POPULARITY
Hello folks, welcome to the security box, podcast 217. Its been a long time since we did how notes, as NCSAM doesn't necessarily need show notes per see. We've got a great topic on something I blogged and we talked about awhile back about the braille space. No, not the way braille is written as you know it, but a hexidecimal character used to cause havoc. We'll explain on this podcast. Besides that, we're going to have the news, the notes, the landscape, answers to trivia and more. Please feel free to participate. Starting with this podcast, we're going to have our click to call wigit available so you can feel free to use it to call the comment line and leave your message or talk to us, depending on availability. Thanks so much for listening to the program, and we hope you enjoy! The braille space When writing braille, it is no different than writing print. But braille can be written with hexidecimal characters just like other languages using a computer keyboard. We found an article talking about the fact that this braille character is used to actually hide file extensions, amking you think you're opening one type of file, but opening another. On September 16, 2024: Robert Stepp responded to the email I sent him iquiring to the braille space as a character, and he wrote the following. Hi, There is nothing special about a "braille" space. The 0x2800 character is simply a space in the 8-dot braille page of Unicode (three bytes in UTF-8). Apparently 0x2800 is interesting because is shows as nothing but is parsed as non-whitespace. A bogus filename SomeName.pdfxxxxxxxxxxxxxxxxxxxx.hta where x is the braille space, when written to a FileName box (whose length is too short to show the final .hta without scrolling) appears to be a .pdf file when it is actually a .hta (private malware) file. Any Unicode character, not known by Windows controls to be whitespace (space, thin-space, zero-width- space, etc) would work just as well for this visualization spoof. To read the entire blog post including the article which will lead to our discussion, I did not know there was something called a braille space is the article in which I wrote, linking to the article from Bleeping Computer. For those that just want to dive in to the Bleeping computer article, Windows vulnerability abused braille “spaces” in zero-day attacks will be your article. Thanks Bob for your great insite! Its much appreciated. Contacting the podcast If you would like to contact the podcast folk, please use the following info which goes to Jared and can be shared with the rest of the contributors as needed: Email/imessage: jaredrimer@986themix.com or tech@menvi.org which go to Jared. Text or WhatsApp: 804-442-6975 Call the comment line at (888) 405-7524 or use the click to call button located in the show notes. If available, Jared can take your call below. You may also call long distance by calling (818) 527-4754. Supporting the podcast If you'd like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can't do this alone. Internet Radio affiliates airing our program Our Internet Radio stations that carry us include International Friends Radio Network. The program is also carried live through the Independent Channel which is part of 98.6 the mix, KKMX, International. If you want to carry us, please use the Jared Rimer Network site to do that and let me know about your station. Please allow 3-4 hours for airplay, although we try to go 3 hours for this program. Thanks so much!
Sorry for the late release. If I put this up before, I apologize for the inconvenience. We talk about all kinds of stuff including our aforemention topic of social media. We hope you enjoy the program.
2024 NCSAM Week 5 - Cyber Security Hygiene And The Public Sector
Upgrading software is important. But sometimes it may not be so good, and we discuss thoughts as part of NCSAM. Trivia and more on this edition of the program.
2024 NCSAM Week 4 - The Future Of The Cyber Insurance Market
Scams are everywhere. We break down an article we found, talk about the news and the landscape and much more. We hope you enjoy the program.
On this podcast, passwords, password managers, news, notes, multi-factor and more. Thanks for joining!
NCSAM Week 3: Phishing Schemes And Risk Management
NCSAM Week 2: National Cyber Security Awareness Month - What Is It
NCSAM Week 1: Vulnerability Management and Updating Your Software
We're wrapping up NCSAM with a bit of everything. Hope you enjoy.
Welcome to the Security box, podcast 166. On this program, news, notes, the landscape and our thoughts on updating software. Check the blog for all of the latest news we've blogged and remember to subscribe to TSB's email list to get direct articles and comment on things. Supporting the podcast If you'd like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can't do this alone. Internet Radio airings Our Internet Radio stations that carry us include Blue Streak Radio and International Friends Radio Network. The program is also carried live through the Independent Channel which is part of 98.6 the mix, KKMX, International. If you want to carry us, please use the Jared Rimer Network site to do that and let me know about your station. Please allow 3-4 hours for airplay, although we try to go 3 hours for this program. Thanks so much!
