Security Views Radio - JSCM Group

Follow Security Views Radio - JSCM Group
Share on
Copy link to clipboard

Security Views Radio is an executive level Cyber Security podcast that provides information for managers and executives on how to mitigate risks every organization faces. We have been doing cyber security for nearly 20 years and have developed unique insider knowledge. We aren’t afraid to ask the…

JSCM Group


    • Jul 29, 2021 LATEST EPISODE
    • every other week NEW EPISODES
    • 46m AVG DURATION
    • 37 EPISODES


    Search for episodes from Security Views Radio - JSCM Group with a specific topic:

    Latest episodes from Security Views Radio - JSCM Group

    Episode 37 - The Kik App

    Play Episode Listen Later Jul 29, 2021 55:37


    Kik is a private messenger app that enables its users to remain totally anonymous. This makes it appealing to teenagers and easy for predators to send pornography. This week we discuss the dangers associated with an app that only requires a username and email. In this episode we cover:• Kik App• Online PrivacyDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 36 - When Your MSSP Fails to Protect Your Data

    Play Episode Listen Later Jul 15, 2021 46:40


    Hackers exploited a vulnerability in Kaseya's software on July 3, 2021 and deployed ransomware to 1,500 organizations. To make matters worse, it was revealed that Kaseya was made aware of the security flaw six years earlier in 2015. When a service provider ignores recommendations to fix a known weakness in it's software, the consequences are costly. In this episode we cover:• Kaseya Ransomware Attack• Company Integrity• Security AssessmentsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 35 - The Importance of MFA (Multi-Factor Authentication)

    Play Episode Listen Later Jun 24, 2021 42:40


    Weak or stolen credentials are hackers go-to method in most attacks. This week we discuss Multi-Factor Authentication and why every organization should implement MFA to improve their security posture.In this episode we cover:• Multi-Factor Authentication• Email Security• The difference between MFA and 2-Factor AuthenticationDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 34 - Order 66

    Play Episode Listen Later Jun 17, 2021 50:28


    On June 8, 2021 Amazon quietly launched its shared network called Sidewalk. This service creates a WiFi network using existing Ring and Echo devices that will share a portion of your internet bandwidth. The most frustrating part, unless users opt out their devices will automatically share internet with strangers. Shouldn't Amazon ask for users permission first?In this episode we cover:• Amazon Sidewalk Network• Digital Identification• WiFi SecurityDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 33 - Patch Management

    Play Episode Listen Later May 28, 2021 55:37


    One of the primary security measures to protect your organization from cyber security attacks is software patching. This week we discuss best practices for patch management and some of the challenges companies face when it comes to protecting their network.In this episode we cover:• Patch Management• Data Protection• Security UpdatesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 32 - InstaKids

    Play Episode Listen Later May 21, 2021 60:19


    Instagram for Kids isn’t just a bad idea, it’s an awful idea. It’s also an easy target for online predators to create fictional profiles and socialize with kids. This week we discuss the difficulty with securing a platform that specifically targets children.In this episode we cover:• Instagram for Kids• Social Media• Data Protection• Online PredatorsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 31 - "Alexa, Let's Play A Game!"

    Play Episode Listen Later May 7, 2021 52:14


    They say nothing in life is free. This week Adam gives a detailed breakdown of of his frustrating experience with Alexa while playing a free trivia game. We also discuss the frustration with microtransactions and the endless ways we are peppered with ads to buy more time or more fictional coins. In this episode we cover:• Amazon Alexa• Microtransactions• Data ProtectionDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 30 - Tattleware

    Play Episode Listen Later Apr 28, 2021 49:12


    This week we discuss “tattleware” and how some employers are forcing their workers to download apps onto their phone to track their productivity. One of the biggest concerns is the employer rarely knows where this information is stored and how it will be used by a third party. With more companies using tattleware apps the question becomes what is, and isn’t, personal information. In this episode we cover:• Blip app• tattlware• Data Protection• Personal InformationDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 29 - Another Facebook Data Leak

    Play Episode Listen Later Apr 19, 2021 44:00


    Facebook recently announced a data leak which resulted in the exposure of 533 MILLION users mobile numbers. These users accounts were first put up for sale back in June of 2020. This week we discuss why it’s important to protect your phone number from companies who request it for causal transactions. In this episode we cover:• Facebook Data Leak• Data Protection• Password ManagersDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 28 - Security Gadgets

    Play Episode Listen Later Apr 8, 2021 1:05


    This episode we discuss wearable tech devices like the Me.Ring that claim to protect users from private companies who steal our personal data. While these devices have good intentions the reality is the best device to protect us from data mining is the actual user.In this episode we cover:• Data Protection• Me.Ring• Data MiningDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 27 - Chat Rooms

