Cyber Security Happy Hour Podcast

Follow Cyber Security Happy Hour Podcast
Share on
Copy link to clipboard

Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security. Each episode features our host is Christie Ogubere You can connect with me on LinkedIn www.linkedin.com/in/christieo1/ Our Website: intexit.co.uk

Intex IT


    • Mar 24, 2025 LATEST EPISODE
    • infrequent NEW EPISODES
    • 18m AVG DURATION
    • 44 EPISODES


    Search for episodes from Cyber Security Happy Hour Podcast with a specific topic:

    Latest episodes from Cyber Security Happy Hour Podcast

    Episode 44 The Role of Cyber Insurance

    Play Episode Listen Later Mar 24, 2025 10:42


        In this episode, I speak about: Overview of the rising importance of cyber insurance in managing organizational risks due to cyber threats. The focus of the episode: what cyber insurance covers and how it benefits businesses. Key Segments: What is Cyber Insurance? Definition and purpose: Mitigating risk from cyber incidents (e.g., data breaches, ransomware). Common coverage areas: data recovery, legal fees, notification costs, business interruptions. Importance of Cyber Insurance: Growing cost of data breaches and their financial implications for businesses. Safety net for quicker recovery post-attack. Choosing a Policy: Key factors: coverage limits, types of incidents covered, deductibles, claims processes, and risk assessments. Real-World Examples: Companies benefiting from cyber insurance during ransomware attacks and data breaches. Beyond Financial Coverage: Risk management resources, incident response, and reputation management. Building trust with clients and stakeholders. Debunking Misconceptions: Clarifying myths such as “cyber insurance replaces cybersecurity” and “only large organizations need it.” Future Trends: Predictive analytics, collaboration in the security ecosystem, and new regulatory guidelines shaping cyber insurance policies. Conclusion: Cyber insurance is essential alongside robust security measures. Tailoring policies to individual needs and updating them regularly. Final remarks and a call to action: Stay secure, subscribe, and share insights Join me for an insightful discussion on protecting your organisation from sophisticated cyber threats.   Enjoy! You can listen on:   At Intex IT Website: https://intexit.co.uk/podcast/   ITUNES: https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/  Do not forget to subscribe to the podcast so you never miss an episode. #podcast #CyberSecurity #InfoSec #DataProtection #PrivacyMatters #ThreatIntelligence #ZeroTrust #SecureTheFuture #CyberAware #RiskManagement #DigitalDefense #SecurityAwareness #Encryption #ITSecurity #CloudSecurity #HackerDefense #NetworkSecurity #PhishingPrevention #IdentityProtection #SecurityEducation #IncidentResponse #MalwareDefense #IoTSecurity #CyberResilience #SecureSoftware #PatchManagement #CISOInsights CyberHygiene  #CyberThreats #SecureInfrastructure  #ThreatDetection #SecurityConsulting #IncidentResponse #DigitalSecurity #SecureSoftware #CloudSecurity #CyberSafe

    Episode 43 Understanding Cyber Threat Intelligence: Staying Ahead of Cyber Attacks

    Play Episode Listen Later Aug 21, 2024 13:32 Transcription Available


    In this episode, I dive into the critical importance of Cyber Threat Intelligence (CTI) and how it helps organisations stay ahead of attackers. Learn about the practice of gathering, analyzing, and applying information to understand potential or existing threats. I break down the three levels of CTI: strategic, tactical, and operational intelligence, explaining their roles in enhancing security posture. Discover how CTI provides insights into who is attacking, their methods, and their objectives. Explore the process of data collection from various sources, analysis to identify patterns, and dissemination of actionable intelligence within the organization. I also discuss the challenges of implementing CTI, including handling large volumes of data and ensuring effective collaboration. Lastly, I look at the future of CTI, highlighting automation, AI, and predictive intelligence as key trends. Learn about essential tools and platforms like ThreatConnect, Splunk, and Darktrace that support CTI efforts.   Join me for an insightful discussion on protecting your organiastion from sophisticated cyber threats.   Enjoy! You can listen on:   At Intex IT Website: https://intexit.co.uk/podcast/   ITUNES: https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/  Do not forget to subscribe to the pod cast so you never miss an episode. #podcast #CyberSecurity #InfoSec #DataProtection #PrivacyMatters #ThreatIntelligence #ZeroTrust #SecureTheFuture #CyberAware #RiskManagement #DigitalDefense #SecurityAwareness #Encryption #ITSecurity #CloudSecurity #HackerDefense #NetworkSecurity #PhishingPrevention #IdentityProtection #SecurityEducation #IncidentResponse #MalwareDefense #IoTSecurity #CyberResilience #SecureSoftware #PatchManagement #CISOInsights CyberHygiene #PasswordSecurity #CyberThreats #DigitalForensics   #SecureInfrastructure  #ThreatDetection #SecurityConsulting #IncidentResponse #DigitalSecurity #SecureSoftware #CloudSecurity #CyberSafe

    Episode 42 Defenders of the Cyberverse - Insights from Alexander Rogan and Christian Rogan of Platinum High Integrity Technologist.

