A new search tool has come out that allows you to search your password to see if it's part of a breach. Why? Because NIST has stated that breached passwords should never be used again, by anyone. Listen to see how hackers can exploit this. Email Breac...
Lake Street El
Next up in the Critical Security Controls is number nine, Network Limits. Much like your users and computers the network should be in a Least Privilege mode. Listen to hear the details and reasons behind this control. Be aware, be safe. -------------...
Note, this episode is over the five minutes but it's an important topic. Healthcare data is the most sought after recored on the dark markets. Why? What can be done with it and why is it the top target? Listen to this episode to get the details. Be awa...
IoT manufacturers have shown that they are not the best security practitioners. The US government has taken notice and new legislation is being moved through to put those device manufacturers on the path of best security practices. What are does the le...
Next item in the CSC Top 20 series is control number eight, Malware Defense. Why is it so important and how can you use it to protect yourself? Listen in and hear how. Be aware, be safe. ------------------------------------ Website - https://www.bin...
With all the technology at our disposal breaches are still occurring at an unprecedented rate. Why? It may be that our programs are focusing on complexity and overlooking the basics leaving the easy path for cybercriminals. Listen to this episode as it...
We are trained to search for the best deals when we purchase items. When it comes to computers and gadgets this could be a risk to your security and privacy. Listen to see what can happen when you buy from less than trusted sources. Be aware, be safe. ...
The FTC conducted an experiment to see how PII is used in the Dark Web. The results are eye opening and shocking. Listen to hear how long stolen PII sits out there until it's bought and used by the criminal elements. Be aware, be safe. --------------...
Next up in the Critical Security Controls is number seven, email and browsers. This control talks about closing the ability of easy access through email and web browsers. The control leaves one aspect out of the discussion and this episode covers it. ...
IoT Devices are everywhere and with little to no security and privacy control. Roomba, the little robot vacuum, maps your home to work properly. Now, they will be selling your home information to the highest bidder. What does that mean for our privacy ...
The next item in the Critical Security Controls is number 6, Audit Log. Logs are only as good as the data recorded and how often you look at them. Outside of that they are not providing any value. Listen to how you can help address the Audit Log contro...
In the first six months of 2017 a report showed there has been 6 BILLION records breached. This episode breaks down where these came from, how, and what you can do from reports like this. Article - http://www.securityweek.com/2227-breaches-exposed-6-bi...
Every security program has a set of policies. How often are you actually reviewing them for their effectiveness and accuracy? The world is changing around us everyday and your policies should be reviewed to match that. Are you doing it? This episode ta...
Continuing the breakdown of the CIS Top 20 Critical Security Controls the next one on the list is number 5, Controlling Administrative Accounts. The admin accounts have all the access in your environment, if a hacker gets those keys they can go anywher...
Risk Management has a purpose within a security program. One of those is not to be used as your excuse to not do something. Accepting risk because lack of funds or desire to move forward is unacceptable... and risky. Be aware, be safe. ---------------...
Moving on in the CIS Top 20 the next up is number 4. Continuous Vulnerability Assessments. Monitoring your environment and systems for holes is a critical aspect of any security practice. The continuous part is the most challenging. This episode talks ...
Internet of Things is a craze to get everything on the Internet. However the rush to build has left security practices behind. Time and time again it's shown that IoT poses a security risk for everyone. This episode talks about how a fish tank almost g...
Cyber Security is a difficult practice to master. You may have components today but overlooking a few simple areas can come back and bite you in bad ways. This episode goes over some of those mistakes than can turn around and be bigger problems down th...