Shut The Backdoor
“Good security habits should reduce stress, not add to it.” Notable Moments [0:00–2:17] Holiday phishing scams and why “too good to be true” usually is [2:33–3:53] AI voice cloning and the rise of deepfake phone scams [4:06–5:20] Personal vs. work data and accidental cloud uploads [5:35–7:05] Shoulder surfing risks and protecting your screen in public [7:23–9:26] Public Wi-Fi safety, fake networks and VPN realities [9:44–10:52] Password managers and eliminating risky password habits [11:12–12:34] Passphrases, XKCD wisdom and stronger password strategy [12:52–13:25]...
info_outlineShut The Backdoor
“Third parties are a common entry point for cyber attacks. This is something you really want to make sure you have under control.” Notable Moments [00:01:15] Third-party due diligence and security reviews. [00:03:25] How regulatory requirements like HIPAA, PCI DSS, GDPR shape due diligence. [00:05:28] Ongoing monitoring and review expectations. [00:06:19] Physical access risks: background checks for on-site vendor personnel. [00:07:44] Company’s responsibility to vet vendors, especially as AI evolves. [00:09:42] What documentation to request and how to evaluate red flags. [00:12:27]...
info_outlineShut The Backdoor
“Cybersecurity is a shared responsibility. One organization’s defense can strengthen an entire community.” Notable Moments 00:01:00 – What an ISAC is and how it began 00:02:40 – How Health ISAC has grown globally 00:04:44 – Top threats facing healthcare today 00:09:25 – AI’s role in both defense and attacks 00:13:45 – Impact of the Cybersecurity Information Sharing Act 00:18:03 – Why information sharing builds community trust 00:19:28 – Government collaboration challenges 00:23:49 – Final proactive cybersecurity advice Errol Weiss, Chief Security Officer of Health...
info_outlineShut The Backdoor
“We’re not trying to avoid AI because of the scary security issues; we’re trying to deploy it securely so we can unlock its true potential.” Notable Moments 01:09 – Rene Brandel on why he began hacking Y Combinator AI agents to find security gaps. 02:30 – How quickly AI systems can be breached without strong security oversight. 03:51 – The risk of cross-user data access and violating HIPAA’s minimum necessary standard. 07:05 – Understanding permissions creep and why AI agents should be treated like individual users. 10:23 – How malicious actors can use code execution...
info_outlineShut The Backdoor
“There aren’t that many things that really are impossible. We just have to set aside boundaries and figure out how to make them real.” Episode Highlights [02:53] Bob on managing creativity and building environments where big ideas thrive [05:27] Disney embedding safety and security into their culture [10:20] Brainstorming approach for tackling “impossible” challenges [17:03] Balancing creativity and connection in remote work [28:25] Cross-disciplinary collaboration sparking new ideas [31:09] Tackling massive projects with limited resources [46:48] Internal marketing to gain buy-in...
info_outlineShut The Backdoor
"If we can scale AI for better use, it can make the world a better place rather than just your daily personal life." Notable Moments: [01:27] Marina explains her AI project with indigenous communities in New Zealand [03:26] Researching AI responses in abortion counseling [07:43] Ten weeks in Namibia studying environmental science and conservation [10:46] Using machine learning to study tree pod dynamics and herbivore consumption [12:24] Expanding AI research into plant growth and climate variability [13:25] Marina’s perspective on scaling AI to make the world better In this bonus episode,...
info_outlineShut The Backdoor
"DEF CON is one of those places where you walk in expecting to learn one thing and walk out realizing the possibilities are far greater than you imagined." Notable Moments [02:24] – Trevor explains what DEF CON is and why it’s unique. [04:36] – The rise of inclusivity and community groups like WISP and Diana Initiative. [06:55] – Villages and Capture the Flag competitions explained. [09:22] – A boat inside the Maritime Hacking Village surprises attendees. [10:32] – The AI Cyber Challenge: DARPA and ARPA-H host a $4M competition. [15:23] – Kubernetes workshops bring practical,...
