Security Strong Podcast
In this in-depth Security Awareness Training, host Jeremy Cherny explores how a security incident can occur, as well as how people can best protect their data to remain secure.
info_outline Get To Know Microsoft TeamsSecurity Strong Podcast
Host Jeremy Cherny discusses how to use Microsoft Teams as well as best practices. What is Microsoft Teams? If you haven't used it before, Microsoft Teams is a bit like texting or messenger on your phone in that it allows you to send messages to individuals, create group chats, and share files such as PDFs or photos. It’s much more than just that though. You can also create video chats for things such as one on ones, group chats, meetings, or video conferencing and because Teams can access apps such as SharePoint, Planner, and OneNote just to name a few, your team can work...
info_outline Get to know Microsoft PlannerSecurity Strong Podcast
Host Jeremy Cherny discusses best practices and how to use Microsoft Planner. What is Microsoft Planner? Microsoft Planner does not have a desktop component, it is strictly from the web. It's also from your apps on your phone and tablets. So right now, there is no desktop component. So you go to Office and sign in with your credentials. It's kind of like task management for teams. Some might call it light project management. There are a lot of different ways to look at it depending on how you're going to use it. We've started to use it here at Tobin Solutions for a few small projects. So we...
info_outline What to expect from the future of Internet security with Steve MoscarelliSecurity Strong Podcast
Host Jeremy Cherny interviews Steve Moscarelli, Regional Sales Manager at Thales Cloud Security “I knew that the internet was going to be the future when I was in college. I had roommates working at the New Media Lab at MIT and they were involved in building a precursor to the internet for DARPA. I also saw very clearly that the internet was built with no security at all - which really propelled me into my career.” What are some of the things you read to stay on top of what's happening in the world of security? So I'd recommend that everybody pay close attention to Dark Reading. In many...
info_outline Using common sense to stay secure with Joe DietrichSecurity Strong Podcast
Host Jeremy Cherny interviews Joe Dietrich, Manager of Hosting and Storage for Dover Corporation “Dover Corporation is a diversified global manufacturer. We've got about 325 global locations with about 23,000 employees worldwide. What I do for Dover is lead teams that provide server and storage support, as well as Active Directory support and what we call data protection, which for us means backup and disaster recovery.” Why is security important? The systems and applications that run on the servers and storage that my team supports are things like Oracle, our payroll, our accounting...
info_outline Best practices for keeping your business’ information secureSecurity Strong Podcast
This week, we're doing something a little different on the Security Strong Podcast. It's just me, we're doing kind of a fireside chat mode here. I'm sitting in a rocking chair near the fire and I am thinking about the various awesome guests we've had since we started the podcast, I'm thinking about what we do as a security company, and I thought why don't we share some of the best practices and go through a top list of things that you can do to stay secure. Security as a Process, Not a Product A lot of times when people think about security, they're thinking about buying the basics,...
info_outline Security in the world of HR with Amy FalluccaSecurity Strong Podcast
Host: Jeremy Cherny interviews Amy Fallucca, CEO of Bravent “Bravent has been around for about four years. We are an HR consulting and recruiting company. On the HR side, we help with anything from handbooks, to advising on terminations, or employee performance. Then on the recruiting side, we work on a range of positions; professional, technical, and executive. We leverage technology to be really efficient in our process, and by doing that, we're able to save our clients money. We're typically about half the cost of contingent placement firms.” Can you speak a little about security...
info_outline Improve security through Mobile Device Management with Max PalzewiczSecurity Strong Podcast
Host Jeremy Cherny interviews Max Palzewicz, Director of Operations at Rocketman Tech “I started out my career in public accounting, primarily working and advising small business owners. I got my CPA and I was able to join my dad and uncle's business coaching firm, Action Coach of Southeastern Wisconsin, where I worked for a few years. I carved out a niche for myself focusing on the financials for business owners, teaching business owners, how to be financially literate, how to read and analyze their financial statements, also how to process good numbers so they could make sound decisions...
info_outline Know your data with Jason ClaycombSecurity Strong Podcast
Host: Jeremy Cherny interviews Jason Claycomb, Founder of INARMA “INARMA is a professional services firm. The short tagline is ‘We assess controls.’ So I really like how you think of security as a process and not a product - that’s exactly what we do. We help people with the process around security. Yes, there are products involved, but those are types of solutions and we help people pick the right solutions.” Why is security so important to you and your clients? We've all got sensitive data. There isn’t any business that does not have sensitive data in it or where the data isn't...
info_outline E-commerce website security with Lori McDonaldSecurity Strong Podcast
Host: Jeremy Cherny interviews Lori McDonald, President and CEO of Brilliance Business Solutions “I started my career at NASA Johnson Space Center as a flight controller for the space shuttle program where I met my husband. He went on to work for Rockwell Automation and got a promotion that brought us to Milwaukee. I was trying to figure out what was as cool as space and decided the internet looked like a cool place to be. So I started Brilliance Business Solutions, a web development company with a niche in helping manufacturers and distributors implement digital commerce solutions, in 1998....
info_outlineHost: Jeremy Cherny interviews Sandra Estok, Founder and CEO of Way2Protect
“I’m an expert in the fields of cybersecurity, IT, and data privacy. Through my stories, experience and expertise, I help people feel empowered in navigating the cyberworld. I help people find ways to protect what matters against hackers, scammers and cyber monsters, even if people feel they are too busy or do not understand the why, what or how of technology.”
How do you stay on top of the latest security threats?
Every day something else pops. It’s either a vulnerability or a new way for us to be hacked or to be breached. And so how I stay on top is I read a lot. I research a lot. I could read all the news, and I can read everything that's going on, but I'm always trying to find a way to take what's going on and make it a message that is different. And have it shifted in a way that gets into my audience. And that's what I focus on the most. How to take what's happening in the world and articulate that in a way that is more simple so people can understand it.
How do you handle awareness training for people about what the current security threats are and about the specific security threats that might impact them?
Let's take an example with phishing, which is very common. We all need emails, and so it’s an area where we’re exposed, whether you’re in security, just a regular business or a mom or dad, or kids, like everyone gets emails that are trying to either impersonate, steal or do something. So, one way that I teach phishing prevention is when we change our mindset to cybersecurity The first thing that I teach is just brief, just stop knowing that you have control over your cyber life, knowing that you can decide whether to click or not, it's so powerful. And when we start seeing it that way, we start changing. So now we are not so unconscious to just click or browse and get malware in our computers because we're not even realizing it that we're clicking on a malicious link.
What are the most important things that people can do to protect their online information?
I have three steps. The first is mindfulness. What I mean by that is when you get an email, when you get a phone call, just briefly pause. And once you do that, make whatever decision or go in whatever direction you want to go. I think number two is taking care of the basics. And by that I mean, we have a lot of different tools, devices, technology, and if we don't take care of the basics of updating and keep doing the housekeeping of things, it's gonna break. It's like if you never clean your carpet, your house. My third recommendation is that I'm a believer in intentions, decorations and keeping a positive attitude in life. I'm super grateful for everything that has happened to me. So what I do is I use a password manager. I have one long phrase as my password. And that phrase has meaning to me, because every time I type that phrase, I'm reminding myself of something that I want to achieve or something nice that it's in my day. So it makes me happy and at the same time, it’s a very long phrase that protects my passwords.
What’s your favorite tech gadget?
I will say wearables. I love to see my data and what they are. My new gadget is about wellness. It's a ring that measures how I sleep and I love it because it changed the way I do things every day. It helps me to keep myself on track. A lot of people are paranoid about having health data, but this is locked down enough where it’s safe and I can have data that helps me.