Skip to main content
Technology NadiSen$e

Technology NadiSen$e

By Arvin Chaudhary

The Covid19 Pandemic has been a rude awaking to businesses, both large and small. In this Podcast, we will ask the questions that are on many business leader's minds as they prepare their organizations to navigate and thrive in the post Covid19 environment. From implementing a remote workforce at a moment's notice, business continuity, security to communication with your customers, technology plays a significant role. My conversations with industry experts will provide practical strategies and insights, as well as discovering new solutions and innovations.
Available on
Apple Podcasts Logo
Google Podcasts Logo
Overcast Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

The Trojan Horse and the Second Wave of Cyber Threats

Technology NadiSen$e May 20, 2020

00:00
21:14
Part 2 How to Be Less Vulnerable to Hackers with Jim Stickley

Part 2 How to Be Less Vulnerable to Hackers with Jim Stickley

About Jim Stickley: Jim Stickley is a cybersecurity expert with over 25 years in the industry. Stickley has been involved in thousands of security services for financial institutions, Fortune 100 corporations, healthcare facilities, legal firms, and insurance companies. His job has been to find security flaws before the real criminals find them and warn people and organizations about what they can do to protect themselves.

Through the years, Stickley has discovered numerous security vulnerabilities in products such as firewalls, PKI servers, online banking applications, and PDA devices.

He has been a consultant for the network stations FOX NEWS, CBS, NBC, and the Associated Press.  Jim has been featured in numerous media outlets such as Time Magazine, Business Week, Fortune Magazine, New York Times, PC Magazine, CSO Magazine, and hundreds of other publications. He has also been showcased on numerous television shows, including NBC's "Nightly News,” CNN's "NewsNight,” CNBC's "The Big Idea,” Anderson Cooper's "Anderson" and is a frequent guest on NBC's "Today Show."

Additionally, Stickley is the author of The Truth about Identity Theft and a co-author of Beautiful Security. In the entertaining book The Truth About Identity Theft, Stickley walks you through real-life scams and exploits that people fall victim to every day.

Today, Stickley is the CEO of Stickley on Security, serves on several corporate boards, and was a co-founder of TraceSecurity Inc. Stickley can be seen throughout the United States, where he serves as an entertaining speaker for corporations, security-related conferences, seminars, and forums, covering topics that range from basic identity theft to national cyber terrorism.

If you are interested in learning more reach out to us at www.nadicent.com/sos

Sep 02, 202037:04
How to Be Less Vulnerable to Hackers with Jim Stickley Part 1

How to Be Less Vulnerable to Hackers with Jim Stickley Part 1

About Jim Stickley: Jim Stickley is a cybersecurity expert with over 25 years in the industry. Stickley has been involved in thousands of security services for financial institutions, Fortune 100 corporations, healthcare facilities, legal firms, and insurance companies. His job has been to find security flaws before the real criminals find them and warn people and organizations about what they can do to protect themselves.

Through the years, Stickley has discovered numerous security vulnerabilities in products such as firewalls, PKI servers, online banking applications, and PDA devices.

He has been a consultant for the network stations FOX NEWS, CBS, NBC, and the Associated Press.  Jim has been featured in numerous media outlets such as Time Magazine, Business Week, Fortune Magazine, New York Times, PC Magazine, CSO Magazine, and hundreds of other publications. He has also been showcased on numerous television shows, including NBC's "Nightly News,” CNN's "NewsNight,” CNBC's "The Big Idea,” Anderson Cooper's "Anderson" and is a frequent guest on NBC's "Today Show."

Additionally, Stickley is the author of The Truth about Identity Theft and a co-author of Beautiful Security. In the entertaining book The Truth About Identity Theft, Stickley walks you through real-life scams and exploits that people fall victim to every day.

Today, Stickley is the CEO of Stickley on Security, serves on several corporate boards, and was a co-founder of TraceSecurity Inc. Stickley can be seen throughout the United States, where he serves as an entertaining speaker for corporations, security-related conferences, seminars, and forums, covering topics that range from basic identity theft to national cyber terrorism.

If you are interested in learning more reach out to us at www.nadicent.com/sos

Aug 25, 202033:44
What is a Mobility Management Service and Why Should You Care?
Jun 30, 202039:51
 Do you need to revisit your mobility management costs?
Jun 16, 202036:37
Nadisen$e Podcast Trailer

Nadisen$e Podcast Trailer

Arvin Chaudhary here, and I am  President of Nadicent Technologies.  

For over 15 years, we have been advising and advocating on behalf of medium and large enterprises like yours.

This is unprecedented for everyone, especially business organizations.

 In this new normal, the most pressing issue we are hearing from our clients is the need to reduce COSTS, improve SECURITY, and implement robust, permanent Work From Home solutions.

We created this PODCAST Series to address the concerns and questions we hear not only from our clients but also organizations like yours.

Join me as I speak with subject matter experts from our portfolio of suppliers. And discuss practical strategies and relevant solutions that enable your organization to reduce COSTS, improve SECURITY, and implement smart Work From Home solutions. 



