Talk'n Technology

Follow Talk'n Technology
Share on
Copy link to clipboard

Talk'n Technology is the podcast that will keep you current on the various disciplines and methodologies utilized in cybercrime investigations, digital forensics, network secuirty, network assessments and end-user awareness training. This is the one show that your boss will want you to listen to.

John Lucich

  • Dec 25, 2020 LATEST EPISODE
  • monthly NEW EPISODES
  • 30m AVG DURATION
  • 29 EPISODES


Search for episodes from Talk'n Technology with a specific topic:

Latest episodes from Talk'n Technology

End-User Awareness Training - Part II

Play Episode Listen Later Dec 25, 2020 32:12


Make sure you let your colleagues know about this podcast, it could save your company a lot of aggravation, frustration, stress and money. This podcast covers using corporate email for non-work-related activities, webmail attacks, phone scams, web scams, domain name impersonation and so much more. We want as many people to get this information, so we can stop the long line of victims from growing even longer.

End-User Awareness Training - The Number One Weapon Against Ransomware, is Education!

Play Episode Listen Later Dec 24, 2020 34:43


This is the podcast for all your employees. If we don't let our non-technical employees know the risks, we all pose while working on a computer, as well as how to reduce that risk, then it's not a matter of if, but a matter of when we suffer a ransomware attack. Please send a link of this podcast to every colleague, friend and family member. We all need to know this information and have it reinforced from time to time.

Protect your Backups and Make Them Impenetrable to a Ransomware Attack

Play Episode Listen Later Dec 23, 2020 31:19


Hackers are going to encrypt or permanently delete your backups as a part of their ransomware attack. Ransomware has been so successful for them; they have been increasing the ransom to astronomical prices. Get prepared and lock hackers out of your backups, preventing them from destroying your only way to recover. Don't let a click by an end-user destroy your company. A fellow employee might provide a hacker access to the network by clicking on a phishing email, but the hacker will not be able to get to your backups, as long as secure them correctly.

Get Ready for Hacker Armageddon Starting the Holiday Season, December 2020

Play Episode Listen Later Dec 22, 2020 29:26


Ransomware and network intrusions are predicted to be the largest problems for corporations, government agencies, hospitals and schools in 2021. But did you know that hackers typically hit hard during the holidays. Skeleton crews, top management are often off on the holidays and the least experienced people are working during the most crucial times, which means that the network is at its most vulnerable state. Get prepared for the 2020 holiday season hacker attacks and learn how to strengthen your network and use key security features to help prevent disasters and reduce your risk posture. Get prepared and listen to this podcast every weekday. We are going to try to get you ready to survive an attack.

Forensic Linguistics, Audio Forensics, Copyright Infringement and Top Five Network Management Mistakes

Play Episode Listen Later Jun 24, 2020 34:12


Segment One - Forensic Linguistics. Understanding how individuals can be identifed by how they write. Segment Two - Audio Forensics. Understanding authentication and enhancements. Segment Three - Copyright Infringement. Understanding the legal implications and repercusions. Segment Four - Top Five Network Management Mistakes. Learn how to deal with the most common mistakes.

Network Security and Cellphone Forensics

Play Episode Listen Later Jun 24, 2020 38:13


Segment One - Network Security. Segment Two - Network Security Continued. Segment Three - Network Security Continued. Segment Four - Cellphone forensics.

Digital Forensic Cases, Expert Witness Testimony, Network Security Standards, Security Standards Continued

Play Episode Listen Later Jun 23, 2020 39:35


Segment One - Digital forensics and the types of cases you may be involved in. Segment Two - Expert witness, testing results and ethics. Segment Three - Network security standards including physical security of devices and continuous operation. Segment Four - Security standards continued with network design and firewall deployment.

Don’t Click, Computer Security, Phone Scams, Tech Support Scams, Chromebook Forensics, Windows Registry (USBStor) and Imaging Files and Folders

Play Episode Listen Later Jun 20, 2020 36:32


Segment One - Reminding everyone not to click. Reviewing email scams, UAC, Defender, Firewalls and Remote Desktop security. Segment Two - Reviewing phone scams, domain impersonation and tech support scams. Segment Three - Analyzing data from Chromebooks and USB information located in the Windows registry. Segment Four - The difference between imaging a hard drive and imaging files and folders. Brief review of Program Files (x86) folder.