    Play Episode Listen Later Apr 1, 2021 48:02


    This week we discuss the lack of moderation in chat rooms with popular games like Among Us. The chat function is an open invitation for predators and unfortunately a lot of parents are unaware of what their kids are reading. In this episode we cover:• Among Us• Chat Rooms• Moderation FeaturesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 26 - Rise of the Machines

    Play Episode Listen Later Mar 18, 2021 38:29


    This week we discuss which device scares us the most if hacked by bad actors. From smart cars to smart speakers, manufacturer’s want connected devices to become an essential to our daily lives. Are the constraints presented to us by life in the non-connected world really so onerous?In this episode we cover:• Smart Speakers• Internet of Things• Hacking DevicesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 25 - Censorship in Cyberspace

    Play Episode Listen Later Mar 8, 2021 58:20


    When you sign up for a social media account, you agree to terms and conditions and if you violate those stipulations you can be suspended or even permanently removed from the sites altogether. This week we discuss if an entity like Facebook or Twitter engaging in censorship infringes on our rights to freedom of speech.In this episode we cover:• Censorship• Social Media• Florida Water Supply Hacking AttemptDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 24 - Ransomware

    Play Episode Listen Later Feb 25, 2021 45:44


    To pay or not to pay. Ransomware has grown into a billion dollar business and your company could be next. This week Adam and John dive into ransomware attacks and the dilemma with paying cyber criminals.In this episode we cover:• Ransomware• Kia Motors• Security AssessmentsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 23 - Online Scams

    Play Episode Listen Later Feb 11, 2021 51:43


    This week we deep dive into Internet-enabled crimes and scams. According to the FBI’s Internet Crime Complaint Center (IC3), last year had the highest dollar loss reported since the center was established. Individuals and organizations must remain vigilant and report scams immediately to help create a safer cybersecurity landscape. In this episode we cover:• Online Scams• Phishing• Cryptocurrency theftDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 22 - Managing Screen Time

    Play Episode Listen Later Feb 4, 2021 58:03


    This week we discuss screen time and internet addiction. The internet has some incredibly high utility and nutritious stuff on it. Unfortunately, there’s also a lot of zero-calorie garbage online and things that are really bad for you. In this episode we cover:• Screen Limit• Digital Addiction• Reducing Cell Phone UsageDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 21 - IoT Devices

    Play Episode Listen Later Jan 28, 2021 55:33


    As we adopt more IoT devices, attach them to critical infrastructures and store sensitive data in them, we also have to wrestle with the problem of securing them.In this episode we cover:• IoT Devices• Internet Security• Hacks and VulnerabilitiesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 20 - Faces and Fingertips

    Play Episode Listen Later Jan 21, 2021 57:20


    On this weeks show we discuss the recent petition filed by the American Civil Liberties Union and the Electronic Frontier Foundation with the Supreme Court over digital-privacy. In this episode we cover:• Cell Phone Privacy• Facial and Fingertip recognition• BiometricsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 19 - Rating the Best Hacker Movies

    Play Episode Listen Later Jan 14, 2021 51:38


    John and Adam discuss the best hacker movies. Is Office Space actually a great hacker movie?

    Episode 18 - Hacktivism

    Play Episode Listen Later Jan 7, 2021 44:46


    John and Adam discuss Hacktivism. Is it a force for good or chaos? Is disruption for the greater good a noble effort even if some innocent people are hurt in the process?In this episode we cover: • Hacktivism• Social Agenda• Technology and Human RightsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 17 - Understanding Your Weaknesses

    Play Episode Listen Later Dec 31, 2020 40:38


    Adam and John discuss how organizations need to look for weaknesses in their supply chain and actively work to fix them.In this episode we cover: • Vetting Vendors• Plugging the holes in your network • Why it’s a good time to for a Security Audit • Updating Your Firewall Policy Do you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Political Passwords

    Play Episode Listen Later Dec 24, 2020 59:30


    This week Adam and John discuss cyber security details for elected officials. Does Joe Biden have to change all his passwords again since he won the election?In this episode we cover: • Cyber Security• Password Protection• Email Protection• Transition teams and security• Is Stevie Wonder really blind?Do you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 15 - T.P.P. (Third Party Problems)

    Play Episode Listen Later Dec 14, 2020 48:32


    Adam and John discuss Third Party security and the risk involved with giving too much information when completing a transaction. In this episode we cover: • Third Party Risk Management• The beauty of a no-hassle transaction • Email Protection• LinkedIn Security• Will James Harden remain a Houston RocketDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 14 - Zero Day Threats

    Play Episode Listen Later Dec 3, 2020 45:41


    Adam and John discuss Zero Day Threats and the steps organizations can take to protect themselves.In this episode we cover: • Zero Day Threats• Mitigating your risk • The NY Jets are awful• Mike Tyson won!! Do you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 13 - Trust and Social Media

