Press "Enter" to skip to content

Lake Street El

Episode 68 – The Top Ransomware Protection Tips

Ransomware is a nasty piece of malware that can destroy all your data. There are a few things you can do that will greatly reduce the risk of you and your company getting infected by a ransomware attack. This episode goes through them.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

 

Episode 67 – Passing A Compliance Audit Doesn’t Mean You’re Secure

Compliance audits are checkbox reviews of itemized lists of things you should be doing. If you pass a compliance audit, so what? Compliant to a list doesn't mean you are any more secure nor does it mean you can stop. Compliance audits are only checking the bare minimum requirements. This episode goes into more detail on why.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

 

Episode 66 – CIS 15 Wireless Access Control

Continuing the Critical Security Control Top 20 we are at number fifteen. This one covers Wireless Access Control. Unlike your physical network, wireless access opens the vectors of access and attacks. There are controls you need to do above and beyond the LAN. This episode goes over that control.

Be aware, be safe. 

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

 

Episode 65 – IoT Strikes Again, Now It’s Life And Death

The Internet of Things strikes again. The security risks in the growing number of internet connected devices have reached a level where it's now life or death. Medical devices are now in the target of the criminals. How can manufacturers handle this? What are the risks to the patients? This episode talks about the new threat.

Be aware, be safe. 

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 64 – Why You Should Use A Personal Password Vault

Passwords are the weakest link in your security. Especially if you try to manage them yourself. All the sites you access your passwords are less than optimal. Reusing passwords, weak passwords, easy to socially engineer them all can put your personal data at risk. This episode goes into why you should consider and use a password vault to manage all your digital accounts.

Be aware, be safe. 

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 63 – CIS 14 Need To Know

Next in the CSC CIS Top 20 is control fourteen. This is about Controlling Access Based On Need To Know. We all have seen a TV show or movie that has the saying 'That is on a need to know basis.' This control is exactly that. This episode goes into the details and what you need to look for in your business.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 62 – Another Celebrity Hacked, It Can Be Prevented

Another day, another celebrity social media account was hacked. This time it was Selina Gomez's Instagram account. Either they don't know or don't care but these celebrities can prevent this from happening. You can to. This episode tells you how.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 61 – CIS 13 Data Protection

Continuing the CIS CSC Top 20 series we reach control thirteen. This control talks about Data Protection. In this episode the control details are broken down and offer some tips on what you can do to start to address this. 

You can read more about this control on BinaryBlogger.com - https://binaryblogger.com/2017/01/12/breaking-critical-security-controls-csc-13-data-protection/

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 60 – Security & Privacy, With A Creepy Story

Security and privacy are two different things. One is about protection and the other about use. How does it apply to your data and where you share it? This episode goes into the differences and ends with a creepy story that blurs the line between security, privacy and how businesses and social media sites are using your data.

Be aware, be safe.

 

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 59 – CIS 12 Boundary Defense

The next control in the Top 20 Critical Security Control series is number 12, Boundary Defense. Your perimeter is your wall. All data flows in and out of that and you need to be able to monitor, alert and react to it. Boundary Defense is like the walls of a castle, they aren't very useful if they are not built properly or maintained. This episode goes into the details.

Be aware, be safe.

 

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 58 – Include Security In Your Business Strategic Planning

Security teams are most often looked to after the fact. CISOs and security leaders need to be closer, if not involved, with the strategic planning for the business. If the security teams do not know how the business works or the direction it's going then it makes their jobs more difficult to build a security program for the business. 

Be aware, be safe.

 

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 57 – CIS 11 Network Device Configurations

The next control in the Top 20 Critical Security Controls is number 11, Network Device Configurations. Much like your workstations and servers you need to maintain and control configurations for the components that drive your network. This episode goes into the details.

Be aware, be safe.

 

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 56 – Security Tips From The Celebrity Nude Leaks

Celebrities are high targets for hackers. Finances, reputation, and data that will always be popular are the reasons. In the recent celebrity hacking situation another series of highly personal photographs were leaked. 

We can look at situations like this and learn from them to help us and others not be a victim. This episode goes through the simple steps that would have prevented this from happening.

Be aware, be safe.

 

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 55 – You Should Inventory Your Home Devices

As the internet connected devices grow in our homes it is becoming more important to keep track of them. This episode goes into the need of keeping an inventory of all your home devices and why.

The partner episode that ties into this is episode 30 that goes over the importance of checking your homeWi-Fi regularly. 

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 54 – CIS 10 Data Recovery

Continuing the CIS Top 20 series we have reached the half way point with number 10. Data recovery. Your business may have backups but CIS 10 goes into the necessity of testing and proving your recovery from those backups work. This episode goes into the details and why testing your recovery processes is so important.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

Episode 53 – Don’t Neglect Your Company’s Physical Security

Information security is more than than the technology components. The physical security around the technology is just as important. This episode goes into the importance of physical security and why most need could make it a little stronger.

Be aware, be safe. 

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 52 – Why Phishing Is Still Successful

Phishing is still a primary tool for criminals to use to spread malware, ransomware and steal identities. Why? How can this still be a successful method when everyone has heard of it? This episode goes into some of the reasons why this is still successful. 

Be aware, be safe.

 

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com

 

Episode 51 – How To Avoid Facebook Scams

Facebook is part of most people's lives and that makes it a prime target for scammers. There are several ways scammers try to rip you off. This episode covers the popular ways and offers tips on how to not fall for them.

Be aware, be safe.

------------------------------------

Website - https://www.binaryblogger.com

Twitter - https://www.twitter.com/binaryblogger

iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2

Podcast RSS - http://securityinfive.libsyn.com/rss

YouTube - https://www.youtube.com/binaryblogger

TuneIn Radio - Security In Five Channel

Email - contactme@binaryblogger.com