Press "Enter" to skip to content

Lake Street El

Episode 49 – Breached Passwords Should Never Be Used Again, By Anyone

A new search tool has come out that allows you to search your password to see if it's part of a breach. Why? Because NIST has stated that breached passwords should never be used again, by anyone. Listen to see how hackers can exploit this.  Email Breac...

Episode 48 – CIS 9 Network Limits

Next up in the Critical Security Controls is number nine, Network Limits. Much like your users and computers the network should be in a Least Privilege mode. Listen to hear the details and reasons behind this control. Be aware, be safe.   -------------...

Episode 47 – Why Healthcare Data Is Top Target For Cybercriminals

Note, this episode is over the five minutes but it's an important topic. Healthcare data is the most sought after recored on the dark markets. Why? What can be done with it and why is it the top target? Listen to this episode to get the details. Be awa...

Episode 46 – IoT Security Legislation Is Coming

IoT manufacturers have shown that they are not the best security practitioners. The US government has taken notice and new legislation is being moved through to put those device manufacturers on the path of best security practices. What are does the le...

Episode 45 – CSC 8 Malware Defense

Next item in the CSC Top 20 series is control number eight, Malware Defense. Why is it so important and how can you use it to protect yourself? Listen in and hear how.  Be aware, be safe.   ------------------------------------ Website - https://www.bin...

Episode 44 – Don’t Skip The Security Basics

With all the technology at our disposal breaches are still occurring at an unprecedented rate. Why? It may be that our programs are focusing on complexity and overlooking the basics leaving the easy path for cybercriminals. Listen to this episode as it...

Episode 43 – Buy Your Devices From Trusted Sources

We are trained to search for the best deals when we purchase items. When it comes to computers and gadgets this could be a risk to your security and privacy. Listen to see what can happen when you buy from less than trusted sources. Be aware, be safe. ...

Episode 42 – Breached Data Sells Quickly, Really Quickly

The FTC conducted an experiment to see how PII is used in the Dark Web. The results are eye opening and shocking. Listen to hear how long stolen PII sits out there until it's bought and used by the criminal elements. Be aware, be safe.   --------------...

Episode 41 – CIS 7 Email and Browsers

Next up in the Critical Security Controls is number seven, email and browsers. This control talks about closing the ability of easy access through email and web browsers. The control leaves one aspect out of the discussion and this episode covers it.  ...

Episode 40 – IoT Strikes Again, Roomba Is Selling You Out

IoT Devices are everywhere and with little to no security and privacy control. Roomba, the little robot vacuum, maps your home to work properly. Now, they will be selling your home information to the highest bidder. What does that mean for our privacy ...

Episode 39 – CIS 6 Audit Logs

The next item in the Critical Security Controls is number 6, Audit Log. Logs are only as good as the data recorded and how often you look at them. Outside of that they are not providing any value. Listen to how you can help address the Audit Log contro...

Episode 38 – 6 BILLION records… in the first six months of 2017

In the first six months of 2017 a report showed there has been 6 BILLION records breached. This episode breaks down where these came from, how, and what you can do from reports like this. Article - http://www.securityweek.com/2227-breaches-exposed-6-bi...

Episode 37 – Refresh Your Security Policies More Often

Every security program has a set of policies. How often are you actually reviewing them for their effectiveness and accuracy? The world is changing around us everyday and your policies should be reviewed to match that. Are you doing it? This episode ta...

Episode 36 – CIS 5 Controlling Administrative Accounts

Continuing the breakdown of the CIS Top 20 Critical Security Controls the next one on the list is number 5, Controlling Administrative Accounts. The admin accounts have all the access in your environment, if a hacker gets those keys they can go anywher...

Episode 35 – Risk Management Is Not Your Excuse Maker

Risk Management has a purpose within a security program. One of those is not to be used as your excuse to not do something. Accepting risk because lack of funds or desire to move forward is unacceptable... and risky.  Be aware, be safe. ---------------...

Episode 34 – CIS 4 Continuous Vulnerability Assessments

Moving on in the CIS Top 20 the next up is number 4. Continuous Vulnerability Assessments. Monitoring your environment and systems for holes is a critical aspect of any security practice. The continuous part is the most challenging. This episode talks ...

Episode 33 – IoT Security Failures Strike Again, This Time A Fish Tank

Internet of Things is a craze to get everything on the Internet. However the rush to build has left security practices behind. Time and time again it's shown that IoT poses a security risk for everyone. This episode talks about how a fish tank almost g...

Episode 32 – Cyber Security Mistakes That Can Bite Your Business

Cyber Security is a difficult practice to master. You may have components today but overlooking a few simple areas can come back and bite you in bad ways. This episode goes over some of those mistakes than can turn around and be bigger problems down th...