Sources of Evidence, Searching Email, Backups & Network Documentation.

Play Episode Listen Later Jun 18, 2020 27:28


Segment one discusses locating potential evidence on computers for HR, attorneys and administrators. Segment two talks about searching email with Discovery Attender by SherpaSoftware.com. Segment three covers onsite and offsite backups. Segment four reviews the necessity for documentation, policies, procedures and proper wiring.

Cellphone Forensics, Understanding Expert Designation, Overview of Network Security Group and the Limitations of Industry Certifications

Play Episode Listen Later Jun 18, 2020 32:41


Segment One - Cellphone forensics, the costs and limitations. Segment Two - What makes and expert witness an expert. Segment Three - Overview of one of our sponsors, the Network Security Group. Segment Four - What is an industry certification and what value does it bring to experts.

Why we need a full forensic image, what is possible with forensic analysis, adding services for private investigators and basic security

Play Episode Listen Later Jun 17, 2020 37:32


Segment One - We explore why we need a full forensic image. Segment Two - Examples of what information can be retreived during a forensic analysis. Segment Three - How private investigators can add easy to perform computer security analysis to their service offerings. Segment Four - Understanding the basics of remote desktop, virtual private networks and two-factor authentication.

Failing Hard Drives, Axiom Software, Clone vs Forensic Image & Pirated Software

Play Episode Listen Later Jun 16, 2020 26:02


Segment one discusses dealing with failing hard drives. Segment two talks about Axiom forensic software. Segment three explains the difference between a clone and a forensic image. Segment four lays out the importance of dealing with pirated software, music and other digital products.

Drive Geometry (Tracks, Sectors and Clusters), Drive Geometry continued, Downloading and Installing Forensic Workstation Utility and Forensic Imager

Play Episode Listen Later Jun 12, 2020 36:37


Segment One - Understanding drive geometry and the relationship between tracks and sectors as well Cylinders, Heads, Sectors and Logical Block Addressing. Segment Two - Drive Geometry continued. Segment Three - Downloading, installing and using Forensic Workstation Utility, a software write-blocker. Segment Four - Downloading, installing and using Forensic Imager.

Password issues, Assessing Networks, Investigating Cybercrime and End-user Awareness Programs

Play Episode Listen Later Jun 11, 2020 37:40


Segment One - Importance of changing and not caching passwords. Steps to assessing networks. Segment Two - Assessing networks continued, policies and procedures. Segment Three - Investigating cybercrime including ransomware. Segment Four - End-user awareness programs to address email and phone scams.

Understanding Ransomware, Pitfalls and Decryption Process, Forensic Images, Disk Terminology and How not to ruin a forensic case

Play Episode Listen Later Jun 11, 2020 37:28


Segment One - Understanding ransomware, how it works and steps to consider to increase your chances of getting data back. Segment Two - Ransomware continued, pitfalls, decryption process and protecting backups. Segment Three - Forensic images, track 0 and negative tracks. Segment Four - Forensic images continued, MD5 hash and how not to ruin a forensic case.

Scams, Video Cameras, Why Defrag Affects Search Hit Results, Encrypt Mobile Laptops

Play Episode Listen Later Jun 10, 2020 25:32


Segment One identifies scams that keep occurring and can cause you financial harm and have criminal liabilities. Segment Two discusses features in Video Camera Systems. Segment Three explains why defrag affects the outcome of search hit results. Experts need to know this and identify any issues for their clients. Segment four reminds you that mobile laptops are a target of corporate thieves and identify theft criminals. This is a reminder to get your laptop encrypted today.

Recovering Hard Drive Space, Removing Duplicate Files, Experts and Network Assessments

Play Episode Listen Later Jun 8, 2020 26:04


Segment talks about how to recover valuable hard drive space. Segment two discusses the importance of identifying duplicates and older files no longer needed. Segment three explains why experts should stay within their field of expertise. Segment four reviews network assessments.

