エピソード

  • Fraud in the Logistics Industry - Technology vs. Criminal Innovation
    2025/08/13

    Join Brandon as he sits down with Nick, Claims and Carrier Compliance Specialist at M2 Logistics, to explore the sophisticated world of freight fraud and how technology is being weaponized on both sides of this battle.

    In this episode, we dive deep into:

    • How phishing attacks are targeting logistics brokers to steal credentials and post fraudulent loads
    • The rise of carrier identity theft and "cloning" schemes that bypass DOT regulations
    • Advanced tracking technology and fraud detection platforms like Trucker Tools
    • The concerning role of AI in doctoring delivery documents and creating fake damage claims
    • International dispatch services and the challenges they present for fraud prevention
    • High-value cargo protection and the insurance requirements that come with it

    Nick shares real-world examples of cargo theft schemes, from fake Amazon warehouse pickups to sophisticated shipper impersonation scams involving major home builders. Learn how M2 Logistics uses both technology and human verification to stay ahead of increasingly complex fraud schemes.

    Whether you're in logistics, cybersecurity, or business operations, this episode reveals striking parallels between digital security threats and physical supply chain vulnerabilities.

    続きを読む 一部表示
    32 分
  • Women in Technology: Breaking Barriers & Building Allies
    2025/08/12

    Join Brandon from M2 Technology as he sits down with Kelly and Aslinn from Women in Technology Northeast Wisconsin to discuss the real challenges facing women in tech and the practical steps everyone can take to create more inclusive workplaces.

    Key Topics Covered:

    -Why "you can't be what you can't see" matters in tech careers
    -Practical allyship strategies that work in real meetings
    -How to advocate for others when they're not in the room
    -The difference between formal and informal mentorship
    -Breaking down barriers in STEM fields
    -Career pivots and validation moments that changed everything

    Actionable Takeaways:

    -Specific phrases to draw out quiet voices in meetings
    -How to give constructive feedback across gender lines
    -Networking strategies that actually build careers
    -Ways to support colleagues without overstepping
    -Self-advocacy techniques for career advancement

    About Our Guests:

    Kelly serves as President of Women in Technology Northeast Wisconsin and brings years of experience from programming to executive leadership. Aslinn has an international background in technology and leads WIT's professional development pillar.

    About Women in Technology:

    WIT Northeast Wisconsin operates on three pillars: WIT for Girls (middle school outreach), WIT on Campus (college mentoring), and WIT at Work (professional networking). Their mission spans "from classroom to boardroom" - supporting women and allies in STEM careers at every stage.

    Why This Matters:

    The tech industry continues to face diversity challenges, but organizations like WIT are creating tangible change through community building, mentorship programs, and practical education. This conversation goes beyond statistics to show exactly how allyship works in practice.

    Perfect for: IT professionals, business leaders, anyone interested in workplace diversity, mentorship, career development, and creating more inclusive teams.

    M2 Technology provides managed IT services, cybersecurity solutions, and technology consulting for businesses across Wisconsin. We believe technology should be accessible to everyone.

    Connect with Women in Technology and M2 Technology

    WIT Website: https://www.witwisconsin.com/
    M2 Technology Website: www.m2.technology

    続きを読む 一部表示
    30 分
  • Is AI Going to Make It Harder for You to Get a Job?
    2025/06/18

    On this episode of IT Unplugged, we sit down with Eric Hussin, the new owner of Express Employment Professionals, to tackle one of the biggest questions facing job seekers today: Is AI making it harder to land your next role?

    Eric shares his unique journey from employee to business owner, including the mentorship and transparency that made his acquisition possible. We dive deep into the reality of AI in recruiting - spoiler alert: it's not as advanced as you think.

    What we cover:

    -The truth about AI auto-rejections (hint: it's probably not what you think)
    -Why human connection still beats automated LinkedIn messages every time
    -The biggest red flags on resumes that destroy your chances
    -How to justify your salary with actual numbers, not buzzwords
    -Why data scraping tools are game-changers while AI matching falls short
    -The generational divide on job tenure and work-life balance
    -Green Bay's hottest job markets: cybersecurity and AI programming

    Key takeaways:

    -Resumes need to show results, not just skills
    -Lying about employment dates is an instant disqualifier
    -Remote work expectations are creating tough competition
    -Companies are paying premium for cybersecurity talent
    -AI tools cost $5-50k annually but often lack positive ROI

    Eric gives brutally honest insights about what really works in today's job market, why vague interview answers are career killers, and what it takes to attract top talent in competitive fields.

    Whether you're job hunting, hiring, or just curious about the future of work, this episode breaks down the real impact of technology on employment - without the hype.

