Security Strong Podcast
In this in-depth Security Awareness Training, host Jeremy Cherny explores how a security incident can occur, as well as how people can best protect their data to remain secure.
info_outline Get To Know Microsoft TeamsSecurity Strong Podcast
Host Jeremy Cherny discusses how to use Microsoft Teams as well as best practices. What is Microsoft Teams? If you haven't used it before, Microsoft Teams is a bit like texting or messenger on your phone in that it allows you to send messages to individuals, create group chats, and share files such as PDFs or photos. It’s much more than just that though. You can also create video chats for things such as one on ones, group chats, meetings, or video conferencing and because Teams can access apps such as SharePoint, Planner, and OneNote just to name a few, your team can work...
info_outline Get to know Microsoft PlannerSecurity Strong Podcast
Host Jeremy Cherny discusses best practices and how to use Microsoft Planner. What is Microsoft Planner? Microsoft Planner does not have a desktop component, it is strictly from the web. It's also from your apps on your phone and tablets. So right now, there is no desktop component. So you go to Office and sign in with your credentials. It's kind of like task management for teams. Some might call it light project management. There are a lot of different ways to look at it depending on how you're going to use it. We've started to use it here at Tobin Solutions for a few small projects. So we...
info_outline What to expect from the future of Internet security with Steve MoscarelliSecurity Strong Podcast
Host Jeremy Cherny interviews Steve Moscarelli, Regional Sales Manager at Thales Cloud Security “I knew that the internet was going to be the future when I was in college. I had roommates working at the New Media Lab at MIT and they were involved in building a precursor to the internet for DARPA. I also saw very clearly that the internet was built with no security at all - which really propelled me into my career.” What are some of the things you read to stay on top of what's happening in the world of security? So I'd recommend that everybody pay close attention to Dark Reading. In many...
info_outline Using common sense to stay secure with Joe DietrichSecurity Strong Podcast
Host Jeremy Cherny interviews Joe Dietrich, Manager of Hosting and Storage for Dover Corporation “Dover Corporation is a diversified global manufacturer. We've got about 325 global locations with about 23,000 employees worldwide. What I do for Dover is lead teams that provide server and storage support, as well as Active Directory support and what we call data protection, which for us means backup and disaster recovery.” Why is security important? The systems and applications that run on the servers and storage that my team supports are things like Oracle, our payroll, our accounting...
info_outline Best practices for keeping your business’ information secureSecurity Strong Podcast
This week, we're doing something a little different on the Security Strong Podcast. It's just me, we're doing kind of a fireside chat mode here. I'm sitting in a rocking chair near the fire and I am thinking about the various awesome guests we've had since we started the podcast, I'm thinking about what we do as a security company, and I thought why don't we share some of the best practices and go through a top list of things that you can do to stay secure. Security as a Process, Not a Product A lot of times when people think about security, they're thinking about buying the basics,...
info_outline Security in the world of HR with Amy FalluccaSecurity Strong Podcast
Host: Jeremy Cherny interviews Amy Fallucca, CEO of Bravent “Bravent has been around for about four years. We are an HR consulting and recruiting company. On the HR side, we help with anything from handbooks, to advising on terminations, or employee performance. Then on the recruiting side, we work on a range of positions; professional, technical, and executive. We leverage technology to be really efficient in our process, and by doing that, we're able to save our clients money. We're typically about half the cost of contingent placement firms.” Can you speak a little about security...
info_outline Improve security through Mobile Device Management with Max PalzewiczSecurity Strong Podcast
Host Jeremy Cherny interviews Max Palzewicz, Director of Operations at Rocketman Tech “I started out my career in public accounting, primarily working and advising small business owners. I got my CPA and I was able to join my dad and uncle's business coaching firm, Action Coach of Southeastern Wisconsin, where I worked for a few years. I carved out a niche for myself focusing on the financials for business owners, teaching business owners, how to be financially literate, how to read and analyze their financial statements, also how to process good numbers so they could make sound decisions...
