This podcast is for business leaders and technology experts who like to stay on top of the latest security news and listen to interviews with insightful industry leaders. Episodes will be a combination of two different formats. We’ll be featuring Coffee Break length podcasts inspired by our monthly webinar series, Envision IT Coffee Breaks, where we take a deep dive into technology hot topics. We’ll build upon that month’s webinar topic by interviewing a Subject Matter Expert to gain even more perspective. Separately, our Espresso Shots will be short, impactful podcasts focused on all things security. As business leaders and technology experts we have to recognize the increasing importance of IT security in the rapidly changing technology landscape.
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Unrestricted Code Execution. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Poor Credential Hygiene. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Insufficient Access Control Lists (ACLs) on Network Shares and Services Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Weak or Misconfigured Multifactor Authentication (MFA) Methods. MFA is an important layer of protection that helps keep your information safe from bad actors. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Bypass of System Access Controls. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Poor Patch Management. Implementing proper patch management is an important step to keeping your information safe from bad actors Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Lack of Network Segmentation. Having proper security boundaries within a network is a vital step to keeping your information safe from bad actors. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Insufficient Internal Network Monitoring. Insufficient internal network monitoring plays an important role to detecting threats in order to help keep you and your employees safe from cyber-attacks. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Improper Separation of User and Administrator Privilege. Separating your accounts is an important way to help keep your information safe. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Default Configurations of Software and Applications. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #15: SIEM/Log Management. Security information and event management, also known as SIEM plays an important role in detecting security threats and keeping your and your employees safe. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #14: Cyber Insurance. In the event of a cyber-attack, cyber insurance can help cover losses that may occur. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #13: Web Gateway Security. Web Gateway Security takes a layered approach to protect you and your employees from harmful malware. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #12: Mobile Device Security. With the high usage of mobile devices in work environments it is important for you and your employees to understand the importance that mobile security plays in protecting you from compromise. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #11: Encryption. Encrypting your data is a vital step to keeping your information secure. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #10: Dark Web Research. Dark web research can help find leaked or stolen information such as compromised passwords, breached credentials, or other sensitive information. This is an important piece to help keep you and your employee's valuable information safe from breaches and other cyber-attacks. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #9: Computer Updates. Compter updates play an important role in keeping you and your employees safe from cyber-attacks. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #8: Advanced Endpoint Detection Response. Utilizing EDR is an important aspect to keeping your business protected from malicious cyber-attacks. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #7: Backups. Backups are an important step to keeping your data secure and protected from compromise. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #6: Security Awareness Training. Making sure you and your employees know how to avoid scams and phishing attacks is vital to keeping your company safe from compromise. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #5: Multi-Factor Authentication. MFA gives you control over who has access to your accounts and helps keep you and your data secure. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #4: Spam Emails. Avoiding spam emails is vital to keep your organization and employees safe. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #3: Firewalls. Listen in to learn about the important role firewalls play in keeping you and your employees safe. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #2: Passwords. Learn how having strong and complex passwords are vital to keeping your organization safe from compromise. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Security assessments play an important role in making sure the security of your business is up to date. Learn about 1 of the 15 ways you can protect your employees and organization from a compromise. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Without protective measures, businesses are at constant threat from cyber-attacks. Throughout this series learn 15 ways you can protect your employees and organization from a compromise. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
As technology continues to advance, so does the sophistication of cyber threats. Listen in to hear how AI and Machine Learning are playing a role in the cybersecurity landscape. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
LastPass sent out a communication to their customers indicating they had detected “unusual activity” within their environment. What actions you should take now depends on your situation. If you are uncomfortable staying with LastPass you should still absolutely use a great password manager, consider Keeper Security (great for businesses) or Bitwarden (great for personal/families). Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us for updates on recent Log4J news and the Exchange Server issue users encountered starting out the new year.