info_outlineShut The Backdoor
"Hospitals don’t just store data. They safeguard stories, care plans, and lives. When ransomware hits, it’s not just a system crash, it’s a trust collapse." Notable Moments 00:01:10 – What ransomware is and how it's evolved 00:04:15 – How the Colonial Pipeline and Vegas attacks sparked Jeffrey’s interest 00:07:10 – Why healthcare is a prime target 00:10:00 – How Jeffrey built a ransomware database of 800+ healthcare entities 00:16:00 – Rise of ransomware-as-a-service (RaaS) and competition between threat actors 00:20:20 – Most targeted entities: hospitals, clinics,...
info_outlineShut The Backdoor
"Security isn’t proprietary. Sharing what works makes us all safer." Notable Moments 01:29 – Rise in ransomware and the case for collaboration 03:41 – Why reinvention puts you at risk 05:12 – The danger of building relationships mid-crisis 08:10 – Balancing information sharing and confidentiality 09:26 – How groups like HISAC facilitate secure collaboration 12:24 – Learning from incidents you haven’t experienced 18:06 – Building networks at all levels, not just CISOs 21:46 – Advice for making the first outreach 23:31 – Using your current network to grow your reach With...
info_outlineShut The Backdoor
“We have to make sure AI doesn’t just automate what we've always done. It should elevate what’s possible.” Notable Moments 00:40 – What’s pushing us to talk about AI now? 04:22 – A call for AI mission statements 08:18 – When tools lead before people: the risk of reactive adoption 11:05 – Defining AI boundaries: what it should never replace 15:33 – ChatGPT, Canva, Magic School: the tools already in use 18:42 – The importance of transparency and human oversight 22:55 – Reframing AI as “instructional support,” not just automation AI isn’t something on the horizon....
info_outline"DLP is not just a tool that we have. It's also the ongoing education that we have for our employees to further minimize the occurrences of data mismanagement."
Having strong Data Loss Protection (DLP) systems stops bad actors while also protecting employees from making accidental mistakes too. Every day, we put trust in the secure flow of health data. However, no matter what safeguards are in place, human error is one of the most common causes of data loss in companies. Security engineer, Zak Cowan, joins to share why data loss protection, or data leak protection, is paramount for a company like Redox.
The everyday person may think about DLP as a way of securing photos and contacts. However, there is a lot more data that comes in and out of a corporate system. To those companies, data loss protection, or DLP, covers critical information such as social security numbers, bank account numbers, and particularly for a company in our space, health information. DLP protects companies from this sensitive information making its way out of their secure ecosystem and into potentially harmful hands.
DLP is much more than stopping cybercriminals; it’s about creating guardrails for our whole team, preventing unintentional mistakes that can expose sensitive info, especially as so many of us work remotely or on the go.
It’s not just the big bad outsiders we have to watch for. The majority of data leaks happen because of honest errors by well-meaning team members. That’s where DLP tools shine. By monitoring endpoints and cloud apps, we add invisible safety nets without grinding productivity to a halt. Education is equally critical. The best DLP solution works hand-in-hand with ongoing security training, offering helpful nudges right when someone needs them.
As technology races ahead, especially with the rise of AI, our strategies can’t remain static. Zak urges us to stay curious and agile, integrating DLP solutions that evolve as new threats, tools, and workflows emerge. AI brings both risk and opportunity, so our policies and education need to keep pace, making sure every Redoxer knows what’s ok (and what’s not) when it comes to handling data.
Protecting sensitive information is like having a dedication to locking the digital doors while also making sure we haven’t accidentally left a window open. At Redox, keeping health data secure is a team sport. By blending the right tools, targeted education, and a healthy dose of vigilance, we’re collectively shutting the back door one proactive step at a time.
00:52 Corporate Data Loss Protection
03:24 Remote Work DLP Challenges
07:18 Security Education Needs Technical Support
11:12 Alert System Enhances User Awareness
14:35 AI's Impact on Data Security
17:31 Unexpected Innovations Challenge Policy Adaptation
Resources
Have feedback or a topic suggestion? Submit it using this linked form.
https://redoxengine.com/
Matt Mock mmock@redoxengine.com