Jun 03, 202001:03
How to Be Heard and Seen Clearly from Your Home Office

How to Be Heard and Seen Clearly from Your Home Office

With the Covid-19 pandemic, the number of Americans working from home went from 15 million to 92 million in just a couple of weeks.  Companies large and small had very little notice for making this massive change. Employees, executives, and broadcasters moved from a well managed IT infrastructure to a very unpredictable environment. As a result, Internet Service Providers experienced a massive increase in bandwidth usage. 

The competing bandwidth requirements for VoIP phone calls, video conferencing, remote desktop with SaaS applications such as Office 365, gaming, and entertainment are creating overwhelming demands on internet service in every home. 

As a result, we are seeing TV broadcasters and their guest's voices getting garbled and pictures freezing. The CEO’s video is getting frozen during an all-hands meeting, Contact Center Agents’ customer experience suffering. We too have all experienced this and heard the garbled voice on phone calls or experienced jittery video meetings.

Simply said, all this is resulting from internet latency and jitter caused by network congestion. The businesses addressed this problem in the office environment a long time ago. And it is not difficult to fix this for the employees at home too. Join us for the podcast discussing the why, what, and how to address this issue.

Today, I’ll speak with Jeff Burchett, Co-founder and the Chief Revenue Officer of bigleaf networks. Bigleaf Home Office is a software-defined wide area network or SD-WAN to support the “single internet” home office environment. It automatically detects the needs of business applications and intelligently adapts and prioritizes traffic in real-time, called Dynamic QoS.  It also works just as well with the usual multiple internet connections in the branch offices.

Check out Bigleaf's latest PROMOTION,  or to schedule a FREE CONSULTATION

Jun 03, 202031:56
The Trojan Horse and the Second Wave of Cyber Threats

The Trojan Horse and the Second Wave of Cyber Threats

The Cyber Security threats were already high before the Covid19 pandemic and with the majority of corporate employees working remotely, the cyber threat landscape expanded dramatically.  Even though remote workers were using VPN to access corporate assets the devices may have been infected since they were being used in less secure home environments.  During the last few weeks, we may be lulled by the illusion that the cyber incidents have stabilized. Did they? Or is it the calm before impending storm or the SECOND WAVE?  The SECOND WAVE of cyber threats is expected to materialize as the compromised laptops of the returning remote workers are connected directly into the corporate networks.

Download Vigilant's COVID-19 Checklist

Interested in a No-Risk, No Cost Proof of Vigilance?   

To learn about how we can help, please ask to schedule a 1-hour conference call with our Vigilant cybersecurity expert.    As the next step, we will provide a monthly cost estimate and offer, 5-day CyberDNA Proof-of-Vigilance (POV) trial at no cost. If we detect an incident during this POV trial, Vigilant will provide up to 10 hours of incident response support at no charge. At the end of this trial, we will review a detailed report of the findings, valued at $15-30K.   Once the evaluation process ends, you may ship the CyberDNA equipment back with no obligation or choose to continue with a 1- or 3-year Managed Detection and Response Service.    In our experience, over 95% of trials lead to the full deployment of our solution. This the reason why Vigilant can afford to provide this proof-of-value trial at no cost to qualified, potential customers!    For more information and other options, please provide your information here.

Schedule a FREE 30 Minute Consultation 

Vigilant is a global cybersecurity technology company that exists to protect and serve customers by eliminating cyber threats and providing peace of mind throughout the entire IT & cybersecurity lifecycle. Vigilant's next-gen solution offers both managed endpoint protection, which prevents outside threats, and a CyberDNA™ distributed network of passive security sensors that detects threats inside the network perimeter. Vigilant’s full-solution security program places the proper balance of controls and cyber intelligence into its customers’ hands so they can make the right decisions to reduce risk in a financially responsible manner. Vigilant currently operates in the automotive, healthcare, financial, legal, and other business industries with its headquarters located in Cincinnati, Ohio. Vigilant was founded in 2010 with a mission to defend the vulnerable and directs 25% of its revenue toward international orphan, foster care, and anti-child-trafficking organizations.


May 20, 202021:14
How to Optimize, Secure, and Manage your Mobile Environment
May 11, 202031:33
Remote Workers: Business Risk and Cybersecurity

Remote Workers: Business Risk and Cybersecurity

Today’s episode is focused on “Business Risk and Cyber Security”.

This is an area that many of the C-Level executives are concerned about. The Cyber Security threats were already high but with the Covid19 pandemic, it has increased significantly. With the majority of corporate employees working remotely, the cyber threat landscape has expanded dramatically.

According to a recent study published by OpenVPN, 90% of respondents said that remote workers are a security risk to the organization and 73%  of VP and C-suite IT leaders believe remote workers pose a higher risk than onsite employees.

Today's conversation is with Dominique Singer. He is one of our leading experts in Business Security. He has over 25 years of experience in IT and Security, working with well known Global Organizations.

He holds numerous security certifications, such as CISM, CCSK, CRISC, CISSP, GSEC Gold, COBIT, and more!

If you'd like to speak with one of our advisors, please email us at advisor@nadicent.com to schedule a FREE consultation.

Apr 20, 202029:36
Rise Up to the Remote Worker Challenge! Setting up your Remote Worker affordably, securely and quickly!
Apr 15, 202023:02