Press "Enter" to skip to content

Lake Street El

Episode 32 – Cyber Security Mistakes That Can Bite Your Business

Cyber Security is a difficult practice to master. You may have components today but overlooking a few simple areas can come back and bite you in bad ways. This episode goes over some of those mistakes than can turn around and be bigger problems down th...

Episode 31 – Identity Management & HR, A Partnership For Success

Security programs rely on user adoption and many times security projects are pushed back on from the changes they introduce. HR on the other hand seems to be able to do whatever they want. Use that to your advantage in your Identity Management program,...

Episode 30 – Check Your Wi-Fi Regularly

We all have a Wi-Fi router in our homes but not everyone checks them regularly. Listen to the things you should review and why it's an important security routine you should do. Be aware, be safe. ------------------------------------ Website - https://w...

Episode 29 – CIS 3 Secure Configurations

Next up in the CSCX Top 20 is number three, Secure Configurations. After you get your hardware and software inventories you need to ensure they are configured properly and consistently. This episode breaks it down. Be aware, be safe. ------------------...

Episode 28 – Dark Web Scanner – Matchlight

Breaches occur more often than you realize, but they all aren't publicized. A service I use called Matchlight scans your personal information in the Dark Web and notifies you if it finds any. This is another tool to use to keep tabs on your private dat...

Episode 27 – Learn To Use The Have I Been Pwned Website

With all the breaches that occur it's hard to keep track of them all. There's a website from a security professional that allows you to search your email address and report if it's been involved in any known breaches. You owe it to yourself to check it...

Epsiode 26 – Close Those Old Accounts

We all have accounts on websites that we have long forgotten. Each one of those is a potential security risk for you left untouched. How can you keep your security risks under control? What are the risks of those old stale accounts? Listen to this epis...

Episode 25 – CIS 2 Inventory of Software

The next Critical Security Control is number 2, Inventory of Software. What is it? How would you go about implementing this and what are they ways it could be exploited? Be aware, be safe. ------------------------------------ Website - https://www.bina...

Episode 24 – Treat Airline Boarding Passes Like Gold

When you travel you need a pass to get through security and to your seat. Those little slips of paper could be very dangerous to your private information. Don't be casual with them, treat them like you would your driver's license. This episode explains...

Episode 23 – Reduce Insider Threats Through Employee Engagement

Insider threats are just a big a concern for security teams as the outside word. How do you reduce the insider threats? Why is a challenge? This episode I talk about how employee engagement can do just that. Be aware, be safe. -------------------------...

Episode 22 – CIS 1 Inventory Of Devices

We begin the CIS CSC Top 20 breakdown with control number one. Inventory of authorized and unauthorized devices. What does it mean? How do you approach it? How can hackers exploit this? Be aware, be safe. Website - https://www.binaryblogger.com Twitter...

Episode 21 – Security is Everyone’s Problem, Let’s Help Each Other

The recent ransomeware attacks should open the conversation that security is everyone's problem. Attacks like this can impact everyone and we need to help each other understand the implications of all the technology we surround ourselves with.  Be awar...

Episode 20 – Intro To The CIS Top 20

Security professionals don't make policies and rules for the fun of it. There's a method to their madness. The Center of Internet Security created a list of 20 Critical Security Controls to help companies be a baseline of best practices in cybersecurit...

Episode 19 – A Security Tip Everyone Should Do But Most Don’t

This episode give you a very simple security tip to help you react to personal security events. Everyone should be doing this with their personal items but most if not all do not.  Be aware, be safe. Website - https://www.binaryblogger.com Twitter - ht...

Episode 18 – How To Avoid The Latest Ransomware

There is another widespread ransomware attack going on around the globe. This episode covers where this ransomware came from, how it's spread and how you can avoid getting hit?  MS 17-010 Patch https://technet.microsoft.com/en-us/library/security/ms17-...

Episode 17 – IRS Telephone Scam Breakdown

There's a popular scam where criminal call you pretending to be the IRS and saying you owe money. If you don't pay they will issue an arrest warrant. Don't fall for it. This episode breaks the scam down and how to avoid it.  Be aware, be safe. Website ...

Episode 16 – E-Cigs, Unhealthy For Your Security

Who would have thought E-Cigs could also be bad for your IT Security health? They could be, listen to find out how. Be aware, be safe. Website - https://www.binaryblogger.com Twitter - https://www.twitter.com/binaryblogger Email - contactme@binaryblogg...

Epsiode 15 – Tips To Help Identify A Phishing Email

Phishing emails try to trick you to take the bait, click a link and enter data to a criminal site that looks legitimate. Here are some tips on how to identify the easy red flags to make you stop and think about it before you click and get it wrong. Be ...