Talk'n Technology is the podcast that will keep you current on the various disciplines and methodologies utilized in cybercrime investigations, digital forensics, network secuirty, network assessments and end-user awareness training. This is the one show that your boss will want you to listen to.
Make sure you let your colleagues know about this podcast, it could save your company a lot of aggravation, frustration, stress and money. This podcast covers using corporate email for non-work-related activities, webmail attacks, phone scams, web scams, domain name impersonation and so much more. We want as many people to get this information, so we can stop the long line of victims from growing even longer.
This is the podcast for all your employees. If we don't let our non-technical employees know the risks, we all pose while working on a computer, as well as how to reduce that risk, then it's not a matter of if, but a matter of when we suffer a ransomware attack. Please send a link of this podcast to every colleague, friend and family member. We all need to know this information and have it reinforced from time to time.
Hackers are going to encrypt or permanently delete your backups as a part of their ransomware attack. Ransomware has been so successful for them; they have been increasing the ransom to astronomical prices. Get prepared and lock hackers out of your backups, preventing them from destroying your only way to recover. Don't let a click by an end-user destroy your company. A fellow employee might provide a hacker access to the network by clicking on a phishing email, but the hacker will not be able to get to your backups, as long as secure them correctly.
Ransomware and network intrusions are predicted to be the largest problems for corporations, government agencies, hospitals and schools in 2021. But did you know that hackers typically hit hard during the holidays. Skeleton crews, top management are often off on the holidays and the least experienced people are working during the most crucial times, which means that the network is at its most vulnerable state. Get prepared for the 2020 holiday season hacker attacks and learn how to strengthen your network and use key security features to help prevent disasters and reduce your risk posture. Get prepared and listen to this podcast every weekday. We are going to try to get you ready to survive an attack.
Segment One - Forensic Linguistics. Understanding how individuals can be identifed by how they write. Segment Two - Audio Forensics. Understanding authentication and enhancements. Segment Three - Copyright Infringement. Understanding the legal implications and repercusions. Segment Four - Top Five Network Management Mistakes. Learn how to deal with the most common mistakes.
Segment One - Network Security. Segment Two - Network Security Continued. Segment Three - Network Security Continued. Segment Four - Cellphone forensics.
Segment One - Digital forensics and the types of cases you may be involved in. Segment Two - Expert witness, testing results and ethics. Segment Three - Network security standards including physical security of devices and continuous operation. Segment Four - Security standards continued with network design and firewall deployment.
Segment One - Reminding everyone not to click. Reviewing email scams, UAC, Defender, Firewalls and Remote Desktop security. Segment Two - Reviewing phone scams, domain impersonation and tech support scams. Segment Three - Analyzing data from Chromebooks and USB information located in the Windows registry. Segment Four - The difference between imaging a hard drive and imaging files and folders. Brief review of Program Files (x86) folder.
Segment one discusses locating potential evidence on computers for HR, attorneys and administrators. Segment two talks about searching email with Discovery Attender by SherpaSoftware.com. Segment three covers onsite and offsite backups. Segment four reviews the necessity for documentation, policies, procedures and proper wiring.
Segment One - Cellphone forensics, the costs and limitations. Segment Two - What makes and expert witness an expert. Segment Three - Overview of one of our sponsors, the Network Security Group. Segment Four - What is an industry certification and what value does it bring to experts.
Segment One - We explore why we need a full forensic image. Segment Two - Examples of what information can be retreived during a forensic analysis. Segment Three - How private investigators can add easy to perform computer security analysis to their service offerings. Segment Four - Understanding the basics of remote desktop, virtual private networks and two-factor authentication.
Segment one discusses dealing with failing hard drives. Segment two talks about Axiom forensic software. Segment three explains the difference between a clone and a forensic image. Segment four lays out the importance of dealing with pirated software, music and other digital products.