    Play Episode Listen Later Apr 18, 2024 61:28 Transcription Available


    Welcome to Episode 42 of the Cyber Security Happy Hour Podcast, with your host, Christie. In this gripping episode, I interview Alexander Rogan and Christian Rogan, co-founders of Platinum High Integrity Technologies. They discuss their disruptive Cyber Security solution, a technology that works at ring zero, effectively blocking unauthorised binary codes from deploying onto the system. This game-changing approach confronts malware before it can do damage, ensuring cyber safety. Tune in as they shed light on how their technology eliminates the need for constant updates and struggles with false positives.   We dive deep into the advanced realm of Cyber Security, discussing innovative technologies that offer a powerful shield against potential cyber-attacks. In this lively conversation, we explore unique approaches to protect core systems and combat notorious hacker groups worldwide. Offering insights into the dual-authority systems, I reveal how they reduce the risk of system breaches and impede unauthorised system changes.  Alexander and Christian also explain how their advanced technology, Abatis®, counters persistent cyber-attacks, securing systems from the most modern versions of Windows to legacy OS.   The discussion extends to explore the financial implications of using Abatis® to secure critical assets. Alexander and Christian emphasise the staggering return on investment for enterprises, the potential to eliminate costly extended licenses, and the tremendous stress reduction for security operations centre (SOC) analysts. They suggest introducing Abatis® even before compliance standards such as PCI DSS are enacted, owing to its comprehensive threat analysis and advanced preventative measures.   Additionally, we delve into ways to counter insider threats, the limitations of existing security solutions, and the transitions to AI-based solutions. Alexander and Christian highlight the rising costs of maintaining current security infrastructure and the significance of proactive measures in countering cyber threats. They round up the discussion by shedding light on their plans to explore future applications of Abatis®, including cellular protection, Android security, Linux systems protection, and IoT. Join us in this compelling episode to understand how Platinum High Integrity Technologies is revolutionising Cyber Security by offering simplicity, cost-effectiveness, and proactive protection.   You find out further information about Abatis® at https://platinum-hit.com/ Follow of Platinum High Integrity Technologist on LinkedIn https://www.linkedin.com/company/platinum-high-integrity-technologies/     Enjoy! You can listen on:   At Intex IT Website: https://intexit.co.uk/podcast/   ITUNES: https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/      Do not forget to subscribe to the podcast so you never miss an episode. #podcast #CyberSecurity #InfoSec #DataProtection #PrivacyMatters #ThreatIntelligence #ZeroTrust #SecureTheFuture #CyberAware #RiskManagement #DigitalDefense #SecurityAwareness #Encryption #ITSecurity #CloudSecurity #HackerDefense #NetworkSecurity #PhishingPrevention #IdentityProtection #SecurityEducation #IncidentResponse #MalwareDefense #IoTSecurity #CyberResilience #SecureSoftware #PatchManagement #CISOInsights CyberHygiene #PasswordSecurity #CyberThreats #DigitalForensics   #SecureInfrastructure  #ThreatDetection #SecurityConsulting #IncidentResponse #DigitalSecurity #SecureSoftware #CloudSecurity #CyberSafe