    Guest: Eric Hussin, Owner of Express Employment Professionals
    Hosts: Brandon from M2 Technology

    続きを読む 一部表示
    28 分
  • Is Office Protect REALLY the BEST Security Tool for Microsoft 365?
    2025/06/02

    In this episode of IT Unplugged, Mike and Brandon dive deep into Microsoft Office Protect - the powerful security add-on that's becoming mandatory for M2 Technology clients. Discover how this affordable tool can prevent email breaches, detect suspicious login attempts, and stop malicious rule creation before damage occurs. We break down real-world examples of how attackers compromise Microsoft 365 accounts, why traditional security measures sometimes fail, and how Office Protect provides that critical extra layer of protection with minimal user impact.


    Learn why proper DNS configuration, multi-factor authentication, and responsive monitoring create the perfect security stack for email protection. We share a minute-by-minute account of how our team detected and remediated a breach in just three minutes, potentially saving a client from serious financial and reputational damage. If you're concerned about email security or wondering if someone might already have unauthorized access to your inbox, this episode is essential viewing.

    続きを読む 一部表示
    26 分
  • Is Your Business REALLY Ready FOR CMMC Compliance?
    2025/05/30

    In this essential episode, we sit down with cybersecurity expert Mike to break down everything small and medium-sized businesses need to know about CMMC (Cybersecurity Maturity Model Certification) compliance. If you work with the Department of Defense or its supply chain, this conversation is critical for your business survival.
    Mike walks us through:
    What CMMC 2.0 is and why it matters for your business
    The three compliance levels and which one your company needs
    Practical steps to prepare for assessment without breaking the bank
    Common pitfalls that could cost you government contracts
    How to integrate CMMC requirements into your existing IT security framework

    Stop viewing compliance as just another checkbox! Learn how proper CMMC implementation can actually strengthen your overall security posture and protect your business from increasingly sophisticated cyber threats.
    Whether you're just starting your CMMC journey or looking to refine your approach, this episode provides actionable insights that will save you time, money, and stress.
    CMMC Certification Guide | DoD Cybersecurity Requirements | Government Contracting | DFARS Compliance | NIST 800-171 | Defense Industrial Base | IT Security Standards | Cybersecurity Maturity Model Certification 2.0 | Federal Contractor Requirements | Supply Chain Security | CMMC Assessment | DIB Cybersecurity | CUI Protection | FCI Data | Government Compliance | Pentagon Contractors | DoD Supply Chain | CMMC Accreditation | Cybersecurity Framework | Small Business IT Security | Defense Contractors | CMMC Controls | Federal Acquisition Regulation | CMMC Self-assessment

    続きを読む 一部表示
    29 分
  • How NEWMA Is Solving The Tech Skills Crisis In Wisconsin
    2025/04/30

    We sit down with Ann Franz, Executive Director of the NEW Manufacturing Alliance (NEWMA), to discuss innovative strategies for addressing the manufacturing skills gap. Ann shares how NEWMA has successfully built powerful partnerships between manufacturers and educational institutions to create a sustainable talent pipeline.

    Discover practical insights on:

    -How to develop effective industry-education collaborations that actually work.
    -Strategies for attracting young talent to manufacturing careers
    -Building apprenticeship and training programs that meet real industry needs
    -The future of manufacturing workforce development in a digital economy
    -Creating regional solutions to manufacturing talent shortages

    Whether you're a manufacturing leader struggling with workforce challenges, an IT professional supporting the industry, or an educator preparing students for future careers, this conversation provides actionable takeaways to help bridge the skills gap and strengthen American manufacturing.

    続きを読む 一部表示
    26 分
  • Beyond Reactive IT: Building Systems That Scale with Josh from Tanduo | IT Unplugged
    2025/04/16

    Is your company stuck "looking at its feet" instead of strategically planning for growth? In this episode of IT Unplugged, Brandon sits down with Josh from Tanduo to discuss how businesses can transform from reactive IT operations to opportunity-ready organizations. Josh shares insights from his experience helping mid-sized companies scale 2-5x through strategic IT leadership. Learn the critical differences between stabilization, transformation, and scaling, plus practical tips for breaking free from operational quicksand. Whether you're a C-suite executive or an IT professional who wants to drive change, this conversation offers a roadmap for building what Josh calls "repeatable delivery machines" that enable sustainable growth.

    続きを読む 一部表示
    35 分
  • Is Printing Dead? How Modern Print Solutions Fuel Business Efficiency
    2025/04/09

    In this episode of IT Unplugged, we sit down with Scott Janssen from James Imaging Systems to explore the evolution of printing in today's digital world. Far from being obsolete, printing has transformed into a comprehensive business solution that goes beyond simply putting marks on paper. Scott shares the compelling origin story of James Imaging, founded on family values and genuine client care, and explains how their dual approach of PrintSmart and WorkSmart helps organizations streamline workflows while optimizing document management. Discover how James Imaging analyzes manufacturing processes to eliminate inefficiencies, implement innovative solutions like image tracking for warranty claims, and build lasting relationships with clients based on trust and understanding. Whether you're managing a print environment or looking to optimize business operations, this episode reveals how modern printing technology serves as a critical component of efficient workflow design.

    続きを読む 一部表示
    26 分