Thanks for joining us this past year as we shared the latest security news! Join us as we close out the year by discussing the good, bad and answer questions on some of the largest IT events from 2021. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
We're surrounded by IoT devices from smart speakers and phones on our home networks to printers and smart monitors on corporate networks. Join us to learn what we can do to keep our networks and IoT devices secure. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us as we review the recent Exchange Server vulnerabilities known as ProxyLogon, what we saw, and lessons learned. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
The NSA recently published recommendations on what to do with Encrypted DNS on your network. Let's discuss the purpose and the recommendations. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Next month we move into the automatic enforcement phase for the Zerologon vulnerability. Understand what this means and be prepared for next steps. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
An update on the SolarWinds security breach and the impact to you. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Tim Minahan, Citrix Executive Vice President of Business Strategy and CMO, joins us to discuss how Citrix and Envision are empowering a better way to work to cultivate employee engagement and better business in the world's next normal. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Nearly 80% of data breaches in 2019 were caused by password compromise. Learn how to securely manage your passwords at a corporate and personal level. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Malvertising has been on the decline in recent years, but bad actors are expected to regain traction using this method as online advertising continues to evolve in our digital landscape. Join us to gain an understanding of 'malvertising' and how to stay secure. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Join us in a discussion with Adi Trivedi, Citrix Principal Sales Engineer, to discuss when and how VPN's make sense for our business connectivity. Adi's blog article mentioned can be found here: https://www.linkedin.com/pulse/vpn-right-remote-access-strategy-you-aditya-joshi-trivedi/ Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Learn how criminals are using illicit Consent Gran Attacks to gain access to your email and data and what to do to spot it. https://blogs.microsoft.com/on-the-issues/2020/07/07/digital-crimes-unit-covid-19-cybercrime/ Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
With a large number of your PCs off the local network, how do you maintain them and make sure they are staying secure? Today we'll cover a few tips for administering those remote endpoints. Connect with us: https://www.linkedin.com/company/envisionitllc.com marketing@envisionitllc.com
Bad actors are getting more sophisticated and making attacks more challenging for end users to notice. Learn what an email chain reply attack is and ways we can be more secure. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Learn how LAPS simplifies password management while helping implement recommended defenses against cyberattacks. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Envision IT Consultants have been helping customers deploy FSLogix to solve challenging issues in virtualized environment. When Microsoft acquired FSLogix in late 2018 this opened up access to the solution and allowed more customers to take advantage of this great tool. Listen in as Envision Consultants provide their experiences, tips and tricks to successfully deploy and manage FSLogix in your own Citrix Environment. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Whether remote work is new to your organization or you're expanding it, security needs to be top of mind. Beau Smithback, Chief Stakeholder Architect at Envision IT joins host Bill Crahen to dive into securing remote work with Citrix and the benefits of 2-factor authentication. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
The number of cyber-attacks are continuing to increase. Of those, ransomware is one of the most well-known attacks organizations - large and small - are being hit with. This is resulting in days, weeks, and in some cases months of downtime and the costs stack up. Cyber security insurance can help mitigate the downtime and financial impact an attack can have. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Brian Kobleur, Senior Director of Worldwide Microsoft Business Development at Citrix dives into the Citrix and Microsoft partnership. While it is sometimes misconceived that Citrix and Microsoft are competitors, they truly work better together to deliver the best user experience organizations are looking for. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
In Part 2 we talk with Steve Hanrahan, COO of Habitat for Humanity of Dane County about their organization's preparedness as bad actors turn-up the volume on Phishing attacks amidst COVID-19. And then we switch gears from technology to the life-complexities of working from home with our loved ones. Leah Roe, CEO of The Perk, offers advice for juggling accountability among work, homeschooling/childcare, and self-care during these unsettling times. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
This podcast features Forrest Fuller, IT Specialist of Neider and Boucher who will talk through how their forward-thinking and focus on employee engagement resulted in technology preparedness for the pandemic. And some of the things they’ve learned as they flipped their BC plan into action. Then Dr. Rosie Ward, author of Rehumanizing the Workplace, will offer important advice on how to maintain and even improve human connection as people are forced into physical separation. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com
Learn how the bad actors are attacking our networks and hear what you can do to help protect your users and systems. Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com