    Episode 41 Demystifying Vulnerability Scans

    Play Episode Listen Later Mar 13, 2024 15:16 Transcription Available


    Welcome to Episode 41 of the Cyber Security Happy Hour Podcast.   In this podcast, your host, Christie, explores the critical facet of cyber security vulnerability scanning. Decode the myths, understand what vulnerability scans encompass, and why their role within an organization is of paramount importance. Firstly, begin with an overview of vulnerability scans, which are systematic system and network evaluations that identify potential security weaknesses. The focus is on how these scans are employed using specialised tools to unearth vulnerabilities such as outdated software, weak passwords and non-security flaws that cyber attackers could exploit. Understand how they form proactive measure that organizations could use to stay ahead of these threats. Next, delved into varied types of vulnerability scans that focus on specific areas like network vulnerability and web application vulnerabilities. Explored the step-by-step process involved in carrying out a scan - from scanning and analysing to reporting. Consider how the findings like the presence of unpatched software or misconfigurations in networks, which pose significant risks, are addressed. After that, the categorization of vulnerabilities based on severity- critical, high, medium, low, and informational, provides an understanding of how companies prioritize risks and strategise their remediation efforts. Understand how organizations can follow through continuous improvements that aid in the identification of vulnerabilities and prompt remediation of them. Furthermore, gain insights into the tools used in vulnerability scanning like Nessus, OpenVAS, and Qualys. Learn how IT security teams, network administrators, third party security providers, audit teams and compliance teams play a vital role in conducting vulnerability scans. A recap on the significant points discussed in the episode. Remember, Cyber Security is a journey, not a destination. Stay vigilant, proactive, and committed to addressing these vulnerabilities with regular vulnerability scans. Thank you for tuning in and be sure to join for the next episode for more insights into the ever-evolving world of Cyber Security. Until next time, stay safe, stay secure, and keep defending Cyber Security. Enjoy! You can listen on: Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES: https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/  Do not forget to subscribe to the podcast so you never miss an episode.   #podcast #CyberSecurity #InfoSec #DataProtection #PrivacyMatters #ThreatIntelligence #ZeroTrust #SecureTheFuture #CyberAware #RiskManagement #DigitalDefense #SecurityAwareness #Encryption #ITSecurity #CloudSecurity #HackerDefense #NetworkSecurity #PhishingPrevention #IdentityProtection #SecurityEducation #IncidentResponse #MalwareDefense #IoTSecurity #CyberResilience #SecureSoftware #PatchManagement #CISOInsights CyberHygiene #PasswordSecurity #CyberThreats #DigitalForensics      

    Episode 40 The Zero Trust Security Model

    Play Episode Listen Later Feb 2, 2024 16:13 Transcription Available


    Welcome to episode 40 of the Cyber Security Happy Hour Podcast. Host: Christie Episode 40: The Zero Trust Security Model  Today, I take a deep dive into the Zero Trust Security Model, a Cyber Security approach that continuously verifies and never assumes trust. The zero trust framework challenges conventional methods of trust based on entities' locations, securing potential loopholes through constant verification whether users are inside or outside the organization network. The goal of the Zero Trust Model is not just to prevent unauthorized access to data and services, but to enhance security, protect sensitive information, and mitigate cyber risk.   In today's hybrid work environment, combining remote and office work, securing access to critical information is paramount. It is crucial to verify user identity and restrict privileges, applying the principle of least access. I also highlight how partitioning networks into smaller segments controls access, reducing the potential impact of a security breach and containing potential threats.   Additionally, continuous monitoring and behavior analysis enable proactive defense and early threat detection, further backed by encryption to secure data in transit and at rest.   Multiple technological solutions can be utilized to implement the Zero Trust Architecture.   I also discuss several popular and integral methods, such as multi-factor authentication, single sign-on, Identity and Access Management, and Zero Trust Network Access.   These solutions provide a multi-layered defense against security breaches, collaborating to achieve a robust zero trust ecosystem. As valuable as Zero Trust Model is, it's important to understand the challenges such as implementation complexity, user experience, resource intensity, requirement for training, and cost. However, with careful planning, a thorough risk assessment, and commitment to ongoing improvements, many organizations find that the benefits of adopting a zero trust model outweigh these challenges. Stay tuned to our future episodes as we continue to provide insights into Cyber-Security and the Zero Trust Security Model. I appreciate our listeners and invite you to follow our podcast, leave comments, and share it with others. Together, let's continue learning, growing, and taking proactive steps in Cyber Security.   Enjoy! You can listen on: Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES: https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/  Do not forget to subscribe t/o the podcast so you never miss an episode. Email: podcast@intexit.co.uk  Website: https://intexit.co.uk#podcast #CyberSecurity #InfoSec #DataProtection #PrivacyMatters #ThreatIntelligence #ZeroTrust #SecureTheFuture #CyberAware #RiskManagement #DigitalDefense #SecurityAwareness #Encryption #ITSecurity #CloudSecurity #HackerDefense #NetworkSecurity #PhishingPrevention #IdentityProtection #SecurityEducation #IncidentResponse #MalwareDefense #IoTSecurity #CyberResilience #SecureSoftware #PatchManagement #CISOInsights CyberHygiene #PasswordSecurity #CyberThreats #DigitalForensics  

    Episode 39 Navigating the World of Cyber Security: A Conversation with Mora Awosile

    Play Episode Listen Later Dec 20, 2023 37:40


    Welcome to the Cyber Security Happy Hour Podcast Host: Christie  Episode 39: Navigating the World of Cyber Security with Guest Mora Awosile Mora Awosile is a Cyber Security Specialist and works in Cyber ​​Defense with expertise in Defense and Resilience. Focused on Change Project Management and Incident Response.   With the increasing frequency and complexity of Cyber threats, there is a constant demand for skilled information security professionals. This high demand translates into robust job opportunities and career growth in the field.    High Demand for Expertise Continuous Learning Opportunities Career Paths Salary Expectations  Skill Set Maintenance Challenging Work Responsibility and Pressure Evolution of Threat Landscape On-Call and Irregular Hours Burnout   Enjoy! You can listen on: Google Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB      At Intex IT Website: https://intexit.co.uk/podcast/  ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/  Do not forget to subscribe t/o the podcast so you never miss an episode.   Email: podcast@intexit.co.uk  Website: https://intexit.co.uk #podcast #isms #iso27001 #gapanalysis #infosec #soa #risktreatment #compliance #riskassessment #burnout #compliance #mentalhealth

