loader from loading.io

Ssn 1 Ep 15: The New Kid in Town, Part 2

The Cyber Savvy Cafe

Release Date: 04/28/2021

Ssn 2 Ep 15 Zero Trust, Pt 3 show art Ssn 2 Ep 15 Zero Trust, Pt 3

The Cyber Savvy Cafe

Ssn 2 Ep 15 Zero Trust Pt 3 Beyond the basic, foundational things you should already have in place, what’s the next thing you need to do to implement a Zero Trust approach to network security?   1:04: It starts with the regulatory requirements a company must meet, then layer in policies and procedures.   3:07: Every time a user wants to access resources, they are going to need to prove their credentials.   3:16: NIST has developed a standard for Zero Trust, 800-207, which lays out what an enterprise needs to do to meet the zero trust model.   4:58: Access to individual...

info_outline
Ssn 2 Ep 14: Zero Trust, Pt 2 show art Ssn 2 Ep 14: Zero Trust, Pt 2

The Cyber Savvy Cafe

Ssn 2 Ep 14: Zero Trust, Pt 2 Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a layered approach to cybersecurity that structures your network so you can do just that.   Today's episode looks at foundational elements you better already have in place.   Show Notes:   :37: The big business of hacking   1:13: Why and how cybercrime has accelerated since the pandemic   1:42: Some of the reasons home workstations are vulnerable to cyber attacks  ...

info_outline
Ssn 2 Ep 13 Zero Trust Pt. 1 show art Ssn 2 Ep 13 Zero Trust Pt. 1

The Cyber Savvy Cafe

Ssn 2 Ep 12: Zero Trust Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a way of structuring your network so you can do just that.     Show Notes: :42: An overview of Zero Trust   1:25: What is Zero Trust Network Architecture?   2:15: Make sure you know who is accessing your data and how and when   2:42: What is the normal way companies have their network structured? A look at flat networks   3:13: Bare minimum—segment your network  ...

info_outline
Ssn 2 Ep 12 What's Up With the Chip Shortage? show art Ssn 2 Ep 12 What's Up With the Chip Shortage?

The Cyber Savvy Cafe

Ssn 2 Ep 12

info_outline
Ssn 2 Ep 11 Popular Techy Gadgets for Gift-Giving 2021 show art Ssn 2 Ep 11 Popular Techy Gadgets for Gift-Giving 2021

The Cyber Savvy Cafe

Ssn 2 Ep 11: Popular Techy Gadgets for Gift-Giving 2021

info_outline
Ssn 2 Ep 10 Navigating the Holidays, Cyber-Safely show art Ssn 2 Ep 10 Navigating the Holidays, Cyber-Safely

The Cyber Savvy Cafe

Ssn 2 Ep 10: Navigating the Holidays, Cyber-Safely

info_outline
Ssn 2 Ep 9: Guess Who's Accountable show art Ssn 2 Ep 9: Guess Who's Accountable

The Cyber Savvy Cafe

Ssn 2 Ep 9: Guess Who’s Accountable

info_outline
Ssn 2 Ep 8 Work From Anywhere show art Ssn 2 Ep 8 Work From Anywhere

The Cyber Savvy Cafe

Ssn 2 Ep 8: Work From Anywhere

info_outline
Ssn 2 Ep 7: Will AI Replace Us? show art Ssn 2 Ep 7: Will AI Replace Us?

The Cyber Savvy Cafe

Ssn 2 Ep 7: Will AI Replace Us?

info_outline
Ssn 2 Ep 6: Don't Die On Me Now show art Ssn 2 Ep 6: Don't Die On Me Now

The Cyber Savvy Cafe

Ssn 2 Ep 6: Don’t Die on Me Now! You know the signs. The signs that your computer or mobile device is not going to last much longer--but you’re not ready to invest in a replacement. You may be able to get a little more life out of your aging devices and buy yourself some time!   Show Notes :30: How can we get a little more life out of our devices?   :53: Hard reset: Resetting your phone to factory settings.   1:21: Make sure you run backups of all your important data first.   2:26: Clearing your storage and freeing up space. Make sure you delete the cache for your photo...

info_outline
 
More Episodes

Some of the signs your internal IT department is overworked, the fallout you could face, and how co-managed IT can support your team in a cost-effective way.

 

Strategies for Cutting Costs Series

 Ssn 1 Ep 15

The New Kid in Town, Part 2

Some of the signs your internal IT department may be overworked, and how co-managed IT can assist.

 

SHOW NOTES

Today’s episode continues on with the discussion about a new approach to IT support, co-managed IT.

 

00:50: Some of the signs that your IT department is overwhelmed

 

2:32: Multiple locations, remote working, and the effects on an IT team

 

4:15: Financial and security fallout from an over-stretched IT team

 

5:50: Missed patches and falling behind on routine maintenance, and the extensive damage and downtime that can cost a company.

 

6:15: The average amount of time a threat actor is living on your network before you find out they’re there, and what they’re doing during that time.

 

6:58: How much does your cyber-insurance protect you? How much do they pay out if you suffer a breach?

 

8:40: Reputational damage if you suffer a breach, and other effects on your company.

 

9:15: Lawsuit of a company in the UK that sued an American company

 

9:38: Are government fines, fees, and lawsuits covered by your insurance company if you weren’t at fault in a breach?

 

10:35: Average cost of a data breach

 

11:03: The HIPAA Wall of Shame

 

12:10: The goal is to make your network so difficult to break into, that a threat actor will give up and go somewhere else.

 

12:56: Further fallout: Supply Chain Attack, what is it and how can if affect you?

 

13:55: The new compliance, CMMC, what it is and how it protects the supply chain and what it means for smaller companies

 

14:55: When is co-managed IT NOT a good solution for a company?

 

 

At the end of the Strategies for Cuttings Costs series, we’ll be putting all the highlights together into a mini eBook that you can download. We’ll make it available in the show notes for each of the episodes in the series, so check back on that!

 

Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

 

Voiceover Artist: Paul Kadach at www.voices.com

 

 

You’ll find the downloadable version of these show notes at: https://EastAtlanticSecurity.com/Cyber-Savvy-Cafe