Press "Enter" to skip to content

Lake Street El

Episode 192 – How Much Is Your Identity Worth On The Dark Web

When you identity is stolen one of two things will happen. The thief will use your information or they will sell it. The Dark Web is the place where the nefarious actions take place but do you know how much you digital life is actually worth?  This epi...

Episode 191 – Tools, Tips and Tricks – Spiceworks

This week's tools, tips and tricks goes over a fantastic collection of IT Administration and Security tools, Spiceworks. Spiceworks is a full free suite of tools that covers everything from a full funcitonal IT discovery and Inventory management system...

Episode 190 – Email Is Still Your Company’s Weakest Link

This shouldn't be a shock but email stinks. It's one of the biggest security threats to your company. You may have filters on the messages but you have thousands of untrained people bringing in potential threats to the company. This episode goes into e...

Episode 189 – What Is A CSIRT And Does Your Company Need One, Yet?

In the security world things happen, we call these incidents. Big and small all incidents need to be investigated, mitigated and worked to prevent them. That's where a CSIRT comes into the mix. Computer Security Incident Response Teams sole responsibil...

Episode 188 – What Is A SOC And Does Your Company Need One, Yet?

If you are IT or near the security world you probably have heard the term SOC (pronounced SOCK). SOC stands for Security Operations Center. What is a SOC and how does it differ from your security team? This episode goes into what a SOC is for, responsi...

Episode 187 – What Is Considered A Breach In Healthcare?

We heard the word breach all the time in the news, stories and reports. What is a breach? The answer is not as simple as you think, especially in the Healthcare world. This episode goes into the definitions and explains what a breach is for healthcare....

Episode 186 – Tools, Tips and Tricks – Pwned Passwords

Troy Hunt, creator of Have I Been Pwned, added a new feature to the website called Pwned Passwords. This is a collection of over 500 million passwords that were collected from all the breaches. The reason this was created is that NIST has suggested a c...

Episode 185 – How You Can Be Breached Without Detecting It

Hackers want to remain undetected. The longer they slip under your radar the longer they can steal your data. This episode goes into a few ways you can identify signs that you have something malicious running on your machine that is going undetected by...

Episode 184 – Should We Create A National Cybersecurity Safety Board?

Is it time to create a National Cybersecurity Safety Board similar to the NTSB? This episode goes into the idea of this for post-breach investigations and recommendations after the fact.    Be aware, be safe. ------------------------------------ Websit...

Episode 183 – How To Stop Websites Using Your PC To Mine Bitcoin

Bitcoin or cryptocurrency mining is becoming the new thing websites and hackers are doing. Legitimate websites could be using your PC computing power to mine for bitcoin and you won't know it. This episode goes into the details on how to prevent your P...

Episode 181 – Tools, Tips and Tricks – The Google Hacking Database

We all use of have used Google search at some point in our digital lives. I would be that most don't know how powerful it truly is. The Google Hacking Database website does two things - It teaches you about how to do deep searches and opens your eyes t...

Episode 180 – How To Avoid Torpedoing Your Own Security Plans

There are threats everywhere looking to disrupt and try to break your security plans and projects. Most teams forget to look at themselves and realize that their own actions and inactions can do just as much damage to their security plans as something ...

Episode 179 – Facebook Offering A Free VPN – DO NOT USE IT!!!

I am 100% pro-VPN for personal use. It protects you, your privacy, keeps your Internet use away from prying eyes. Facebook is getting on board and not offering a VPN for iOS users. DO NOT USE IT! PERIOD! RUN AWAY!!! This episode goes into why you shoul...

Episode 178 – Google To Start Labeling HTTP Website As Not Secure

Google is slowly moving toward a complete secure web. Starting in June Chrome will begin to label all HTTP only websites as Not Secure. This episode goes into the details, what the difference is between HTTP and HTTPS and why this is a good move for ev...

Episode 177 – How To Tell If You Might Have Malware

Malware is the big buzzword lately. Even though you may have endpoint protection and run scans malware can still sneak onto your computer and cause problems or steal your information. This episode goes over some signs and things to look out for that ma...

Episode 176 – Tools, Tips and Tricks – Windows Sysinternals

If you work with Windows from an administrative position, have Windows on your PC at home or want to learn more about how Windows functions under the covers then this episode is for you. Windows Sysinternals has been the goto starting set of administra...