POPULARITY
We close out Cybersecurity month with Seth Wolin from Duo and we are talking all things 2-factor
SecureConnection Podcast: IT Security/Security Experts for MSP’s
We continue to hear challenges from IT Service Providers getting their SMB clients to adopt MFA practices. As crazy as it sounds, adding that extra step in the authentication process is just too much to ask. Brian catches up with David Barton, CTO with HighWire Networks and Michael Roth, CEO of EVO Security to discuss making 2 Factor easy to adopt and incorporate into your client's stack. David explains it nicely as the 80/20 rule with MFA taking care of 80% so that you can focus on the harder 20% of active threats.
This episode will help protect your business from losing huge sums of money because of a fake email. Here’s The shocking truth about bank fraud on business accounts: Your COMPANY’S business bank account doesn’t enjoy the same protections as a personal bank account! For example, if someone social engineers your payment team to transfer money out of your business account, the bank is NOT responsible for getting your money back. Many people think CDIC protects you from fraud; it doesn’t. It protects you from bank insolvency, NOT fraud. We call this Business Email Compromise, when fraudsters target a company’s payment team impersonating a contractor, supplier, or creditor or even someone in senior management. The email address will APPEAR to closely match a legitimate email or unknowingly an account may have been hacked. The payment team may think the instructions to pay are real and unfortunately act on it, resulting in the transfer of funds. Business Email Compromise is big business, expected to reach 6 trillion dollars in 2021. Defend yourself against BEC by following this list: Cancel your debit cards; they are the #1 way bank accounts get compromised. Have a dedicated PC or tablet for online banking and DON’T use that PC for accessing any other websites, e-mail access or social media sites, or for downloading files and applications. Carefully scrutinize all email addresses with payment instructions and make sure they are from the right person Verify payment requests and changes to account details using known contact details. Establish other communication channels such as phone calls to verify transactions, and 2Factor look out for unusual changes in business practices, for example getting requests from someone who is normally not involved in the payment process; or a vendor asking for an account number to be changed Sign up for email alerts from your bank whenever a withdrawal over $100 happens. Require YOUR signature for any wire transfers. Have your money spread out in multiple accounts to minimize the risk. Carry Insurance. Today’s episode is with Greg Markell, President and CEO of Ridge Canada Cyber Solutions, a company focused on providing insurance solutions for clients’ cyber and privacy needs. Greg is very well versed on the topic of cyber and privacy liability for public and private organizations. 00:00 - 04:32 Barb’s introduction 04:33- 07:38 Meet Greg Markell 07:39 - 17:35 If your employee is tricked in turning over millions of dollars are you covered? 17:36 - 34:17 What does a cyber policy cover? What does a fidelity policy cover? 34:18 - 40:49 What do you need to have in place to qualify for a cyber policy coverage? 40:50 - 42:47 What’s the most important thing Greg has learned? 42:48 - 46:40 Barb’s extro If you have questions about your IT vulnerabilities, or have any questions, call Barb at 905 542 9759 or visit CDNTechnologies.com.
On this episode I sit down with Fleming Moore and discuss the Covid-19, social distancing, streaming live music, displaced food service workers and so much more! Enjoyed: Captain Lawrence Tears of Green NEIPA Where to find me:Email: craftconversationspod@gmail.com Facebook: https://www.facebook.com/CraftConversations/ Instagram: https://www.instagram.com/craftconversations/ https://www.facebook.com/therealstudio117/ Where to find Fleming: https://www.bummerville.com/ https://www.facebook.com/search/top/?q=fleming%20moore%20songwriter%2Factor&epa=SEARCH_BOX Advertisements:http://www.lulu.com/spotlight/dalesinc https://www.facebook.com/groups/367918800332130/? ref=bookmarks https://lutespropertyservices.com/new/ https://www.instagram.com/lutesconstruction/ http://www.homegrownbrewhouse.com/ Music by:Slayton Johnson of The And's
In today's Modern Digital Enterprise, the digital transformation podcast from Anexinet, Steve and Glenn talk with Takeda Data Security Risk Advisor, Jason Marchant on the most-pressing security issues today's organizations face. This episode also answers the following questions: What are the largest internal security issues facing today's teams? How do we create a Security Scorecard as a path to remediation? How does Anexinet's Policy Characteristics Matrix compare with Scenario-Based Control Requirements? What are some 2-Factor (and multi-factor) Authentication Best Practices? How secure is 2-Factor Authentication, anyway? What are the implications of posting personal data to Social Media (health, etc.), and how responsible are they for protecting that data? Does HIPAA still apply? What are the security determinants for moving to the Cloud? Does the move make a company's data more or less secure? How effective is data-masking? What threats to AES encryption are beginning to emerge? What is the greatest security threat organizations face today? What about the role of AI/Machine Learning/Quantum Computing? How much of a risk do they pose? What are the risks of increased surfaced area (IoT proliferation) and morphing malware? What are Sans Institute's "Top 20 Critical Security Controls"? How does Trust & Verify compare to Zero Trust in terms of Risk-Management Practices? How do you determine your ideal Risk-Management Strategy? Links in the episode: Sans Institute Top 20 Critical Security Controls
This week, in episode 21, we're answering a reader email about whether or not 2-factor ID is really safer or not- or just a hassle. Plus, where can the records of your biometrics go after you've registered them as passwords? We're also delving into the new concept of creating historical markers for famous technology moments in time ("Bill Gates slept here").
Not TOR or ToR but Tor, Freedom Hosting, FBI Malware, Peoples Car blocks Megamos vuln, Research down the drain, new 2-factor for Twitter, Operation Dragon Lady, SEA targets White House, Guccifer hist Powell, U of D, DHS taps McAffee, Ctytek, Op Rehtaeh, Pwnie Express and Ghana
Yahoo Japan, Syrian Electronic Army, Finincial Times, 2-factor won't stop stupid, Aura attacks targeted LE database, Scripps hackers, Operation Hangover, OperationGitmo, OpMarikanaMiners, Akron says attack was perplexing, Attack back, NYPD pays for email attacks, WebSense goes private.