    Episode 38 Remote work as a Cyber Security Professional

    Play Episode Listen Later Nov 9, 2023 18:28


    Welcome to the Cyber Security Happy Hour Podcast Host: Christie  Episode 38 Remote work as a Cyber Security Professional   As a Cyber Security Professional, working remotely has become more and more common in recent years. There are many benefits to working remotely, but there are also some unique challenges and considerations that come with it. Here are some of the most important things to keep in mind when working remotely in Cyber Security:   Remote work advantages:   Flexibility Commute Reductions Increased Productivity Low cost of living Digital Nomad Diverse Pool of Professionals   Challenges   Isolation Security Concerns Outdated Firmware Unsecured Wifi Increased Phishing Attacks   Enjoy! You can listen on: Google Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB      At Intex IT Website: https://intexit.co.uk/podcast/  ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/  Do not forget to subscribe t/o the podcast so you never miss an episode.   Email: podcast@intexit.co.uk  Website: https://intexit.co.uk #podcast #isms #iso27001 #gapanalysis #infosec #soa #risktreatment #compliance #riskassessment

    Episode 37 Cyber Security for Small Businesses

    Play Episode Listen Later Oct 9, 2023 21:06


    Welcome to the Cyber Security Happy Hour Podcast Host: Christie Episode 37 Cyber Security for Small businesses   Steps to protect your Small Business   Risk Assessment: Threat Identification Vulnerability Assessment: Conduct Risk Analysis:  Risk Mitigation: Evaluate and Implement Cybersecurity Controls: Regular Review  Document the Process Create a Security Policy: Data Classification: Train your Employees       Enjoy! You can listen on: Google Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB      At Intex IT Website: https://intexit.co.uk/podcast/  ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/  Do not forget to subscribe t/o the podcast so you never miss an episode.   Email: podcast@intexit.co.uk  Website: https://intexit.co.uk #podcast #isms #iso27001 #gapanalysis #infosec #soa #risktreatment #compliance #riskassessment  

    Episode 36 ISO 27001 SOA & Risk Treatment Plan

    Play Episode Listen Later May 18, 2023 16:46


    Welcome to the Cyber Security Happy Hour Podcast Host: Christie Episode 36: ISO 27001 SOA & Risk Treatment Plan   Statement of Applicability (SOA) for ISO 27001   Identify relevant controls: Assess control relevance: Select applicable controls: Determine control implementation: Plan control implementation: Document the SOA: Review and approval:   Risk Treatment Plan   Review the risk assessment: Prioritize risks: Identify risk treatment options: Select risk treatment measures: Define control objectives: Document the risk treatment plan: Implement risk treatments: Review and update:   Enjoy! You can listen on: Google Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB      At Intex IT Website: https://intexit.co.uk/podcast/  ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/  Do not forget to subscribe t/o the podcast so you never miss an episode.   Email: podcast@intexit.co.uk  Website: https://intexit.co.uk #podcast #isms #iso27001 #gapanalysis #infosec #soa #risktreatment #compliance #riskassessment  

    Episode 35 Conducting an ISO 27001 Risk Assessment

    Play Episode Listen Later May 3, 2023 17:49


    Welcome to the Cyber Security Happy Hour Podcast Host: Christie Episode 35 Conducting an ISO 27001 Risk Assessment   In the podcast I will be discussing the steps to conduct RISK Assessment as part of the ISO 27001 Implementation.   Steps: Identify assets Identify threats Identify vulnerabilities Determine likelihood and impact Determine risk levels Select risk treatment options   Four approaches you can take when addressing a risk Tolerate the risk Treat the risk by applying controls Terminate the risk by avoiding it entirely Transfer the risk               Enjoy! You can listen on: Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB      At Intex IT Website: https://intexit.co.uk/podcast/  ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/  Do not forget to subscribe t/o the podcast so you never miss an episode.   Email: podcast@intexit.co.uk  Website: https://intexit.co.uk #podcast #isms #iso27001 #gapanalysis #infosec #compliance #riskassessment  

