Ssn 2 Ep 1: 3 Reasons Why Remote Workstations are the Target, Pt 1
Release Date: 08/26/2021
The Cyber Savvy Cafe
Ssn 2 Ep 15 Zero Trust Pt 3 Beyond the basic, foundational things you should already have in place, what’s the next thing you need to do to implement a Zero Trust approach to network security? 1:04: It starts with the regulatory requirements a company must meet, then layer in policies and procedures. 3:07: Every time a user wants to access resources, they are going to need to prove their credentials. 3:16: NIST has developed a standard for Zero Trust, 800-207, which lays out what an enterprise needs to do to meet the zero trust model. 4:58: Access to individual...
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 14: Zero Trust, Pt 2 Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a layered approach to cybersecurity that structures your network so you can do just that. Today's episode looks at foundational elements you better already have in place. Show Notes: :37: The big business of hacking 1:13: Why and how cybercrime has accelerated since the pandemic 1:42: Some of the reasons home workstations are vulnerable to cyber attacks ...
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 12: Zero Trust Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a way of structuring your network so you can do just that. Show Notes: :42: An overview of Zero Trust 1:25: What is Zero Trust Network Architecture? 2:15: Make sure you know who is accessing your data and how and when 2:42: What is the normal way companies have their network structured? A look at flat networks 3:13: Bare minimum—segment your network ...
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 12
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 11: Popular Techy Gadgets for Gift-Giving 2021
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 10: Navigating the Holidays, Cyber-Safely
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 9: Guess Who’s Accountable
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 8: Work From Anywhere
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 7: Will AI Replace Us?
info_outlineThe Cyber Savvy Cafe
Ssn 2 Ep 6: Don’t Die on Me Now! You know the signs. The signs that your computer or mobile device is not going to last much longer--but you’re not ready to invest in a replacement. You may be able to get a little more life out of your aging devices and buy yourself some time! Show Notes :30: How can we get a little more life out of our devices? :53: Hard reset: Resetting your phone to factory settings. 1:21: Make sure you run backups of all your important data first. 2:26: Clearing your storage and freeing up space. Make sure you delete the cache for your photo...
info_outlineSsn 2 Ep 1:
Top 3 Issues that Make Remote Workstations a Juicy Target and How to Solve Them, Pt 1
Remote working has been on the rise in recent years and exploded in 2020 during the pandemic. Find out why remote workstations are a popular target for hackers--and what you need to do to protect the corporate network from a breach through this mostly-unprotected back door.
SHOW NOTES:
:47: Let’s define what we mean by “remote working”.
1:18: We were working remotely for years before the pandemic, but remote working has changed since 2020.
2:36: We’re making an assumption that people are working on a company-provided equipment that’s managed by an IT dept.
3:43: Why do remote workstations put corporate networks at greater risk than a traditional office environment?
3:50: Discussion of article about a number of laptops that were unknowingly infected with malware, and what happened when those laptops went home during the pandemic.
4:43: What are the top 3 reasons why remote workstations are a hot target?
4:55: Number One, No corporate firewall.
6:23: Discussion of best practices—and inherent dangers—when setting up your router, setting the password, and hiding the SSID.
9:25: What do people need to do in order to know if their firewall is secure?
10:00: If you have employees working remotely, what do you need to do?
10:59: What if your employees are working remotely using public wi-fi?
Downloadable pdf from media.defense.gov, "Securing Wireless Devices in Public Settings":
https://media.defense.gov/2021/Jul/29/2002815141/-1/-1/0/CSI_SECURING_WIRELESS_DEVICES_IN_PUBLIC.PDF
12:34: VPNs and inherent challenges. What is an “always on” product?
14:18: Number Two: Segmentation; dividing your network into separate networks that don’t allow lateral movement, and what is lateral movement?
16:10: What happens if you’re not segmented and your VPN is activated?
17:20: Discussion of an article about hackers who targeted government employees through an active online aerobics presence.
18:45: How much effort and time are hackers willing to put into gaining access into your network?
19:00: Discussion of today’s hackers. Gone are the days of the solitary hacker working out of a basement.
20:20: Discussion of a guy that built a machine for reverse hacking and how he uses it.
End of Part 1. Catch Part 2 for the rest of the discussion!
Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/
Voiceover Artist: Paul Kadach at www.voices.com
You’ll find the downloadable version of these show notes at: https://EastAtlanticSecurity.com/cyber-savvy-cafe/