Security Views Radio is an executive level Cyber Security podcast that provides information for managers and executives on how to mitigate risks every organization faces. We have been doing cyber security for nearly 20 years and have developed unique insider knowledge. We aren’t afraid to ask the…
Kik is a private messenger app that enables its users to remain totally anonymous. This makes it appealing to teenagers and easy for predators to send pornography. This week we discuss the dangers associated with an app that only requires a username and email. In this episode we cover:• Kik App• Online PrivacyDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Hackers exploited a vulnerability in Kaseya's software on July 3, 2021 and deployed ransomware to 1,500 organizations. To make matters worse, it was revealed that Kaseya was made aware of the security flaw six years earlier in 2015. When a service provider ignores recommendations to fix a known weakness in it's software, the consequences are costly. In this episode we cover:• Kaseya Ransomware Attack• Company Integrity• Security AssessmentsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Weak or stolen credentials are hackers go-to method in most attacks. This week we discuss Multi-Factor Authentication and why every organization should implement MFA to improve their security posture.In this episode we cover:• Multi-Factor Authentication• Email Security• The difference between MFA and 2-Factor AuthenticationDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
On June 8, 2021 Amazon quietly launched its shared network called Sidewalk. This service creates a WiFi network using existing Ring and Echo devices that will share a portion of your internet bandwidth. The most frustrating part, unless users opt out their devices will automatically share internet with strangers. Shouldn't Amazon ask for users permission first?In this episode we cover:• Amazon Sidewalk Network• Digital Identification• WiFi SecurityDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
One of the primary security measures to protect your organization from cyber security attacks is software patching. This week we discuss best practices for patch management and some of the challenges companies face when it comes to protecting their network.In this episode we cover:• Patch Management• Data Protection• Security UpdatesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Instagram for Kids isn’t just a bad idea, it’s an awful idea. It’s also an easy target for online predators to create fictional profiles and socialize with kids. This week we discuss the difficulty with securing a platform that specifically targets children.In this episode we cover:• Instagram for Kids• Social Media• Data Protection• Online PredatorsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
They say nothing in life is free. This week Adam gives a detailed breakdown of of his frustrating experience with Alexa while playing a free trivia game. We also discuss the frustration with microtransactions and the endless ways we are peppered with ads to buy more time or more fictional coins. In this episode we cover:• Amazon Alexa• Microtransactions• Data ProtectionDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This week we discuss “tattleware” and how some employers are forcing their workers to download apps onto their phone to track their productivity. One of the biggest concerns is the employer rarely knows where this information is stored and how it will be used by a third party. With more companies using tattleware apps the question becomes what is, and isn’t, personal information. In this episode we cover:• Blip app• tattlware• Data Protection• Personal InformationDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Facebook recently announced a data leak which resulted in the exposure of 533 MILLION users mobile numbers. These users accounts were first put up for sale back in June of 2020. This week we discuss why it’s important to protect your phone number from companies who request it for causal transactions. In this episode we cover:• Facebook Data Leak• Data Protection• Password ManagersDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This episode we discuss wearable tech devices like the Me.Ring that claim to protect users from private companies who steal our personal data. While these devices have good intentions the reality is the best device to protect us from data mining is the actual user.In this episode we cover:• Data Protection• Me.Ring• Data MiningDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This week we discuss the lack of moderation in chat rooms with popular games like Among Us. The chat function is an open invitation for predators and unfortunately a lot of parents are unaware of what their kids are reading. In this episode we cover:• Among Us• Chat Rooms• Moderation FeaturesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This week we discuss which device scares us the most if hacked by bad actors. From smart cars to smart speakers, manufacturer’s want connected devices to become an essential to our daily lives. Are the constraints presented to us by life in the non-connected world really so onerous?In this episode we cover:• Smart Speakers• Internet of Things• Hacking DevicesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
When you sign up for a social media account, you agree to terms and conditions and if you violate those stipulations you can be suspended or even permanently removed from the sites altogether. This week we discuss if an entity like Facebook or Twitter engaging in censorship infringes on our rights to freedom of speech.In this episode we cover:• Censorship• Social Media• Florida Water Supply Hacking AttemptDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
To pay or not to pay. Ransomware has grown into a billion dollar business and your company could be next. This week Adam and John dive into ransomware attacks and the dilemma with paying cyber criminals.In this episode we cover:• Ransomware• Kia Motors• Security AssessmentsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This week we deep dive into Internet-enabled crimes and scams. According to the FBI’s Internet Crime Complaint Center (IC3), last year had the highest dollar loss reported since the center was established. Individuals and organizations must remain vigilant and report scams immediately to help create a safer cybersecurity landscape. In this episode we cover:• Online Scams• Phishing• Cryptocurrency theftDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This week we discuss screen time and internet addiction. The internet has some incredibly high utility and nutritious stuff on it. Unfortunately, there’s also a lot of zero-calorie garbage online and things that are really bad for you. In this episode we cover:• Screen Limit• Digital Addiction• Reducing Cell Phone UsageDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
As we adopt more IoT devices, attach them to critical infrastructures and store sensitive data in them, we also have to wrestle with the problem of securing them.In this episode we cover:• IoT Devices• Internet Security• Hacks and VulnerabilitiesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
On this weeks show we discuss the recent petition filed by the American Civil Liberties Union and the Electronic Frontier Foundation with the Supreme Court over digital-privacy. In this episode we cover:• Cell Phone Privacy• Facial and Fingertip recognition• BiometricsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
John and Adam discuss the best hacker movies. Is Office Space actually a great hacker movie?
