Encryption 101: 4 Useful Concepts You Need to Know [Podcast]
4 Basic Concepts. 15 minutes. That’s it. That's all the time you need to understand how encryption works in the modern ecosystem. It's an important tool for protecting data, it's required by countless laws, regulations, rules, and contracts. But do you really know how...
What is Zero Trust Cybersecurity and How Much Does it Cost? [Podcast]
Zero Trust is one of the most popular phrases thrown about by cybersecurity professionals and - more importantly - thrown into cybersecurity sales pitches these days. It's obviously important, and it's obviously something you want. But what is it? Is it really...
Why Cyber Resilience is the Best Metric for Cybersecurity [Podcast]
There are a lot of ways to measure the impact - and relative success - of a cybersecurity program. There are tests you can run to determine how effectively your employees are adopting defenses to phishing emails. There are table-top exercises to determine your ability...
What is a DDoS Cyberattack? [Podcast]
The best way to make sure that you and your business are protected from cyberattacks is to employ a broad-focus cybersecurity strategy. In order to do so, you need to have a basic understanding of the threats your business faces from cybercriminals, hacktivists, and...
How Implementing Least Privilege will Protect Your Business [Podcast]
The more access users have to your company's data, the more vulnerable that data is in the event of a data breach. A malicious actor gaining access to one of your employee's credentials gives them access to everything that employee is allowed to see. That's why you...
8 Lessons from the Uber Hack [Podcast]
So, right from the start, let's clarify - this is about the Uber hack that occurred (or was discovered/publicized) in September of 2022. In fact, it was a rather unique breach of an oft-breached company. The hacker who breached Uber appears to have used very basic...
Automated Vulnerability Scanning – Do You Know Your Weaknesses? [Podcast]
One of the big shifts in cybercrime, and the cyber criminals behind it, over the past 20 years has been from manual to automated processes. Where cyberattacks used to require hands on a keyboard and took a considerable amount of time to execute and complete, today's...
Disaster Recovery Plan – Is Your Business Prepared? [Podcast]
Disasters happen. They can occur without notice, or they can have been predicted for months. They can last for seconds, like an earthquake, or they can linger for years, like a pandemic. They have the capacity to bring your entire business to a halt. When a disaster...
Do You Need an Endpoint Detection System? [Podcast]
For a long time, the metaphor most applicable to cybersecurity systems was that of a castle. You have walls and a moat to keep people out, and a secured gate that allows you to provide access to those people you give permission to enter. However, just as the belief...
Ransomware 101: How Ransomware Works [Podcast]
Being able to defend against Ransomware attacks requires an understanding of how ransomware works. By the time you see that ransomware note on your computer screen, and your key business systems have been locked, quite a lot has already happened. In this episode of...