loader from loading.io

Best practices for keeping your business’ information secure

Security Strong Podcast

Release Date: 12/28/2020

Security Awareness Training show art Security Awareness Training

Security Strong Podcast

In this in-depth Security Awareness Training, host Jeremy Cherny explores how a security incident can occur, as well as how people can best protect their data to remain secure.

info_outline
Get To Know Microsoft Teams show art Get To Know Microsoft Teams

Security Strong Podcast

Host Jeremy Cherny discusses how to use Microsoft Teams as well as best practices.   What is Microsoft Teams?   If you haven't used it before, Microsoft Teams is a bit like texting or messenger on your phone in that it allows you to send messages to individuals, create group chats, and share files such as PDFs or photos. It’s much more than just that though. You can also create video chats for things such as one on ones, group chats, meetings, or video conferencing and because Teams can access apps such as SharePoint, Planner, and OneNote just to name a few, your team can work...

info_outline
Get to know Microsoft Planner show art Get to know Microsoft Planner

Security Strong Podcast

Host Jeremy Cherny discusses best practices and how to use Microsoft Planner. What is Microsoft Planner? Microsoft Planner does not have a desktop component, it is strictly from the web. It's also from your apps on your phone and tablets. So right now, there is no desktop component. So you go to Office and sign in with your credentials. It's kind of like task management for teams. Some might call it light project management. There are a lot of different ways to look at it depending on how you're going to use it. We've started to use it here at Tobin Solutions for a few small projects. So we...

info_outline
What to expect from the future of Internet security with Steve Moscarelli show art What to expect from the future of Internet security with Steve Moscarelli

Security Strong Podcast

Host Jeremy Cherny interviews Steve Moscarelli, Regional Sales Manager at Thales Cloud Security “I knew that the internet was going to be the future when I was in college. I had roommates working at the New Media Lab at MIT and they were involved in building a precursor to the internet for DARPA. I also saw very clearly that the internet was built with no security at all - which really propelled me into my career.” What are some of the things you read to stay on top of what's happening in the world of security? So I'd recommend that everybody pay close attention to Dark Reading. In many...

info_outline
Using common sense to stay secure with Joe Dietrich show art Using common sense to stay secure with Joe Dietrich

Security Strong Podcast

Host Jeremy Cherny interviews Joe Dietrich, Manager of Hosting and Storage for Dover Corporation  “Dover Corporation is a diversified global manufacturer. We've got about 325 global locations with about 23,000 employees worldwide. What I do for Dover is lead teams that provide server and storage support, as well as Active Directory support and what we call data protection, which for us means backup and disaster recovery.” Why is security important? The systems and applications that run on the servers and storage that my team supports are things like Oracle, our payroll, our accounting...

info_outline
Best practices for keeping your business’ information secure show art Best practices for keeping your business’ information secure

Security Strong Podcast

This week, we're doing something a little different on the Security Strong Podcast. It's just me, we're doing kind of a fireside chat mode here. I'm sitting in a rocking chair near the fire and I am thinking about the various awesome guests we've had since we started the podcast, I'm thinking about what we do as a security company, and I thought why don't we share some of the best practices and go through a top list of things that you can do to stay secure.  Security as a Process, Not a Product A lot of times when people think about security, they're thinking about buying the basics,...

info_outline
Security in the world of HR with Amy Fallucca show art Security in the world of HR with Amy Fallucca

Security Strong Podcast

Host: Jeremy Cherny interviews Amy Fallucca, CEO of Bravent  “Bravent has been around for about four years. We are an HR consulting and recruiting company. On the HR side, we help with anything from handbooks, to advising on terminations, or employee performance. Then on the recruiting side, we work on a range of positions; professional, technical, and executive. We leverage technology to be really efficient in our process, and by doing that, we're able to save our clients money. We're typically about half the cost of contingent placement firms.” Can you speak a little about security...

info_outline
Improve security through Mobile Device Management with Max Palzewicz show art Improve security through Mobile Device Management with Max Palzewicz

Security Strong Podcast

Host Jeremy Cherny interviews Max Palzewicz, Director of Operations at Rocketman Tech “I started out my career in public accounting, primarily working and advising small business owners. I got my CPA and I was able to join my dad and uncle's business coaching firm, Action Coach of Southeastern Wisconsin, where I worked for a few years. I carved out a niche for myself focusing on the financials for business owners, teaching business owners, how to be financially literate, how to read and analyze their financial statements, also how to process good numbers so they could make sound decisions...

info_outline
Know your data with Jason Claycomb show art Know your data with Jason Claycomb

