The Cyber Savvy Cafe
Ssn 2 Ep 15 Zero Trust Pt 3 Beyond the basic, foundational things you should already have in place, what’s the next thing you need to do to implement a Zero Trust approach to network security? 1:04: It starts with the regulatory requirements a company must meet, then layer in policies and procedures. 3:07: Every time a user wants to access resources, they are going to need to prove their credentials. 3:16: NIST has developed a standard for Zero Trust, 800-207, which lays out what an enterprise needs to do to meet the zero trust model. 4:58: Access to individual...
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 14: Zero Trust, Pt 2 Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a layered approach to cybersecurity that structures your network so you can do just that. Today's episode looks at foundational elements you better already have in place. Show Notes: :37: The big business of hacking 1:13: Why and how cybercrime has accelerated since the pandemic 1:42: Some of the reasons home workstations are vulnerable to cyber attacks ...
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 12: Zero Trust Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a way of structuring your network so you can do just that. Show Notes: :42: An overview of Zero Trust 1:25: What is Zero Trust Network Architecture? 2:15: Make sure you know who is accessing your data and how and when 2:42: What is the normal way companies have their network structured? A look at flat networks 3:13: Bare minimum—segment your network ...
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 12
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 11: Popular Techy Gadgets for Gift-Giving 2021
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 10: Navigating the Holidays, Cyber-Safely
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 9: Guess Who’s Accountable
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 8: Work From Anywhere
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 7: Will AI Replace Us?
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 6: Don’t Die on Me Now! You know the signs. The signs that your computer or mobile device is not going to last much longer--but you’re not ready to invest in a replacement. You may be able to get a little more life out of your aging devices and buy yourself some time! Show Notes :30: How can we get a little more life out of our devices? :53: Hard reset: Resetting your phone to factory settings. 1:21: Make sure you run backups of all your important data first. 2:26: Clearing your storage and freeing up space. Make sure you delete the cache for your photo...
info_outlineAcceptable Use Policies: The Whys, Whats, and Whatnots
Why it’s important to have an AUP in place, how it protects you, and how to make one.
Ssn 1 Ep 10
The Problems It Solves
Acceptable Use Policy: The Whys, Whats, and Whatnots
Why it’s important to have an AUP in place, how it protects you, and how to make one.
SHOW NOTES:
An Acceptable Use Policy (AUP) defines how your employees are to use the corporate network and associated technology; what they can and can’t do.
00:28 Why is it important to have an AUP in place?
01:19 What can potentially happen if you don’t have one?
02: 04 What’s in an AUP?
03:45 What kind of policies do you recommend?
06:12 What fallout have you seen that came from not having an AUP in place?
07:50 How Do You Make One?
- Sample AUPs are available on the internet to use as a starting point.
- Ask others in your industry what they use, where they got it, or how they designed it.
- Hire a professional to assist; look for an experienced MSP who includes AUPs in their services
08:32 Any other problems an AUP solves?
09:52 Where do you post an AUP so it’s accessible to your employees?
10:59 How imperative is it to make one now and not put it off?
Additional Notes:
General Sections in an AUP Can Include:
- An overall purpose statement: an overview of the reason for the AUP and key takeaways.
- Definitions: Make sure any confusing terms are clearly defined, and explain any lingo that may be unique to your industry or your company.
- Scope: To whom and to what situations does the policy apply?
- Policies: This covers use, access, behavior, and general company policies for each section.
- Passwords, sharing of passwords, acceptable use of network, authorized use of voice mailbox, premises, personal devices while at work, etc.
- Personal Use: Are employees allowed to use the network or devices for any personal use; if so, how and when
- Enforcement: What happens if a policy is violated. Be very clear about the steps that are to be taken, including sanctions or termination of employment.
Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @https://EastAtlanticSecurity.com/
Voiceover Artist: Paul Kadach at www.voices.com