Cyber Security is a difficult practice to master. You may have components today but overlooking a few simple areas can come back and bite you in bad ways. This episode goes over some of those mistakes than can turn around and be bigger problems down th...
Lake Street El
Security programs rely on user adoption and many times security projects are pushed back on from the changes they introduce. HR on the other hand seems to be able to do whatever they want. Use that to your advantage in your Identity Management program,...
We all have a Wi-Fi router in our homes but not everyone checks them regularly. Listen to the things you should review and why it's an important security routine you should do. Be aware, be safe. ------------------------------------ Website - https://w...
Next up in the CSCX Top 20 is number three, Secure Configurations. After you get your hardware and software inventories you need to ensure they are configured properly and consistently. This episode breaks it down. Be aware, be safe. ------------------...
Breaches occur more often than you realize, but they all aren't publicized. A service I use called Matchlight scans your personal information in the Dark Web and notifies you if it finds any. This is another tool to use to keep tabs on your private dat...
With all the breaches that occur it's hard to keep track of them all. There's a website from a security professional that allows you to search your email address and report if it's been involved in any known breaches. You owe it to yourself to check it...
We all have accounts on websites that we have long forgotten. Each one of those is a potential security risk for you left untouched. How can you keep your security risks under control? What are the risks of those old stale accounts? Listen to this epis...
The next Critical Security Control is number 2, Inventory of Software. What is it? How would you go about implementing this and what are they ways it could be exploited? Be aware, be safe. ------------------------------------ Website - https://www.bina...
When you travel you need a pass to get through security and to your seat. Those little slips of paper could be very dangerous to your private information. Don't be casual with them, treat them like you would your driver's license. This episode explains...
Insider threats are just a big a concern for security teams as the outside word. How do you reduce the insider threats? Why is a challenge? This episode I talk about how employee engagement can do just that. Be aware, be safe. -------------------------...
We begin the CIS CSC Top 20 breakdown with control number one. Inventory of authorized and unauthorized devices. What does it mean? How do you approach it? How can hackers exploit this? Be aware, be safe. Website - https://www.binaryblogger.com Twitter...
The recent ransomeware attacks should open the conversation that security is everyone's problem. Attacks like this can impact everyone and we need to help each other understand the implications of all the technology we surround ourselves with. Be awar...
Security professionals don't make policies and rules for the fun of it. There's a method to their madness. The Center of Internet Security created a list of 20 Critical Security Controls to help companies be a baseline of best practices in cybersecurit...
This episode give you a very simple security tip to help you react to personal security events. Everyone should be doing this with their personal items but most if not all do not. Be aware, be safe. Website - https://www.binaryblogger.com Twitter - ht...
There is another widespread ransomware attack going on around the globe. This episode covers where this ransomware came from, how it's spread and how you can avoid getting hit? MS 17-010 Patch https://technet.microsoft.com/en-us/library/security/ms17-...
There's a popular scam where criminal call you pretending to be the IRS and saying you owe money. If you don't pay they will issue an arrest warrant. Don't fall for it. This episode breaks the scam down and how to avoid it. Be aware, be safe. Website ...
Who would have thought E-Cigs could also be bad for your IT Security health? They could be, listen to find out how. Be aware, be safe. Website - https://www.binaryblogger.com Twitter - https://www.twitter.com/binaryblogger Email - contactme@binaryblogg...
Phishing emails try to trick you to take the bait, click a link and enter data to a criminal site that looks legitimate. Here are some tips on how to identify the easy red flags to make you stop and think about it before you click and get it wrong. Be ...