Security Strong Podcast

Host: Jeremy Cherny interviews Jason Claycomb, Founder of INARMA “INARMA is a professional services firm. The short tagline is ‘We assess controls.’ So I really like how you think of security as a process and not a product - that’s exactly what we do. We help people with the process around security. Yes, there are products involved, but those are types of solutions and we help people pick the right solutions.” Why is security so important to you and your clients? We've all got sensitive data. There isn’t any business that does not have sensitive data in it or where the data isn't...

info_outline
E-commerce website security with Lori McDonald show art E-commerce website security with Lori McDonald

Security Strong Podcast

Host: Jeremy Cherny interviews Lori McDonald, President and CEO of Brilliance Business Solutions “I started my career at NASA Johnson Space Center as a flight controller for the space shuttle program where I met my husband. He went on to work for Rockwell Automation and got a promotion that brought us to Milwaukee. I was trying to figure out what was as cool as space and decided the internet looked like a cool place to be. So I started Brilliance Business Solutions, a web development company with a niche in helping manufacturers and distributors implement digital commerce solutions, in 1998....

info_outline
 
More Episodes

This week, we're doing something a little different on the Security Strong Podcast. It's just me, we're doing kind of a fireside chat mode here. I'm sitting in a rocking chair near the fire and I am thinking about the various awesome guests we've had since we started the podcast, I'm thinking about what we do as a security company, and I thought why don't we share some of the best practices and go through a top list of things that you can do to stay secure. 

Security as a Process, Not a Product

A lot of times when people think about security, they're thinking about buying the basics, they're thinking about buying a firewall or antivirus software. Those are products you buy and those are critical because we want to make sure we're getting those. But really those things are obvious, but if those things are not configured properly if they're not used properly, you still have a security hole and so that's what we refer to it more as a process, not a product. You might think about it like for your home where you have a lock on your front door to keep you secure, but it's engaging the lock when you’re walking out of the house by locking it that's really what has to be secure. The other thing we talked about is you've got all these different things for security. You've got the antivirus, you've got the firewall, you've got the processes down, but security is really only as good as its weakest link. So as we're talking about these different things you want to think if any of these weak links for me because that's where the breach is likely to happen. 

Why Security?

Security is really about the confidentiality of your systems, the integrity of your system, and the availability of your systems. So confidentiality of your internal-external data, making sure that only authorized users are seeing that information, the integrity of your data, making sure it's not changing so people don't mess with your payroll, and no one's messing with your contracts that isn’t supposed to be messing with your contracts. Lastly is the availability of your systems because if you can't get access to your data, you can't get access to the business programs you use.

User Accounts

User accounts are those IDs that you use on your computer that you log in with. That user that you're logging in with, is assigned various permissions and rights, and there are 2 basic categories of users: administrative users and standard users. Administrators can install software, modify software, change the configuration of software, whereas standard users typically can't. One study determined that running as a standard user would prevent attackers from exploiting 94% of the critical vulnerabilities that Microsoft patched in that same year. It used to be a very common practice for everyone to be an administrator because it was the easiest, but it's less common now. The action for this is to make sure you create a separate log-on ID with administrator privileges and only use that administrator account when you have to administer the system, like when you're patching and modifying software, otherwise, run as a standard user. That way, if you happen to catch some malware, it's less likely to impact you and your system because it can't do anything because it's not an administrator.

Password Policies 

Strong passwords mean that they're hard to guess or hack. So when we’re thinking about passwords, I like to think of one of my favorite sci-fi movies, Wargames, when he was sent to the principal's office, and he wanted to, and he wanted to get the password to the computers for the school, so we could change his grades, he opened up a drawer, and on there was a piece of paper and it wrote current password was “pencil.” So you want to make sure you're not using any single words, anything that's found in a dictionary, and no common phrases. It is better to use special characters, numbers, upper and lowercase, and spaces even. All of that makes for a good, complex password and if you need to just pad it with something, add some characters or add even a common phrase to the end of a complex password because length when it comes to a password is critical. The longer the password, the more complex it is, and the longer it takes to try to have a computer brute force or guess what that password is. Also do not reuse passwords across systems, especially websites, cloud services, because if one password gets out of your control they're going to go try that password on all the different systems that are out there. You also want to use a password manager. That way you can go into the password manager at the database. It's a secure, strong database that can't be hacked for your passwords. So the action for today is to verify that your passwords are strong.

Visit https://tobinsolutions.com/ to learn more!

Join us for our next episode by connecting with us at http://securitystrongpodcast.com/