USB Security, Pen Testing & Digital Forensic Training

Play Episode Listen Later Jun 5, 2020 25:46


Segment one covers security concerns with USB drives. Segment two explains the proper use of Pen Testing. Segment three identifies the differences between fact witnesses, character witnesses and expert witnesses. Segment four discusses MD5 Hashes and what is imaged when you forensically image platter hard drives.

Attachment Safe Practices, Mobile Security Concerns, Open Shares and Network Techs

Play Episode Listen Later Jun 4, 2020 26:45


Segment One discusses the dangers of MACROS and how to stay safe. Segments two covers mobile security concerns. Segment three discusses the importance of network assessments. Segment four covers the dangers of open shares and network admin safe practices.

Computer Security, Digital Forensics and Network Technicians

Play Episode Listen Later Jun 4, 2020 24:41


Segment One reminds everyone that they are on the front lines and how to stay safe. Segments two and three cover digital forensics and segment four covers some of the duties of network technicians to help keep their networks safe and secure.

Keeping Your Corporate Assets Safe Through Education

Play Episode Listen Later Jun 2, 2020 30:22


Keeping your corporate assets safe from ransomware, intrusions and data theft by educating your employees on how to stay safe online and on the phone. Listen to all of our podcasts to keep up to date with technology, products, security, safe practices and so much more.

Scams, Video Cameras, Why Defrag Affects Search Hit Results, Encrypt Mobile Laptops

Play Episode Listen Later Jan 2, 2020 25:32


Segment One identifies scams that keep occurring and can cause you financial harm and have criminal liabilities. Segment Two discusses features in Video Camera Systems. Segment Three explains why defrag affects the outcome of search hit results. Experts need to know this and identify any issues for their clients. Segment four reminds you that mobile laptops are a target of corporate thieves and identify theft criminals. This is a reminder to get your laptop encrypted today.

Recovering Hard Drive Space, Removing Duplicate Files, Experts and Network Assessments

Play Episode Listen Later Jan 2, 2020 26:04


Segment talks about how to recover valuable hard drive space. Segment two discusses the importance of identifying duplicates and older files no longer needed. Segment three explains why experts should stay within their field of expertise. Segment four reviews network assessments.

Failing Hard Drives, Axiom Software, Clone vs Forensic Image & Pirated Software

Play Episode Listen Later Jan 2, 2020 26:02


Segment one discusses dealing with failing hard drives. Segment two talks about Axiom forensic software. Segment three explains the difference between a clone and a forensic image. Segment four lays out the importance of dealing with pirated software, music and other digital products.

Sources of Evidence, Searching Email, Backups & Network Documentation.

Play Episode Listen Later Jan 2, 2020 27:28


Segment one discusses locating potential evidence on computers for HR, attorneys and administrators. Segment two talks about searching email with Discovery Attender by SherpaSoftware.com. Segment three covers onsite and offsite backups. Segment four reviews the necessity for documentation, policies, procedures and proper wiring.

USB Security, Pen Testing & Digital Forensic Training

Play Episode Listen Later Jan 2, 2020 25:46


Segment one covers security concerns with USB drives. Segment two explains the proper use of Pen Testing. Segment three identifes the differences between fact witnesses, character witnesses and expert witnesses. Segment four discusses MD5 Hashes and what is imaged when you forensically image platter hard drives.

Attachment Safe Practices, Mobile Security Concerns, Open Shares and Network Techs

Play Episode Listen Later Jan 2, 2020 26:45


Segment One discusses the dangers of MACROS and how to stay safe. Segments two covers mobile security concerns. Segment three discusses the importance of network assessments. Segment four covers the dangers of open shares and network admin safe practices.

Computer Security, Digital Forensics and Network Technicians

Play Episode Listen Later Jan 2, 2020 24:41


Segment One reminds everyone that they are on the front lines and how to stay safe. Segments two and three cover digital forensics and segment four covers some of the duties of network technicians to help keep their networks safe and secure.

Keeping Your Corporate Assets Safe Through Education

Play Episode Listen Later Jan 1, 2020 30:22


Keeping your corporate assets safe from ransomware, intrusions and data theft by educating your employees on how to stay safe online and on the phone. Listen to all of our podcasts to keep up to date with technology, products, security, safe practices and so much more.

Claim Talk'n Technology

In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

Claim Cancel