John and Adam discuss Hacktivism. Is it a force for good or chaos? Is disruption for the greater good a noble effort even if some innocent people are hurt in the process?In this episode we cover: • Hacktivism• Social Agenda• Technology and Human RightsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Adam and John discuss how organizations need to look for weaknesses in their supply chain and actively work to fix them.In this episode we cover: • Vetting Vendors• Plugging the holes in your network • Why it’s a good time to for a Security Audit • Updating Your Firewall Policy Do you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This week Adam and John discuss cyber security details for elected officials. Does Joe Biden have to change all his passwords again since he won the election?In this episode we cover: • Cyber Security• Password Protection• Email Protection• Transition teams and security• Is Stevie Wonder really blind?Do you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Adam and John discuss Third Party security and the risk involved with giving too much information when completing a transaction. In this episode we cover: • Third Party Risk Management• The beauty of a no-hassle transaction • Email Protection• LinkedIn Security• Will James Harden remain a Houston RocketDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Adam and John discuss Zero Day Threats and the steps organizations can take to protect themselves.In this episode we cover: • Zero Day Threats• Mitigating your risk • The NY Jets are awful• Mike Tyson won!! Do you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Adam and John discuss the dangers of using the same password for multiple social media accounts. In this episode we cover: • Why you shouldn’t trust Social Media with your photos• Using a Password Manager • What should you do if your account has been hacked• Malllomar CookiesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Adam and John discuss brand loyalty. Are you blindly loyal to one brand? Does your IT decision maker evaluate all options when contracts are up for renewal and request demo licenses to test new products? In this episode we cover: • Brand Loyalty• Network Security • Technology• Russell Westbrook trade rumorsBrand (blind) Loyalty Blog PostDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Adam and John discuss the steps for building a solid Cyber Security plan. It all starts with a well written Firewall Policy.In this episode we cover: • Firewall Policy• Cyber Security • MFA• Security Pyramid by John StengelDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Adam and John discuss why organizations procrastinate when it comes to upgrading their Cyber Security.In this episode we cover: • Upgrading Cyber Security Equipment • Why Organizations hesitate to stay up-to-date • Budget/Planning• Why The Irishman is a great movie… but just too longDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Adam and John discuss the difficulty a company can face when they don’t have a proper business continuity plan for the IT team. A business needs to make sure it is always in control and not dependent on any single employee.In this episode we cover: • Proper Business Continuity Plan• Master Password List• Vendor Client RelationshipsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.If you don’t currently have a proper plan in place our Security Views Blog post Having a Proper Transition Plan for IT and Cyber Security Turnover is a great resource.Have you experienced a data breach? Contact: info@jscmgroup.com
This weeks episode John & Adam discuss mental health in the IT and Cyber Field. IT workers deal in the negative and suffer from from depression at a high rate. Adam & John talk about the 30 day fitness challenge and why physical activity is important for your mental health. In this episode we cover: • Depression in IT and Cyber Security Field• 30 Day Fitness Challenge• NutritionDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This weeks episode John & Adam debate the percentage of employees who report phishing emails once they click on a link. They also discuss Venmo transactions and why they are public by default as part of its social strategy.In this episode we cover: • Phishing Email Training• Why Venmo makes your transactions public• Insurance commercials are awesomeDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
In this week’s episode Adam and John discuss accountability in cyber security. How severe should the punishment be for an organization when they are proactive and still suffer a data breach?In this episode we cover: • Accountability in Cyber Security• LinkedIn• Personal information on company websitesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
In this week’s episode Adam and John discuss the documentary The Social Dilemma. It’s a fascinating yet sobering analysis of social media, human nature and data harvesting. In this episode we cover: • The Social Dilemma documentary (spoilers)• Data Harvesting• Online Privacy• Impact of Social Media on kidsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
In this week’s episode Adam and John discuss online privacy. They also go into great detail on the reasons why it’s not a good idea to access company data on personal devices. In this episode we cover: • Online Privacy• Accessing company data on personal devices• How much of your information is online?• Oracle wins the Tik Tok raceDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
In this week’s episode Adam and John discuss the Internet of Things. Companies are in such a rush to put all of their services online but they aren’t doing a good job ensuring they can protect our information.In this episode we cover: • The Internet of Things• Coffee machines connected to wifi• Getting Posterized• Why do we have to give our email address when all we want to do is buy a shirt?Do you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
In this weeks episode Adam and John debate the importance of Tik Tok and why so many companies are interested in acquiring the app.In this episode we cover: • Tik Tok • Mobile App Security• Social Media • Fortnite Dance movesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Adam and John discuss the frustration with Zoom in the classroom and lack of security. They also chat about Encryption and the EARN IT Act and how it will impact data security.In this episode we cover:• Zoom security flaws• Encryption• EARN IT Act and the impact on data security.Do you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com