Welcome to the security box, podcast 165. We've definitely got at least one stupid moron award, that could be taken in two different ways. Next moron, Twitter, in an interesting move on charging non-paying users for access to twitter $1 a year according to their own twitter notification I saw. The topic this week is going to be on Credit cards, debit cards, online VS offline shopping and what we can do. The Stupid Fuck awards This blog post was written after listening to a program on the Cyber Crime network. It talked about TikTok being sued by Utah because they want children on the app. But we think its more than that. Utah may also get this award as a double whammy because "this is what social media is," says TSB staff and Throwback staff. You be the judge! Next, Twitter Support says that they'll be testing a payment method for those non-verified accounts to pay $1 a year to get access to the service. I forget what country it is, but you can look it up on twitter support's account. If successful, they will bring it elsewhere, and they also could get the stupid fuck award. Good job, guys. Credit cards, debit cards and more The question is, How should we be using credit cards and debit cards online? Let's discuss this and take it much further. Let's discuss what we can do to use this offline as well. Supporting the podcast If you'd like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can't do this alone. Internet Radio airings Our Internet Radio stations that carry us include Blue Streak Radio and International Friends Radio Network. The program is also carried live through the Independent Channel which is part of 98.6 the mix, KKMX, International. If you want to carry us, please use the Jared Rimer Network site to do that and let me know about your station. Please allow 3-4 hours for airplay, although we try to go 3 hours for this program. Thanks so much!
Welcome to the Security Box, podcast 164. Today, we catch up on some erata we did not get to last time in regards to passwords. We've also got the topic of domains and talk a little bit about the different type of domains and their purpose. We also talk about the guide we published on the blog which will also be linked herein. We have stupid moron awards with links to blogs and much more. This is the program that aired live on October 11, 2023. Thanks for listening! The Stupid Fuck award While not necessarily security related, we're going to give out the stupid fuck award to a guy who decides that it is OK to cause problems and who knows what with information they found. Blog post While we're dealing with Stupid Fucks, Air Europa, you're next as a company stupid fuck. My diatribe goes in to details, but suffice it to say, this company says that people should change their credit card info as it may have been pilfered, but says the breach is "medium sevarity." Go figure! blog post Domains The topic this week is going to talk on domains. There are a lot of them, and new TLD's being thought of all the time. This blog post only touches the surface, but we did talk about redirections and stories too. We talk about TLD's that have been known for spam, but of course there's a lot more. We talk about IP addresses as well and why we use domains to get around the net. While not talked about explicitly, this blog post talks about .zip and .shop and their abuse in case you missed it going by. Erata From last week, we talk a bit about credential stuffing and pass phraises. Guides On one of TSB's podcasts, we released a guide to help you as a disabled user who uses a screen reader determine where you're going on the net instead of pressing enter on the "Click here" links you see in spam and phishing. While the blog has a link within our pages, and its linked on EMHS, we want to highlight it again for those who need it. Getting Link information via access technology is the guide, and I want everyone to read it if they haven't read it already. Maybe you'll learn something. Supporting the podcast If you'd like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can't do this alone.
NCSAM Week 4- Utilizing Complex Passwords and Key Cyber Security Controls in Public Entities
NCSAM Week 3- Cyber Insurability and Risk Management
Hello folks, welcome to the Security Box, podcast 163. On this episode, we go through the news, talk about a very interesting interview and then tackle our first topic of NCSA
NCSAM Week 1: Combating Phishing Schemes
As the 2022 National Cybersecurity Awareness Months (NCSAM) unfolds with this years' theme "See Yourself In Cyber", join Mike Storm for 4 segmented episodes of Unhackable as he discusses the key steps for every person to execute this year as standard practice to protect their information and assets. This episode covers the fourth key step - Keeping your System Up-to-Date
Hello folks, welcome to the Security Box. On today's program, besides talking about the beta of EMHS which is still in development, we finally touch on something I tried to cover in earlier podcasts. What is that, you say? That's DomainKeys Identified Mail otherwise known as DKIM. We've been needing to cover this for quite awhile, but I'm not familiar if whether we did, and while other topics we've covered on NCSAM this year we've covered in the past, this one I don't think we did. We also cover the news from the blog and other things on participents minds. I hope that you enjoy the program as much as I have bringing it together for you, and thanks so much for listening! We can't do the show without you.
