The Cyber Savvy Cafe
Ssn 2 Ep 15 Zero Trust Pt 3 Beyond the basic, foundational things you should already have in place, what’s the next thing you need to do to implement a Zero Trust approach to network security? 1:04: It starts with the regulatory requirements a company must meet, then layer in policies and procedures. 3:07: Every time a user wants to access resources, they are going to need to prove their credentials. 3:16: NIST has developed a standard for Zero Trust, 800-207, which lays out what an enterprise needs to do to meet the zero trust model. 4:58: Access to individual...
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 14: Zero Trust, Pt 2 Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a layered approach to cybersecurity that structures your network so you can do just that. Today's episode looks at foundational elements you better already have in place. Show Notes: :37: The big business of hacking 1:13: Why and how cybercrime has accelerated since the pandemic 1:42: Some of the reasons home workstations are vulnerable to cyber attacks ...
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 12: Zero Trust Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a way of structuring your network so you can do just that. Show Notes: :42: An overview of Zero Trust 1:25: What is Zero Trust Network Architecture? 2:15: Make sure you know who is accessing your data and how and when 2:42: What is the normal way companies have their network structured? A look at flat networks 3:13: Bare minimum—segment your network ...
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 12
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 11: Popular Techy Gadgets for Gift-Giving 2021
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 10: Navigating the Holidays, Cyber-Safely
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 9: Guess Who’s Accountable
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 8: Work From Anywhere
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 7: Will AI Replace Us?
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 6: Don’t Die on Me Now! You know the signs. The signs that your computer or mobile device is not going to last much longer--but you’re not ready to invest in a replacement. You may be able to get a little more life out of your aging devices and buy yourself some time! Show Notes :30: How can we get a little more life out of our devices? :53: Hard reset: Resetting your phone to factory settings. 1:21: Make sure you run backups of all your important data first. 2:26: Clearing your storage and freeing up space. Make sure you delete the cache for your photo...
info_outlineSsn 1 Ep 19
The Easiest Way to Get Hacked
How social engineering puts you at risk for one of the easiest ways to breach your network.
SHOW NOTES
:15: An example of how a hacker uses social engineering to trick the help desk into helping them breach a corporate network.
1:20: One of the easiest ways to gain access to a corporate executive’s email password.
2:30: The social dynamics that make people more susceptible to falling prey to this kind of trick.
3:03: What a hacker does after they gain access to the executive’s email password.
4:15: How multifactor authentication can protect you.
6:20: How an executive might get targeted to begin with.
7:15: What kind of protocols need to be established for the help desk to authenticate personnel when they call in.
8:23: Other ways of getting hacked, most common phishing attacks.
8:40: Installing malware through phishing attacks and what happens afterwards.
10:05: Other type of common phishing email, bogus alert for a problem with your account at a financial institution.
12:05: How creating a sense of urgency in a phishing email can make you more prone to click their link.
12:27: Phony pages that are created to look exactly like your PayPal or bank page.
12:50: Substituting characters or misspellings in a legitimate URL to make a bogus page look legit.
13:35: When a hacker targets a company, they’re typically after your Office365 or G Suite credentials, and what they do with those credentials afterwards.
14:30: Chase Cunningham and ethical hackings, and how social engineering increases his chances of hacking into a company to 100%.
15:47: Why human nature makes us prone to falling victim to cyber breaches.
16:30: How one hacker’s attempts were foiled by sitting at the wrong desk and how a nosy co-worker saved her company from a breach.
17:49: A situation that happened at a Black Hat conference in Las Vegas and how a reporter locked an inquirer out of their phone account as a demonstration.
If you’d like to hear us cover a topic you’re interested in, contact us! Leave a message on our website, or on our podcast page at Spotify, iTunes, or Google Podcasts.
Cybersecurity Stats:
- https://www.comparitech.com/vpn/cybersecurity-cyber-crime-statistics-facts-trends/
- https://cybersecurityventures.com/cybersecurity-almanac-2019/
- https://www.varonis.com/blog/cybersecurity-statistics/
- https://techjury.net/blog/cyber-security-statistics/
Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/
Voiceover Artist: Paul Kadach at www.voices.com
You’ll find the downloadable version of these show notes at: https://eastatlanticsecurity.com/cyber-savvy-cafe/