If you own an Oculus VR headset chances are it's a useless paperweight right now. The vendor failed to update a simple certificate which is required for the headset to function. This episode goes into the study of certificate management and the downsid...
Lake Street El
When you identity is stolen one of two things will happen. The thief will use your information or they will sell it. The Dark Web is the place where the nefarious actions take place but do you know how much you digital life is actually worth? This epi...
This week's tools, tips and tricks goes over a fantastic collection of IT Administration and Security tools, Spiceworks. Spiceworks is a full free suite of tools that covers everything from a full funcitonal IT discovery and Inventory management system...
This shouldn't be a shock but email stinks. It's one of the biggest security threats to your company. You may have filters on the messages but you have thousands of untrained people bringing in potential threats to the company. This episode goes into e...
In the security world things happen, we call these incidents. Big and small all incidents need to be investigated, mitigated and worked to prevent them. That's where a CSIRT comes into the mix. Computer Security Incident Response Teams sole responsibil...
If you are IT or near the security world you probably have heard the term SOC (pronounced SOCK). SOC stands for Security Operations Center. What is a SOC and how does it differ from your security team? This episode goes into what a SOC is for, responsi...
We heard the word breach all the time in the news, stories and reports. What is a breach? The answer is not as simple as you think, especially in the Healthcare world. This episode goes into the definitions and explains what a breach is for healthcare....
Troy Hunt, creator of Have I Been Pwned, added a new feature to the website called Pwned Passwords. This is a collection of over 500 million passwords that were collected from all the breaches. The reason this was created is that NIST has suggested a c...
Hackers want to remain undetected. The longer they slip under your radar the longer they can steal your data. This episode goes into a few ways you can identify signs that you have something malicious running on your machine that is going undetected by...
Is it time to create a National Cybersecurity Safety Board similar to the NTSB? This episode goes into the idea of this for post-breach investigations and recommendations after the fact. Be aware, be safe. ------------------------------------ Websit...
Bitcoin or cryptocurrency mining is becoming the new thing websites and hackers are doing. Legitimate websites could be using your PC computing power to mine for bitcoin and you won't know it. This episode goes into the details on how to prevent your P...
Google has a security research team called Project Zero that looks for security vulnerabilities in pretty much anything. There is an agreed rule that ethical security researchers notify vendors of any vulnerabilities found and allow the vendor 90 days ...
We all use of have used Google search at some point in our digital lives. I would be that most don't know how powerful it truly is. The Google Hacking Database website does two things - It teaches you about how to do deep searches and opens your eyes t...
There are threats everywhere looking to disrupt and try to break your security plans and projects. Most teams forget to look at themselves and realize that their own actions and inactions can do just as much damage to their security plans as something ...
I am 100% pro-VPN for personal use. It protects you, your privacy, keeps your Internet use away from prying eyes. Facebook is getting on board and not offering a VPN for iOS users. DO NOT USE IT! PERIOD! RUN AWAY!!! This episode goes into why you shoul...
Google is slowly moving toward a complete secure web. Starting in June Chrome will begin to label all HTTP only websites as Not Secure. This episode goes into the details, what the difference is between HTTP and HTTPS and why this is a good move for ev...
Malware is the big buzzword lately. Even though you may have endpoint protection and run scans malware can still sneak onto your computer and cause problems or steal your information. This episode goes over some signs and things to look out for that ma...
If you work with Windows from an administrative position, have Windows on your PC at home or want to learn more about how Windows functions under the covers then this episode is for you. Windows Sysinternals has been the goto starting set of administra...