As the 2022 National Cybersecurity Awareness Months (NCSAM) unfolds with this years' theme "See Yourself In Cyber", join Mike Storm for 4 segmented episodes of Unhackable as he discusses the key steps for every person to execute this year as standard practice to protect their information and assets. This episode covers the third key step - Recognize and Report Phishing.
As the 2022 National Cybersecurity Awareness Months (NCSAM) unfolds with this years' theme "See Yourself In Cyber", join Mike Storm for 4 segmented episodes of Unhackable as he discusses the key steps for every person to execute this year as standard practice to protect their information and assets. This episode covers the second key step - Using Complex Passwords.
Welcome to program 115 of the Security box. Today, we talk about domains and SSL and plenty of news stuff too. The first hour and a half of the over 3 hour program is news related, check the blog for complete details on things or subscribe to the TSB list itself. Some of the stuff we talk about is already on the blog, others are not, but plan to be. As far as domains go, when we talked about Phishing we mentioned the fact that I published several resources on checking whether a domain exists and when it was registered and possibly by who. This was in reference to an article talking about Ian Phishing scams that might be out there now. Please be safe! Here are two resources: ICANN Lookup Who Is Lookup from Network Solutions There are other tools to look up domains, and we can't forget about the ICANN web site and their work to keep domains at least here in the states in good working order. Another thing we talked about but not in great detail is Transport Layer Security which SSL is now known as. We're providing the Wikipedia page as a reference since I didn't go in to a lot of detail on it. If people want me to, I can do that. If we've forgotten something that we should mention as part of this discussion, please send a note and let me know about it. There is always something to talk about in this space, and I can't think of everything, or think it may be too technical. You can always contact me through my web site and I thank each and every one of you for participating this week. See you next week!
On program 238, we feature a two-track album from El Dragon Criollo who has other albums here too. Besides that, we'll talk about NCSAM, what it means, and how you can help teach people about aspects of the internet. Set 1: Mix 5 Spanish 00:08 El Dragon Criollo Sentencia 03:21 El Dragon Criollo La número uno 04:02 Clutter Learning versus Life 08:56 Danny Scott Lane Mirror Spit 03:03 Set 2: Elenniyah Oasis of Stars - Temple Mix 05:47 C Layne Spacesick 05:27 Carey Clayton Big Sky 06:12 Cavalcade Phase of Danger (Lofeye Remix) 05:19 Set 3: Greenleo Generative Exploration II 01:44 Heather Shannon Cradle 02:50 Ian Boddy Requiem For The Fallen 59:40 Set 4: Cfcf Invitation To Love 05:56 Earlyguard Light 07:29 Lauge Pine Trees Covered in Fog 05:24 Lauge Cityscape 03:57 er go The Mist Itself Breathes 1:01:57 This completes the program folks, hope you ejoy it!
Welcome everyone to the Security box, podcast number 114 on the technology podcast series. On this podcast, we cover some of the news from around the landscape, and then we start NCSAM. What is NCSAM you ask? It stands for National Cyber Security Awareness month, and various countries call it something different, and may cover different things. On week 1, which officially starts on October 1, we talk about passwords. Besides learning about 10 passwords that you should probably not use, the artivle we take from takes this in to aidifferent demention, covering different categories like food and drink, curse words, sports and more. The article is titled Most common passwords: latest 2022 statistics and it comes from Cybernews. Looks like they did a great job with it! We hope you enjoy the program, and thanks so much for listening!
As the Annual National Cybersecurity Awareness Months (NCSAM) unfolds with this years' theme "See Yourself In Cyber", join Mike Storm for 4 segmented episodes of Unhackable as he discusses the key steps for every person to execute this year as standard practice to protect their information and assets. This episode covers the first key step - Using Multi Factor Authentication.
ShadowTalk host Chris alongside Kim and Xue are covering the key takeaways from this year's NCSAM and share several best-practice pieces released by the security experts at Digital Shadows throughout the month including: * Managing Your Digital Shadow * Phight the Phish * Putting Cybersecurity First ***Resources from this week's podcast*** Managing Your Digital Shadow: https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-1-managing-your-digital-shadow/ Phight the Phish: https://www.digitalshadows.com/blog-and-research/week-2-ncsam-fight-the-phish/ Explore, Experience, Share: https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-3-explore-experience-share/ Putting Cybersecurity First: https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-cybersecurity-first/ ENISA 2021 Threat Landscape: Initial Thoughts https://www.digitalshadows.com/blog-and-research/enisa-2021-threat-landscape/ IABs in Q3 2021: https://www.digitalshadows.com/blog-and-research/initial-access-brokers-in-q3-2021/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don't forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.