    Episode 34 ISO 27001 Gap Analysis

    Play Episode Listen Later Mar 20, 2023 11:44


    Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Episode 34 ISO 27001 Gap Analysis   In the podcast I will be discussing the steps to conduct a ISMS Gap Analysis.   Identify the scope: Obtain a copy of the ISO 27001 standard: Conduct a baseline assessment: Compare against the standard: Identify gaps and prioritize them: Develop an action plan:   Enjoy! You can listen on: Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB      At Intex IT Website: https://intexit.co.uk/podcast/  ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/  Do not forget to subscribe t/o the podcast so you never miss an episode.   Email: podcast@intexit.co.uk  Website: https://intexit.co.uk #podcast #isms #iso27001 #gapanalysis #infosec  

    Episode 33 Defining your ISO 27001 ISMS Scope

    Play Episode Listen Later Mar 6, 2023 11:52


    Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Defining your ISO 27001 ISMS Scope   The boundaries of the information security management system (ISMS) The Scope should be defined to ensure that all critical assets and processes are covered. The organization's legal, regulatory, and contractual requirements. The organization's processes, such as data processing, storage, and transmission. The organization's people, such as employees, contractors, and third-party vendors.   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/    This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.      GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber    USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free     You can listen on:  Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB       At Intex IT Website: https://intexit.co.uk/podcast/  ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe t/o the podcast so you never miss an episode.   Email: podcast@intexit.co.uk  Website: https://intexit.co.uk      

    Episode 32 Changes to ISO/IEC 27001(2022)

    Play Episode Listen Later Feb 12, 2023 11:34


    Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Changes to ISO/IEC 27001(2022)   What are the ISO 27001 and 27002 standards What is the difference between ISO 27001 and 27002?  Annex A controls Certified to ISO 27001:2013, now what? Can I already become certified to ISO 27001:2022? Will the changes affect my current ISO/IEC 27001 certificate?   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/    This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.      GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber    USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free     You can listen on:  Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB       At Intex IT Website: https://intexit.co.uk/podcast/  ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe t/o the podcast so you never miss an episode.   Email: podcast@intexit.co.uk  Website: https://intexit.co.uk      

    Episode 31 Cyber Security vs Physical Security

    Play Episode Listen Later Sep 6, 2022 11:46


    Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Cyber Security vs Physical Security   Cyber Security  Physical Security Differences between Cyber and Physical Security Physical security components Physical security measures Threats     Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/    This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.      GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber    USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free     You can listen on:  Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB       At Intex IT Website: https://intexit.co.uk/podcast/  ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe to the podcast so you never miss an episode.   Email: podcast@intexit.co.uk  Website: https://intexit.co.uk  

    Episode 30 Cyber Forensics

    Play Episode Listen Later May 26, 2022 18:12


    Welcome to the Cyber Security Happy Hour Podcast.     Host: Christie  Topic: Cyber Forensics What is Computer Forensics?  Examples of Cyber Forensics?  Forensics Procedures Types of computer forensics  Skills and Knowledge required to  become a Cyber Forensics Examiner. Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/    This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.      GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber    USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free     You can listen on:  Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB       At Intex IT Website: https://intexit.co.uk/podcast/  ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe to the podcast so you never miss an episode.   Email: podcast@intexit.co.uk  Website: https://intexit.co.uk  

    Episode 29 With Arijit Biswas Chief Technical Officer speaks about Cyber Security at Diamanté Blockchain

    Play Episode Listen Later Jan 11, 2022 23:18


    Welcome to the Cyber Security Happy Hour Podcast.    Host: Christie Ogubere Guest: Arijit Biswas Topic: The Cyber Security Eco System at Diamante Blockchain 
I am your host Christie and on this podcast I am joined by the Technical Officer at Diamante Blockchain Arijit Biswas. Diamanté Blockchain
The blockchain network process. 
Cyber Security of Diamante Blockchain technology. 
The layers of transactional security.   Diamante Blockchain: https://diamanteblockchain.com/       Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219    USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram https://www.instagram.com/cybersechappy/    Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB     At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy      Email: admin@intexit.co.uk Website: https://intexit.co.uk  

    Episode 28 Log4J Vulnerabilities

    Play Episode Listen Later Jan 4, 2022 11:56


    Welcome to Episode 28 of the Cyber Security Happy Podcast.   I am your host Christie the topic of today podcast is Episode 28 is Log4J Vulnerabilities   What is Log4J? How does Log4j Work? Systems Affected CVSS  Patching and Updates   Enjoy #log4j #log4shell #Cyber Attack #Encryption Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219    USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram https://www.instagram.com/cybersechappy/    Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB     At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy      Email: admin@intexit.co.uk Website: https://intexit.co.uk  

