
comes to cybersecurity.
Cloud does not mean that youare cybersecurity ready, and

(58:34):
what you need to, I guess,consider is where is your data?
Who's protecting it?
It's the last time I testedthese controls and if you
haven't have a third party, dothat the software I just
referred to.
We're about to get a thirdparty online to test our
controls for our customers, toprove that, hey, we're not just

(58:55):
talking a big game.
Here's the evidence that showswe're doing it.
And as much as it may seem likea hassle now, tim, like you
mentioned earlier, beingbreached, losing data that is
the real hassle.
Taking a quick scan, makingsure that the things you think
are in place are in place, iseasy.

Tim Shoop (59:14):
So, ladies and gentlemen, if you already employ
a managed services provider tohandle your IT or if you're
handling an in-house, you caneasily get a second opinion on
what they're doing, notnecessarily to hire digital
boardwalk, but to at least getthat insurance that they're

(59:34):
doing the right thing and doublechecking their work.
Digital boardwalk can do athorough assessment on your
business to let you know that,hey, your team's doing a great
job or hey, your team canbolster in these areas.
Talk to your team about it.
Or you can hire digitalboardwalk and just fight through

(59:57):
all the you know all the noise.
Again, check them out atdigitalboardwalkcom or
gomodernofficecom brand newwebsite that just launched this
month.
That can explain everythingthat James talked to about CMMC
framework and CyberAB, as wellas the SMB space and what a

(01:00:21):
managed IT provider can do foryou.
James, thank you so much forcoming on the show, thanks for
volunteering to offer yourexpertise to our audience and,
man, I appreciate you.
You need to grab a beer when Ifly to Texas and I would.

(01:00:41):
I'd like to toast you coming onthe show, but I'm out.
I'm going to ring my bell.
Where's Suds?
Suds is?
He's slacking.
He's sitting back thereproducing the show and drinking
beer, but he's really my beer'sempty.
I'm the host, I should havebeer.

James Todd (01:01:03):
It's a high level gamer maze right there.

Tim Shoop (01:01:07):
Suds.
Do you have anything to say foryourself?
Why don't you go on camera andat least try to defend yourself?
To close out the show.

Tim Schaffer (01:01:15):
I don't have anything to say.

James Todd (01:01:18):
Pleading the fifth.
I like it.

Tim Shoop (01:01:20):
All right, just turn the camera back to us.
Let's talk a little bit of crapabout Suds.

Tim Schaffer (01:01:25):
Oh man, I'd say, if you ring that bell too much,
your wife will hit you.

Tim Shoop (01:01:33):
You guys have a great day.
Thanks for getting nerdy withus on Nerds on Tap and enjoying
having James Todd, our chieftechnology officer, come on
today.
Great wealth of informationAgain.
Digitalboardwalkcom orgomodernofficecom Go, check them
out.
Once you get there, you can geton with James.

(01:01:55):
If you want to get someone-on-one time with them to
dive deeper into cybersecurityfor your business, or if you
just have an IT project that youneed to get around, give James
a call, thank you.
Thank you, good day, cheers myfellow Nerds and Beer lovers.
Stay tuned for more Nerds onTap.

(01:02:18):
Oh, and one more thing Help usspread the nerdy love and the
love for Great Brews by sharingthis podcast with your friends,
colleagues and fellow beerenthusiasts.
Let's build a community thatembraces curiosity, innovation
and the enjoyment of a cold one.
Advertise With Us

Popular Podcasts

Stuff You Should Know
Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

Las Culturistas with Matt Rogers and Bowen Yang

Las Culturistas with Matt Rogers and Bowen Yang

Ding dong! Join your culture consultants, Matt Rogers and Bowen Yang, on an unforgettable journey into the beating heart of CULTURE. Alongside sizzling special guests, they GET INTO the hottest pop-culture moments of the day and the formative cultural experiences that turned them into Culturistas. Produced by the Big Money Players Network and iHeartRadio.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.