info_outline Know your data with Jason ClaycombSecurity Strong Podcast
Host: Jeremy Cherny interviews Jason Claycomb, Founder of INARMA “INARMA is a professional services firm. The short tagline is ‘We assess controls.’ So I really like how you think of security as a process and not a product - that’s exactly what we do. We help people with the process around security. Yes, there are products involved, but those are types of solutions and we help people pick the right solutions.” Why is security so important to you and your clients? We've all got sensitive data. There isn’t any business that does not have sensitive data in it or where the data isn't...
info_outline E-commerce website security with Lori McDonaldSecurity Strong Podcast
Host: Jeremy Cherny interviews Lori McDonald, President and CEO of Brilliance Business Solutions “I started my career at NASA Johnson Space Center as a flight controller for the space shuttle program where I met my husband. He went on to work for Rockwell Automation and got a promotion that brought us to Milwaukee. I was trying to figure out what was as cool as space and decided the internet looked like a cool place to be. So I started Brilliance Business Solutions, a web development company with a niche in helping manufacturers and distributors implement digital commerce solutions, in 1998....
info_outlineHost: Jeremy Cherny interviews Chris King, Network Analyst for a large petrochemicals corporation.
“I provide second level network support for a large company in the petroleum world. What that entails is for our retail locations around the country, I can do anything from placing communications orders to writing and verifying firewall rules for new technologies that we have rolling out at the site to trace network traffic. We support about 6400 locations so we have a standard template that goes out for our retail locations, and which template gets applied is solely based on what type of technology exists at the site.”
Why is security important to you?
The industry that I work in is all about protecting customer data. You want to make sure that when your customers go out to a site and swipe their card, they have comfort and the peace of mind to know that out of all the threats that are out there, we’re staying vigilant and their customer data is not going to be stolen and used by someone else. So on top of that there are legal ramifications. The government has established payment card industry standards, which require us to go through and vet our networks on a quarterly basis and have an independent auditor come review those findings to make sure that we don’t have any material breaches in our network security.
How do you stay on top of the latest security threats?
So obviously the government requires us to do our scans quarterly, but we do ours monthly - just to make sure that everything is the way that it should be. Also, there’s nothing quite like physical security. If you walk up to a pump and you see that there is some security tape that has been breached or you see something that says “void” or “alert” absolutely do not use that pump. Technology is sophisticated these days where we used to have skimmers on top of what would be where you swipe your card. Now they put devices inside with Bluetooth transmitters. So they may be sitting in the parking lot, watching your card data come into whatever capture tool that they’re using real time and capturing your pin.
What are the most important things people can do to protect their data online?
First, random passwords for every account - it’s a pain but it’s the biggest way that you can protect your information. Secondly, use a VPN when you’re out in public. Essentially what you’re doing is you’re encrypting your data before it gets to the internet and individuals can’t sit in between and see what it is that you’re sending back and forth. The last thing that doesn’t get talked about enough is just having awareness. There are tons of attacks like phishing and fake websites and just having the awareness to know about those is super beneficial.
Tell us about a time where you’ve gotten attacked.
Oh absolutely. My fiance recently had somebody trying to commit identity theft and they were logging into her websites and trying to figure out her passwords. The good thing is that she had me on her side. I took one of her emails where the IP address of the attacker was logged and used a couple of tools to find the location of the attacker. From there I was able to get property records, names of the occupants, social media accounts, emails, phone numbers and even voting records. From there I let them know that I was going to alert the authorities and that they should stop what they were doing.
What’s your favorite tech movie?
That’s a hard question, there’s so many great ones out there and they all rank really high for me. I’m actually going to change it a little bit and say a series - Black Mirror on Netflix. That series is absolutely amazing. It takes the idea of how technology influences everyday life. It gives a Twilight Zone kind of twist and shows how everything can go ridiculously wrong just from relying on technology.