    Play Episode Listen Later Nov 25, 2020 45:22


    Adam and John discuss the dangers of using the same password for multiple social media accounts. In this episode we cover: • Why you shouldn’t trust Social Media with your photos• Using a Password Manager • What should you do if your account has been hacked• Malllomar CookiesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 12 - Brand Loyalty

    Play Episode Listen Later Nov 19, 2020 44:11


    Adam and John discuss brand loyalty. Are you blindly loyal to one brand? Does your IT decision maker evaluate all options when contracts are up for renewal and request demo licenses to test new products? In this episode we cover: • Brand Loyalty• Network Security • Technology• Russell Westbrook trade rumorsBrand (blind) Loyalty Blog PostDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 11 - The Security Pyramid

    Play Episode Listen Later Nov 12, 2020 30:19


    Adam and John discuss the steps for building a solid Cyber Security plan. It all starts with a well written Firewall Policy.In this episode we cover: • Firewall Policy• Cyber Security • MFA• Security Pyramid by John StengelDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 10 - The Burden of Change

    Play Episode Listen Later Nov 5, 2020 44:30


    Adam and John discuss why organizations procrastinate when it comes to upgrading their Cyber Security.In this episode we cover: • Upgrading Cyber Security Equipment • Why Organizations hesitate to stay up-to-date • Budget/Planning• Why The Irishman is a great movie… but just too longDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 09 - A Proper Transition Plan for IT and Cyber Security teams.

    Play Episode Listen Later Oct 30, 2020 41:24


    Adam and John discuss the difficulty a company can face when they don’t have a proper business continuity plan for the IT team. A business needs to make sure it is always in control and not dependent on any single employee.In this episode we cover: • Proper Business Continuity Plan• Master Password List• Vendor Client RelationshipsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.If you don’t currently have a proper plan in place our Security Views Blog post Having a Proper Transition Plan for IT and Cyber Security Turnover is a great resource.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 08 - Mental Health in the Cyber Field

    Play Episode Listen Later Oct 22, 2020 37:46


    This weeks episode John & Adam discuss mental health in the IT and Cyber Field. IT workers deal in the negative and suffer from from depression at a high rate. Adam & John talk about the 30 day fitness challenge and why physical activity is important for your mental health. In this episode we cover: • Depression in IT and Cyber Security Field• 30 Day Fitness Challenge• NutritionDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 07 - You Clicked On a Phishing Link

    Play Episode Listen Later Oct 15, 2020 42:30


    This weeks episode John & Adam debate the percentage of employees who report phishing emails once they click on a link. They also discuss Venmo transactions and why they are public by default as part of its social strategy.In this episode we cover: • Phishing Email Training• Why Venmo makes your transactions public• Insurance commercials are awesomeDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 06 - Accountability in Cyber Security

    Play Episode Listen Later Sep 30, 2020 42:40


    In this week’s episode Adam and John discuss accountability in cyber security. How severe should the punishment be for an organization when they are proactive and still suffer a data breach?In this episode we cover: • Accountability in Cyber Security• LinkedIn• Personal information on company websitesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 05 - The Social Dilemma Dilemma

    Play Episode Listen Later Sep 23, 2020 54:20


    In this week’s episode Adam and John discuss the documentary The Social Dilemma. It’s a fascinating yet sobering analysis of social media, human nature and data harvesting. In this episode we cover: • The Social Dilemma documentary (spoilers)• Data Harvesting• Online Privacy• Impact of Social Media on kidsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 04 - Online Privacy

    Play Episode Listen Later Sep 17, 2020 50:39


    In this week’s episode Adam and John discuss online privacy. They also go into great detail on the reasons why it’s not a good idea to access company data on personal devices. In this episode we cover: • Online Privacy• Accessing company data on personal devices• How much of your information is online?• Oracle wins the Tik Tok raceDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 03 - The Internet of Things

    Play Episode Listen Later Sep 4, 2020 52:42


    In this week’s episode Adam and John discuss the Internet of Things. Companies are in such a rush to put all of their services online but they aren’t doing a good job ensuring they can protect our information.In this episode we cover: • The Internet of Things• Coffee machines connected to wifi• Getting Posterized• Why do we have to give our email address when all we want to do is buy a shirt?Do you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 02 - Everyone Wants to Buy Tik Tok

    Play Episode Listen Later Sep 2, 2020 36:30


    In this weeks episode Adam and John debate the importance of Tik Tok and why so many companies are interested in acquiring the app.In this episode we cover: • Tik Tok • Mobile App Security• Social Media • Fortnite Dance movesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Episode 01 - Zoom Security Flaws, Encryption and the EARN IT Act

    Play Episode Listen Later Aug 31, 2020 44:57


    Adam and John discuss the frustration with Zoom in the classroom and lack of security. They also chat about Encryption and the EARN IT Act and how it will impact data security.In this episode we cover:• Zoom security flaws• Encryption• EARN IT Act and the impact on data security.Do you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com

    Claim Security Views Radio - JSCM Group

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel