Email Security
Humans are the weakest link when it comes to cyber security and criminals are preying on this through email. Learn more about email threats and best practice tips to mitigate these risks in this episode of The CyberGuide.
Humans are the weakest link when it comes to cyber security and criminals are preying on this through email. Learn more about email threats and best practice tips to mitigate these risks in this episode of The CyberGuide.
The WannaCry Ransomware attack that began May 12, 2017 is one of the largest ransomware attacks in history. This attack used a computer worm, borrowed from leaked NSA exploits, to target Microsoft Windows operating systems at an unprecedented scale. To date, over 300,000 machines in 150 countries have been affected. This podcast offers an in-depth analysis of the attack and best practice tips to prevent ransomware from affecting your organization.
President Trump recently signed legislation that blocked the implementation of the Federal Communications Commission’s Online Privacy Rule that was to take effect at the end of this year. This rule was intended to prevent Internet Service Providers (ISPs) from capturing and selling user data. Learn best practice tips to secure your sensitive information from ISPs on this episode of The CyberGuide.
This episode of The CyberGuide discusses the CIA Vault 7 Release on WikiLeaks. This exposed the CIA’s ability to manipulate and exploit software without consumer knowledge. For example, the documents introduced a new series of threat actors of which demonstrate the CIA’s capability to hack smart TVs and smartphones. Tune in for more information about the wide range of effects this leak has.
This episode of The CyberGuide reviews the landscape of cyber security in 2016 and offers predictions for 2017. Organizations are in the early stages of understanding the importance of cyber security and investing in it. However, threats, including ransomware and spear phishing, are becoming more sophisticated. These facts make way for an interesting future in an ever-changing technological world.
The Internet of Things (IoT) is the interconnectedness of devices that have an IP address, that are embedded in everyday objects, and have the ability to send and receive data. Examples of IoT devices include mobile devices, fitness trackers, and smart speakers, among many others. These devices have endless potential but users must be aware of the security implications of using them. Learn more during this episode of The CyberGuide.
It is impossible to protect your organization from a threat you don’t know exists. As a result, it is imperative your organization goes through the threat identification and analysis process at least once a year. This episode of The CyberGuide explains this procedure and how it is applicable and it begins by broadly examining potential threat sources. Then it discusses how organizations must determine the most relevant and unique threats to their organization and act on them. Listen to learn mor...
It is difficult for organizations to make informed decisions on cyber security risk management without understanding the unique threats they may face. As a result, the 5 Steps to Develop a Security Program helps businesses determine where their vulnerabilities exist and offer suggestions on remediation. To allocate your resources effectively, it is important to assess your organization before investing in new technology. Companies that are methodical in their defense strategy are much more succe...
Regardless of an organization’s size and industry, the Top 10 Most Common Findings in Security Assessments are applicable and help organizations understand their unique cyber security threats. The commonalities in these assessments allow organizations to better allocate their resources. The top 10 findings are broken out across the Three Pillars of Cyber Security: People, Policies, and Technology. It is crucial that your organization understands the impact that cyber security threats can have. Y...
Negligent and malicious insiders are major threats to organizations as they are responsible for a large percentage of data breaches. Insiders pose a unique threat to your organization because they know your network the best and typically have access that an outsider does not. Businesses must find a balance between security and functionality because insiders must be able to do their job however, they also have the ability to circumvent security controls and policies. You can discover the differen...
Cyber security is a foreign language to most executives. This episode offers suggestions when speaking with executives about cyber security and enterprise risk management in your organization. Cyber security is a broad topic that addresses a range of topics from risk management to regulatory compliance. Executives need to think of cyber security as a business risk, not just an IT issue, to best protect their organization.