Can a piece of dust on your touchscreen compromise your data? The answer is yes. We learn how from No Password Required Podcast guest Roger A. Grimes, KnowBe4’s data-driven defense evangelist, whose mission is to educate others about cybersecurity issues that can compromise computers. He shares two of the largest threats of cyberattacks impacting companies: social engineering and unpatched software. His simple advice for avoiding 99% of cyber risks: “Patch your stuff and don’t get tricked into doing something you shouldn’t; you do those two things and you will not get hacked.”
Roger is a prolific author, blogger and speaker. He shares his 30+ years of penetration testing/ethical hacking expertise with companies and tech professionals to improve their security and defend their network. In this interview, he talks about man-in-the-middle attacks and other social engineering scams that open doors for data breaches. He examines the lack of improvement in technical controls and the proliferation of adversaries and continuous daily malware attempts. Roger also discusses the future of computing with quantum supremacy on the horizon and the threat it poses to public key cryptography.
Topics in Order:
Who is Roger A. Grimes?
Hacking Isn’t That Hard
Is Misinformation Part of the Cybersecurity Problem
Anti-Virus and Firewalls Don’t Work - Close Your Computer Exploits by Patching Software
10 Ways I Can Hack You
Recognizing Red Flags of Social Engineering
Why is Hacking Still Such a Problem
How to Hack Passwords & Multi-factor Authentication
The Truth Behind Password Lengths and Password Policies
How to Never Be Hacked
Is that Dust or Hair on Your Touchscreen? Nope, it’s an Embedded Scam
What are the Two Biggest Cybersecurity Risks?
Have You Heard of this Scam? Security Awareness Training and Social Engineering
Creating a Cyber Culture for Your Employees through Security Awareness Training
The End of Classic Computing
Will Quantum Computers Launch in 2019? The Sprint for Quantum Supremacy
A Better Future with Quantum Models
The Downside of Quantum Computers: Breaking the Public Key Cryptography
The Coming Quantum Break
Post-Quantum Encryption and Susceptibility
Has the Quantum Crypto Break Already Happened?
Is Quantum Supremacy a Big Deal or the Next Y2K?
What is Crypto-Agility and Will it Matter with Quantum Computing?
Is Society Becoming Tolerant of Hacking and Cybercrime? Why and What Do We Do About It?