Segment One - Understanding drive geometry and the relationship between tracks and sectors as well Cylinders, Heads, Sectors and Logical Block Addressing. Segment Two - Drive Geometry continued. Segment Three - Downloading, installing and using Forensic Workstation Utility, a software write-blocker. Segment Four - Downloading, installing and using Forensic Imager.
Segment One - Importance of changing and not caching passwords. Steps to assessing networks. Segment Two - Assessing networks continued, policies and procedures. Segment Three - Investigating cybercrime including ransomware. Segment Four - End-user awareness programs to address email and phone scams.
Segment One - Understanding ransomware, how it works and steps to consider to increase your chances of getting data back. Segment Two - Ransomware continued, pitfalls, decryption process and protecting backups. Segment Three - Forensic images, track 0 and negative tracks. Segment Four - Forensic images continued, MD5 hash and how not to ruin a forensic case.
Segment One identifies scams that keep occurring and can cause you financial harm and have criminal liabilities. Segment Two discusses features in Video Camera Systems. Segment Three explains why defrag affects the outcome of search hit results. Experts need to know this and identify any issues for their clients. Segment four reminds you that mobile laptops are a target of corporate thieves and identify theft criminals. This is a reminder to get your laptop encrypted today.
Segment talks about how to recover valuable hard drive space. Segment two discusses the importance of identifying duplicates and older files no longer needed. Segment three explains why experts should stay within their field of expertise. Segment four reviews network assessments.
Segment one covers security concerns with USB drives. Segment two explains the proper use of Pen Testing. Segment three identifies the differences between fact witnesses, character witnesses and expert witnesses. Segment four discusses MD5 Hashes and what is imaged when you forensically image platter hard drives.
Segment One discusses the dangers of MACROS and how to stay safe. Segments two covers mobile security concerns. Segment three discusses the importance of network assessments. Segment four covers the dangers of open shares and network admin safe practices.
Segment One reminds everyone that they are on the front lines and how to stay safe. Segments two and three cover digital forensics and segment four covers some of the duties of network technicians to help keep their networks safe and secure.
Keeping your corporate assets safe from ransomware, intrusions and data theft by educating your employees on how to stay safe online and on the phone. Listen to all of our podcasts to keep up to date with technology, products, security, safe practices and so much more.
Segment One identifies scams that keep occurring and can cause you financial harm and have criminal liabilities. Segment Two discusses features in Video Camera Systems. Segment Three explains why defrag affects the outcome of search hit results. Experts need to know this and identify any issues for their clients. Segment four reminds you that mobile laptops are a target of corporate thieves and identify theft criminals. This is a reminder to get your laptop encrypted today.
Segment talks about how to recover valuable hard drive space. Segment two discusses the importance of identifying duplicates and older files no longer needed. Segment three explains why experts should stay within their field of expertise. Segment four reviews network assessments.
Segment one discusses dealing with failing hard drives. Segment two talks about Axiom forensic software. Segment three explains the difference between a clone and a forensic image. Segment four lays out the importance of dealing with pirated software, music and other digital products.
Segment one discusses locating potential evidence on computers for HR, attorneys and administrators. Segment two talks about searching email with Discovery Attender by SherpaSoftware.com. Segment three covers onsite and offsite backups. Segment four reviews the necessity for documentation, policies, procedures and proper wiring.
Segment one covers security concerns with USB drives. Segment two explains the proper use of Pen Testing. Segment three identifes the differences between fact witnesses, character witnesses and expert witnesses. Segment four discusses MD5 Hashes and what is imaged when you forensically image platter hard drives.
Segment One discusses the dangers of MACROS and how to stay safe. Segments two covers mobile security concerns. Segment three discusses the importance of network assessments. Segment four covers the dangers of open shares and network admin safe practices.
Segment One reminds everyone that they are on the front lines and how to stay safe. Segments two and three cover digital forensics and segment four covers some of the duties of network technicians to help keep their networks safe and secure.
Keeping your corporate assets safe from ransomware, intrusions and data theft by educating your employees on how to stay safe online and on the phone. Listen to all of our podcasts to keep up to date with technology, products, security, safe practices and so much more.