    Episode 27 Why you need Cyber Insurance

    Play Episode Listen Later Dec 7, 2021 11:33


    Welcome to Episode 27 of the Cyber Security Happy Podcast.   I am your host Christie the topic of today podcast is Episode 25 Why you need Cyber Insurance.   What is Cyber Risk Insurance? How are you affected by Cyber Attack? Various types of Cyber Insurance Policy Top 5 Tips to become Cyber Secure       Enjoy #Insurance #Cyberinsurance #Data Breach #Cyber Attack #Encryption Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219    USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram https://www.instagram.com/cybersechappy/    Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB     At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy      Email: admin@intexit.co.uk Website: https://intexit.co.uk  

    Episode 26 Robinhood‘s Data Breach - Cyber Attack

    Play Episode Listen Later Nov 9, 2021 14:54


    Welcome to Episode 26  of the Cyber Security Happy Podcast.   I am your host Christie the topic of today podcast is Episode 25 Robinhood's Data Breach - Cyber Attack   Robinhood who are they? What is a data breach?  What happened? Effects of a Data Breach Prevention methods  Remediation  Enjoy #Robinhood #Data Breach #Cyber Attack #Encryption Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219    USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram https://www.instagram.com/cybersechappy/    Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB     At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy      Email: admin@intexit.co.uk Website: https://intexit.co.uk  

    Episose 24 Four Lessons Learnt from Squid Game that applies to Cyber Security

    Play Episode Listen Later Oct 26, 2021 9:37


      Welcome to Episode 24: Host: Christie   Four Lessons Learnt from Squid Game that applies to Cyber Security   Lesson 1: Vulnerability Lesson 2: Team Work Lesson 3: Internal Threats Lesson 4: The Unknown   Enjoy   #squidgame #cyberthreats #cybersecurity     Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219    USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram https://www.instagram.com/cybersechappy/    Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB/   At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy     

    Episode 23 So you want to be a Bug Bounty Hunter?

    Play Episode Listen Later Oct 11, 2021 13:35


    Welcome to Episode 23 of the Cyber Security Happy Podcast. I am your host Christie the topic of today podcast is; So you want to be a Bug Bounty Hunter?   What is a Bug Bounty Hunter? What are Bug Bounty Programs? Advantages Disadvantages Bug Bounty Websites HackerOne https://hackerone.com/security GitHub https://bounty.github.com/ BugCrowd https://bugcrowd.com/   Enjoy   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219    USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram https://www.instagram.com/cybersechappy/    Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB/     At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy     

    Cyber Security Topics

    Play Episode Listen Later Sep 20, 2021 1:13


    Hello and thank you for listening to the Cyber Security Happy Hour Podcast. Let me know if there are Cyber Security topics you would like to me to discuss. You can leave a comment. Look forward to hearing from you.

    Episode 22 Biometrics in Cyber Security

    Play Episode Listen Later May 5, 2021 18:07


    Welcome to Episode 22 of the Cyber Security Happy Podcast.   I am your host Christie the topic of today podcast is Biometrics in Cyber Security   What is Biometrics?  What is Biometric security?  How Biometric Security Works  Types of Biometrics Advantages and Disadvantages of Biometrics Enjoy   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219    USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram https://www.instagram.com/cybersechappy/    Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB     At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy      Email: admin@intexit.co.uk Website: https://intexit.co.uk  

    Episode 21 DDoS (Distributed Denial of Service) Attacks

    Play Episode Listen Later Apr 13, 2021 18:18


    Welcome to Episode 21 of the Cyber Security Happy Podcast.   I am your host Christie the topic of today's podcast DDoS Attacks   What are DdoS Attacks(Distributed Denial of Service) Botnets Some instances of DdoS attacks Mitigation and Prevention Enjoy   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219    USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram https://www.instagram.com/cybersechappy/    Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB     At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy      Email: admin@intexit.co.uk Website: https://intexit.co.uk  

    Episode 20 The Insider Threat

    Play Episode Listen Later Mar 16, 2021 16:58


    Welcome to Episode 20 of the Cyber Security Happy Podcast.   I am your host Christie the topic of today's podcast The Insider Threat.    What is an Insider Threat? What were the consequences? Preventative Measures How to Minimise the Risk Enjoy   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_coffer_id=288&aff_id=41574&url_id=11219    USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram https://www.instagram.com/cybersechappy/    Goggle Podcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB     At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES:  https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy     

    Episode 19 Public Wi-Fi Security

    Play Episode Listen Later Mar 2, 2021 15:51


      Welcome to Episode 19 of the Cyber Security Happy Podcast,  The podcast host is Christie - Cyber Security Consultant.   Security of Public Wi-Fi Differences between a private and a public Wi-Fi Security Attacks Guidance and Solutions to Attacks   Enjoy.   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB     At Intex IT Website: https://intexit.co.uk/podcast/   ITUNES:  podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy     

    Episode 18 Ransomware

    Play Episode Listen Later Feb 16, 2021 16:11


    Welcome to the Cyber Security Happy Hour Podcast.    Welcome to Episode 18 of the Cyber Security Happy Podcast  I am your host Christie  This  topic of today podcast is Ransomware.    What is ransomware?  How do I get ransomware? How does ransomware spread? How to defend against ransomware? Enjoy.   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/ Do you want Cyber Security Training: https://Intextraining.co.uk/   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB     At Intex IT Website: https://intexit.co.uk/podcast/   ITUNES:  podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy   

    Episode 17 Data Breaches

    Play Episode Listen Later Jan 27, 2021 15:30


    Welcome to the Cyber Security Happy Hour Podcast.    Welcome to Episode 17 of the Cyber Security Happy Podcast. I am your host Christie. The topic of today podcast is Data Breaches. What are Data Breaches Causes of Data Breaches What to do if you data has been leaked Incident Response Enjoy.   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/   Do you want Cyber Security Training click on the links below: https://intextraining.co.uk   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   At Intex IT website: https://intext.co.uk/podcast/ Apple Podcasts: https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: https://www.instagram.com/cybersechappy/   

    Episode 16 - 5 Safety Tips For Shopping Online

    Play Episode Listen Later Jan 12, 2021 12:13


    Welcome to the Cyber Security Happy Hour Podcast.    Welcome to Episode 16 of the Cyber Security Happy Podcast  I am your host Christie and Happy New Year to you.  This is our first podcast for 2021 the topic of today podcast is 5 Safety tips for shopping online.  Enjoy.   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/   Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   At Intex IT website: https://intext.co.uk/podcast/   ITUNES:  podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy   

    Episode 15 Top 10 Cyber Security Risks of 2020

    Play Episode Listen Later Dec 22, 2020 15:43


    Welcome to the Cyber Security Happy Hour Podcast.    In this episode 15, in this episode I talk about the top ten Cyber Risk of 2020.   1.SME 2. Compromising Email 3.Phishing 4.Password and 6 more... Enjoy   I wish all our listeners a Happy Christmas and a prosperous New Year!!!     Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/       Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   At Intex IT website: https://intext.co.uk/podcast/   ITUNES:  podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy   

    Episode 14 Cyber Essentials Certification Overview

    Play Episode Listen Later Dec 1, 2020 8:10


    Welcome to the Cyber Security Happy Hour Podcast.  In this episode, I give an overview of the Cyber Essentials Certification.   What is Cyber Essentials? How do Organisation get Certified What the main technical controls Who Assesses the questionnaire?   Want further information on Cyber Essentials Certification? https://intexit.co.uk/cyberessentials/ https://intexit.co.uk/cyber-essentials-plus/   Enjoy   Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   At Intex IT website: https://intext.co.uk/podcast/   ITUNES:  podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy   

    Episode 13 Spyware

    Play Episode Listen Later Nov 3, 2020 16:30


    Welcome to the Cyber Security Happy Hour Podcast.  In this episode, I talk about Spyware.   What is Spyware? How does Spyware work The different type of Spyware Preventing Spyware Enjoy   Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   At Intex IT website: https://intext.co.uk/podcast/   ITUNES:  podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode.    Instagram: @Cybersechappy   

    Episode 12 Risk and Countermeasures of IOT Devices

    Play Episode Listen Later Oct 20, 2020 50:40


    In this episode, I identify various IOT Devices, their risk in the home and workplace and countermeasures Enjoy.   Cyber Security Certification Training https://intextraining.co.uk     Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    https://intexit.co.uk/podcast     GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   ITUNES: podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode.    

    Episode 11 Cyber Attack Threat - The Malicious Insider

    Play Episode Listen Later Sep 29, 2020 24:10


    In this episode, I examine the Risk of The Malicious Insider. What the top concerns for organizations. What is a Malicious Insider? How do you identify Insider Threat?  Countermeasures Enjoy.   Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   ITUNES: podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode.    

    Episode 10 Cyber Risk Management Process

    Play Episode Listen Later Sep 15, 2020 17:05


    In this episode, I examine the Cyber Risk Management process. I explain the steps using the NIST Cyber Risk Management Framework and how this can be implemented within an organisation.   Why Cyber Risk Management is Important  NIST Cyber Risk Management Identify Protect Detect Respond Recover Enjoy.   Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   ITUNES: podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode.    

    Episode 9 Cyber Security and Privacy

    Play Episode Listen Later Sep 1, 2020 19:36


    Welcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.    The Podcast topic for today is - Cyber Security and Privacy   This episode is all about your Privacy and how Cyber Security can be used to secure your privacy. How organisations are supposed to protect your privacy Data protection and Privacy  The difference between privacy and security What can you do to protect your own privacy especially on social media   Enjoy. Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   ITUNES: podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode. 

    Episode 8 How Artificial Intelligence can be used in Cyber Security

    Play Episode Listen Later Aug 18, 2020 22:47


    Welcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.    The Podcast topic for today is - How Artificial Intelligence can be used in Cyber Security   In this episode, I talk about AI, what exactly is AI and the different types.  How AI can be used in Cyber Security and examples of some platforms that AI is used in Cyber Security.   Do you want free Cyber Security Training click on the links below: https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw   This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   ITUNES: podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode. 

    Episode 7 How to get into Cyber Security

    Play Episode Listen Later Aug 4, 2020 17:47


    Welcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.    The Podcast topic for today is - How to get into Cyber Security   In this episode, I talk about the various roles within Cyber Security, Degrees, Cyber Security Certifications and how to get that Cyber Security Job.     Free Cyber Security Training https://www.cybrary.it/   Free Penetration Testing Videos https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw         This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.     GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   ITUNES: podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode. 

    Episode 6 WhatsApp Encryption

    Play Episode Listen Later Jul 14, 2020 17:37


    Welcome to another episode of the Cyber Security Happy Hour Podcast.  Presented by Christie Ogubere.  The Podcast topic for today is WhatsApp Encryption. End-to-end encryption prevents cyber-criminals and governments from accessing the messages that has been sent to other WhatsApp users.  Topics covered within this podcast include understanding how end-to-end encryption works and past vulnerabilities of WhatsApp. This is Cyber  and Information Security Podcast - do not forget to protect your data in transit  and maintain your privacy  by using our affiliate link for Nordvpn.   GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219   USE COUPON CODE: intexcyber   USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free You can follow us on Instagram https://www.instagram.com/cybersechappy/    GogglePodcast https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL3BiZ2IxZTVjMjhqemYvZmVlZC54bWw?hl=en-GB   ITUNES: podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723   Do not forget to subscribe to the podcast so you never miss an episode. 

    Episode 5 Protecting your Mobile Devices and have more Privacy

    Play Episode Listen Later Jun 30, 2020 18:12


    Episode 5    The Podcast topic for today is Protecting your mobile devices and have more Privacy. Podcast Host Christie Ogubere.   Mobile phones are used for a variety of task.  This include browsing the internet, banking and emails. There are many dangers and if your mobile phone is not adequately protected that means unauthorised person can get access to your phone and data.  I mention a few steps on how to recognise these dangers and simple steps to protect your mobile phone.   This is Cyber Security podcast -   do not forget to protect your data in transit by using our affiliate link for Nordvpn.   GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram @cybersechappy and don't forget to subscribe to the show so you never miss an episode of the Cyber Security Happy Hour podcast. Our Facebook page Cyber Security Happy Hour Podcast. Did you know that you can listen to our podcast on iTunes and Spotify.  

    Episode 4 Impact from Covid-19 on Cyber Security Jobs

    Play Episode Listen Later Jun 11, 2020 17:19


    This episode covers an important topic - the impact on Cyber Security Jobs as a result of Covid-19.   I talk about how COVID-19 has caused the virtual shutdown of major industries, the loss of millions of jobs, and the highest unemployment rate in the U.K and the rest of the world since the Great Depression.   The pandemic has made some companies to cut back on plans to hire new cyber-security and the technology industry as a whole are doing better than the general economy.  The future of cyber security jobs and the increase in remote work.   This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn.   GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free   You can follow us on Instagram @cybersechappy and don't forget to subscribe to the show so you never miss an episode of the Cyber Security Happy Hour podcast. Did you know that you can listen to our podcast on iTunes and Spotify.      

    Episode 3 Recovering from Phishing Attack

    Play Episode Listen Later May 26, 2020 17:54


    Welcome to Episode 3 of the Cyber Security Happy Hour.   I will talking about Phishing attacks, how to recognise what an attack looks like.  Furthermore, how to protect your confidential information and recover from a Phishing attack. I would like to to hear  your comments. You can also follow us on instagram @cybersechappy. On Facebook Cyber Security Happy Hour Podcast.  

    Episode 2 IOT Device Security

    Play Episode Listen Later May 12, 2020 22:10


    In the second episode, I will the talking about IOT, the advantages and disadvantages. How to secure your IOT devices either in the home or workplace.   Please follow me on twitter: Christiexto You can listen on https://intexit.co.uk/podcast/   I will love to hear your comments and topics suggestions.          

    Episode 1 Secure Password

    Play Episode Listen Later May 7, 2020 13:26


    In this episode I will giving insights on secure passwords.  The  different types of authentication methods and how to create secure passwords.  How Cyber criminals capture and reuse passwords

    Claim Cyber Security Happy Hour Podcast

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel