πŸ”’ Patreon Special

IT Pros: exclusive shows await you on Patreon, focusing on the more challenging aspects of running your practice and working with clients and employees.


670: Adam Engst (TidBITS) Apple at 50 β€” The Anniversary Nobody's Talking About: Community, HyperCard, and What We Lost

670: Adam Engst (TidBITS) Apple at 50 β€” The Anniversary Nobody's Talking About: Community, HyperCard, and What We Lost

Adam Angst of TidBITS reflects on Apple’s 50 years through the lens of early tech idealism, arguing that what mattered most wasn’t Apple itself but the community around it, which was weakened by shifts like the end of Macworld keynotes, Apple’s vertical integration, and the decline of user groups and independent resellers. He contrasts the Mac’s early β€œcreate” ethos (e.g., HyperCard) with later emphasis on communication and content consumption via iPod, iPhone, and social media, while noting growing societal harms from tech giants. Angst describes renewed excitement in creation via AI tools, citing apps he built for track training and race pacing. He recounts how his 1993 Internet Starter Kit for Macintosh bundled software (including MacTCP) and a flat-rate ISP account, prompting an Apple Legal scare resolved by the MacTCP product manager, and closes by urging people to ditch social media and β€œgo outside.”

00:00 Part Two Kickoff

00:37 TidBITS Anniversary

00:52 Apple 50 Reflections

01:59 Pre Web News Era

04:33 Early Internet Optimism

05:20 Flame Wars Then

07:31 Apple Idealism Fades

10:20 Community Was The Magic

11:45 Macworld And User Groups

14:00 Vertical Integration Shift

17:25 Apple Turning Points

22:20 Creators To Consumers

25:43 From Consumption to Creation

26:01 Bicycle for the Mind

27:27 AI as Research Assistant

28:26 Building Runner Tools

29:40 Pacing Math Problem

33:25 AI MVP to Real Code

36:04 Internet Starter Kit Origins

40:56 Apple Legal Scare

43:09 Invent a Better Future

46:04 Go Outside Finale

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”__β€”

669: Adam Engst (TidBITS) Slack Impersonation Malware, Anthropic's Mythos, and Why You Need a Personal AI Defender

669: Adam Engst (TidBITS): Slack Impersonation Malware, Anthropic's Mythos, and Why You Need a Personal AI Defender

Adam Engst (TidBITS) discusses a malware incident in a long-running public β€œSlack Bits” group where a bad actor impersonated Glenn Fleishman via a duplicate Slack display name, tricking him into downloading an info-stealer, prompting Engst to consider shutting down the 1,400-member community. The conversation shifts to Anthropic’s Mythos and Project Glasswing (as covered by TidBITS security editor Rich Mogull), which reportedly found long-standing bugs (including in OpenBSD and FFmpeg), raising concerns about AI-accelerated vulnerability discovery, defender/attacker asymmetries, costs and compute barriers, and impacts on zero-day markets. They also cover Apple’s iOS signing and update/upgrade distinctions, why Apple supports macOS differently than iOS, broader distrust in institutions, social media’s advertising/algorithm problems (including Section 230), bots and AI-driven phishing, and the idea of local, user-controlled AI agents to help protect individuals online.

00:00 Welcome Back Adam Engst

00:20 Slack Impersonation Scare

02:15 Cleaning Up a Public Slack

03:40 Mythos and Glasswing Explained

05:19 AI Bug Hunting Reality Check

08:25 Red Team Blue Team Asymmetry

09:50 Compute Costs and Access Barriers

12:19 Trust Ethics and Regulation

17:50 Personal AI Security Agents

23:34 Zero Day Markets and Exploit Kits

25:40 iOS Signing and Update Windows

27:13 Why Macs Get Longer Support

32:06 Scams Incentives and Pig Butchering

34:02 Life Offline and Misinformation

35:41 Social Media Hot Garbage

36:43 Addiction By Design

37:46 Advertising Model Flaw

38:47 Infinite Scroll Limits

39:39 Dunbar Number Reality

40:54 Platform Power Responsibility

42:46 AI Influencers And Slop

43:37 Bots And Fake Accounts

46:33 AI Phishing And Passkeys

49:21 Closed Communities Trust

53:25 CAPTCHAs And Human Help

56:08 Section 230 And Algorithms

57:46 Chronological Feed Fix

59:35 Two Week News Rule

01:02:41 Ads In Maps Backlash

01:04:10 Wrap Up And Next Part

668: Michael Thomsen of Origin 84, Part Two - Reusable Compliance Policies, ISO 27001 Audits, and Building a Fractional GRC/Strategy Bench

In this Command Control Power episode, host Joe and guests discuss standards, policies, certification, and compliance with Michael Thomsen of Origin 84 in Sydney, continuing an ISO 27001 deep dive. Michael explains how policies are written to solve specific control problems (e.g., MFA) and can be reusable, while areas like data classification require tailoring based on a client’s industry, legislation, contracts, and workflows; key discovery questions include where data is stored and shared, and what obligations contracts impose. The conversation contrasts frameworks (NIST, Essential Eight) and notes auditors verify that policies drive processes and are followed, emphasizing continual improvement through audits, risk/incident tracking, and iterative remediation. Jerry and Sam share healthcare/SOC 2 experiences and discuss shifting solo consultants from tactical support to higher-value strategic advisory/account management, using fractional roles and partners. Michael outlines Origin 84’s fractional model (financial controller, HR, strategy officer, plus legal/CFO) and sourcing via professional networks, LinkedIn, and conferences like ACEs, where Michael will present on account management.

00:00 Welcome and Recap

00:45 Reusable Policies vs Tailoring

02:20 Data Classification Nuances

03:33 Discovery Questions That Matter

06:18 Building Trust Without Conflict

07:30 Insurance as the Trigger

08:47 SOC 2 and Framework Reality

10:50 Audits and Continuous Improvement

12:48 Breaking Down Compliance Work

14:07 Jerry’s Healthcare SOC 2 Case

15:49 Fractional Support Models

17:13 Move Up to Strategic Advisor

19:16 Agency and Stakeholder Dynamics

20:41 Consulting Revenue Mindset Shift

23:26 Hand Off Tactics, Lead Strategy

24:21 Healthcare Provider Experiences

24:30 Compliance Strategy Calls

25:16 Subcontracting Specialist Help

25:55 Scaling With Key Hires

28:18 Fractional Finance And HR

30:03 Fractional Strategy Officer

31:26 Outsourced Regional Support

32:31 Finding Fractional Talent

36:55 Networking At ACEs

39:41 Account Management Matters

41:51 Wrap Up And Farewell

667: Michael Thomsen of Origin 84 on Building a Process-Driven MSP and Using Compliance Frameworks for Strategy

Michael Thomsen on Building a Process-Driven MSP and Using Compliance Frameworks for Strategic IT

Host of Command Control Power welcomes returning guest Michael Thomsen of Origin 84 from Sydney ahead of the ACEs conference in Minneapolis, discussing the mental and operational preparation to leave a company running without him through documentation, chain of command, and role accountability using Confluence and selected EOS practices. Thompson explains balancing perfectionism with repeatable team standards, prioritizing avoiding preventable mistakes, and aligning service quality to what clients value. The conversation pivots to SOC 2, HIPAA, and ISO 27001 as validation frameworks increasingly demanded via vendor risk and tenders, emphasizing policy vs procedure and continual improvement. He outlines Origin 84’s flat-fee, services-first model and β€œmagic quadrant” approachβ€”help desk, IT administration, account management, and strategyβ€”using root-cause fixes and programmatic improvements across clients. He advocates standardizing on Microsoft (often using Entra even for Google clients), careful vendor selection, and tailoring higher-cost governance features (e.g., Defender/Purview, logging) to client needs while keeping baseline security consistent.

00:00 Welcome Back Michael

00:35 27 Hour Travel Ritual

01:14 Leaving The Business

03:23 Planning Like Military

04:47 Runbooks And EOS

07:22 Perfection Versus Good

12:24 Standards And Apologies

13:53 SOC2 HIPAA ISO Explained

16:32 Policies Versus Procedures

17:56 Making Services Sticky

20:14 Magic Quadrant Strategy

23:16 Fix Root Causes

26:21 Hourly Billing Incentives

27:45 Value Without Strategy Buy In

29:13 Listening Before Pushing

29:28 Pricing Pushback Case Study

31:52 Standardized Security Baseline

34:33 Paying For The Paperwork

36:10 Reducing Cost Via Account Management

36:50 Stack Ownership And Optional Features

39:21 Microsoft As The North Star

41:10 Vendor Risk And Pricing Strategy

47:54 Entra SSO For Google Clients

50:46 ISO 27001 Policy Reality Check

54:57 Wrap Up And Part Two Tease

Best Of CCP - 200: Not So Off The Rails

Sam Valencia, Jerry Zigmont and Joe Saponare discuss working with Apple technology and clients. Drawn from their combined experience of over 20 years in the Apple Consultants Network, thaey discuss technical support issues both with the technology and working with clients.

665: Apple’s 50th Anniversary Old Shortcuts, and What Still Delights - Part 2

The hosts revisit early Apple and Mac experiences and discuss first keyboard shortcuts, focusing on β€œCommand Control Power” after a photographer client referenced it while troubleshooting a MacBook Pro that died on location from a drained battery. They debate the proper shortcut key order versus Apple’s conventions, recall Apple II shortcuts like Control–Open Apple–Reset, and reflect on floppy-drive workflows and multi-disk backups. The conversation shifts to Apple’s attempts to break into business hardware, Steve Jobs’ impact and management style, and a perceived reversal where hardware fit-and-finish improved while macOS feels buggier, with annual OS releases and settings moving cited as problems. They note Rapid Security Response/Background Security Improvements placement changes, praise Apple Watch and AirPods, share audience photos and Apple memorabilia, and close with gratitude to Apple, colleagues, and listeners.

00:00 Apple 50th Kickoff

00:27 Shortcut Origin Story

01:08 Photo Shoot Panic

02:17 Shortcut Order Debate

03:27 Open Apple Keys

05:16 Save Changes Shutdown

07:33 Floppy Boot Days

09:02 Apple In Business

12:22 Jobs Magic And Myth

14:03 Modern OS Buggy Era

19:27 Settings Search Problem

23:17 Yearly OS Cadence

26:04 Planned Obsolescence Talk

27:46 Software Sells Hardware

28:07 Mac CPU Transitions

29:12 Snow Leopard Lessons

31:37 Intel Era Reality Check

33:11 Security Updates Moved

34:22 Throwback Mac Photos

35:52 Daily Delight Devices

40:12 Old iPhones and iPods

42:29 Apple Employee Card

44:37 Startup Office Memories

46:13 50 Years of Apple