Episode 101 - Email Sucks, Stop Using It, Communicate More Effectively
Release Date: 10/31/2017
Security In Five Podcast
Twilio confirmed recently they were a victim of a SMS phishing attack. This attack led to customer data being accessed after a few employees were tricked into entering credentials into a hacker-controlled fake website. This epsiode talks about how it happened and the things you can do to slow down or prevent these types of attacks. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Google has been served a class action lawsuit for a bait and switch type move with Google Workspace early adopters. This episode talks about what the lawsuit it and rants about it because your host is one of the early adopters. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
A recent study by a firm called ExtraHop revealed that over 60% of IT environments analyzed has SSH ports exposed. Additional research shows that many less than secure ports and protocols are left open, allowing more vectors for attackers to probe. This episode breaks down what those were and how you can get a handle on these in your environment. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
The Cybersecurity and Infrastructure Security Agency (CISA) released a report of the top malware strains of 2021. This episode talks about what reports like this are valuable to your continuing education as a cybersecurity professional. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
New research shows that almost 90% of ransomware delivery is done through office macros. This ties into the move by Microsoft to block all macros by default in their Office products. This episode breaks it down. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Security researchers have discovered thousands of mobile apps that are leaking API keys. This episode talks about how this is more of a problem than this shows and why it's happening. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Phishing campaigns and attacks are constantly changing. A new credential stealing phishing campaign has been spotted in the wild. This episode talks about what it is and how you can help protect against it. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
This episode talks about some exciting news for the Security In Five and your host's new roles. Cloud Security Alliance of MN - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
The HIPAA Security Rule is a supportive rule to HIPAA focused on more of the technical security aspects of the privacy rule. NIST released an updated draft of a guide to help people understand and implement controls for the security rule. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
A Virtual Private Network (VPN) should be part of your personal security practice. This episode talks about the additional benefits you can get by regularly using one. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineEmail needs to go, it's a security nightmare, it's a pain to manage and it has become an inefficient method of communication. Look at your inbox, how much time do you spend 'cleaning it out', messages skipped over or skimmed, and time going back and forth with broken messages.
It's time for email to evolve and this episode goes into how it can do that.
Be aware, be safe.
------------------------------------
Website - https://www.binaryblogger.com
Podcast RSS - http://securityinfive.libsyn.com/rss
Twitter @binaryblogger - https://www.twitter.com/binaryblogger
iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2
YouTube - https://www.youtube.com/binaryblogger
TuneIn Radio - Security In Five Channel
iHeartRadio - Security In Five Channel
Email - [email protected]