Welcome to the Security Box, podcast 68. On this edition of the program, let's talk about social media and phone line issues as it relates to cyberbullying and other related topics. We'll also have news, notes and more. Social Media discussion In a very interesting turn of events, I wasn't necessarily going to put anything in to this section because I was going to do a full vocal discussion. But when I saw my own digest on my blog, I saw a very interesting post dealing with Social Media and other things related that I'll link here. I'll still do vocal talk with no notations, but this post is worth bringing up. , Don't miss what's happening People on Twitter are not the first to know. The Technology blog and Podcast's Shaun Everiss News Notes Zales.com Leaked Customer Data, Just Like Sister Firms Jared, Kay Jewelers Did in 2018 Krebs On Security 'Cyber event' knocks dairy giant Schreiber Foods offline amid industry ransomware outbreak Cyberscoop A Russian-speaking ransomware gang says it hacked the National Rifle Association Cyberscoop We hope you enjoy the program, and thanks for listening!
Welcome to Week 4 of NCSAM. This week, we're going to cover protecting your children online. Notations are taken from a presentation I heard about the topic, and I've summarized it to tell possibly some stories that may be similar to something you've heard or seen. We'll also have news, notes and other comments as the program gets started. Protecting Our Children online Protecting your kids online. Including topics like grooming, cyberbullying and more. News Notes The following are some of the items that have been read within the past week. Feel free to read the ones that are of interest to you. FBI, others crush REvil using ransomware gang's favorite tactic against it Ars Technica PurpleFox Adds New Backdoor That Uses WebSockets Trend Micro Sinclair Broadcast Group suffers ransomware attack, the latest affecting media Cyberscoop Candy corn producer says ransomware incident 'not likely' to sour Halloween supplies Cyberscoop Conti Ransom Gang Starts Selling Access to Victims Krebs On Security I'll try and blog some of this older news we've got, so stay tuned. Hope you enjoy the show!
National Cybersecurity Awareness Month (NCSAM) is October! In this special week 4 of 4 (the finish line!) of NCSAM episode we are speaking to consumers and individuals about social media security. A lot of security professionals have zero social media presence, but that's not the reality for most people. You can engage without undertaking high risk. And being respectful of the privacy and security others in your posts and feeds. Listen in and join us!
This is a double special Talos Takes episode — it's XL-sized and continues our Cybersecurity Awareness Month theme. This is a recording of our live stream from earlier this week with Brad Garnett, the general manager of Talos Incident Response. Even if you've never worked with an incident response team before, or have no idea what IR is, this is a perfect place to start. We provide the tl;dr of the IR process, talk building an IR plan and answer audience questions.
National Cybersecurity Awareness Month (NCSAM) is October! In this special week 3 of 4 of NCSAM episode we are speaking to consumers and individuals about passwords - those security things we all love to hate. But still, we have to protect them. Greg and Bill talk about some ways to make them easier to manage, and how to choose them. We also say the word entropy a lot, because it makes us sound more serious.
We continue our special series for National Cybersecurity Awareness Month by addressing everyone's worst nightmare: phish. Who among us hasn't gotten the call, “We're trying to reach out about your car's extended warranty?” In this Talos Takes, Jaeson Schultz, Talos' foremost spam and phish expert, breaks down spam emails, phone calls and messages for any user. We discuss new trends we're seeing from attackers in 2021, talk about the best software solutions available and give advice to Jon's 77-year-old grandmother.
A few technical issues, but what is a show without those? In this 3 hour episode, we've got quite a lot for you, so sit back and check out the links to the following items for your perusal. Welcome to the Security Box, podcast 65. On this podcast, let's discuss an article we read after the release of last week's program in regards to Twitch and their recent breach we were alerted to during the live taping of the program. After that, we're going to cover more NCSAM and even have some news notes. We'll do news notes the same as we did last week, as it turned in to a lively discussion. I hope you'll enjoy the program, and thanks so much for listening! Breach topics Stolen Twitch source code, creator payment data revealed in apparent data leak Cyberscoop Trolls defaced Twitch's website with pictures of Jeff Bezos, the latest security concern Cyberscoop NCSAM: Scam apps Hundreds of scam apps hit over 10 million Android devices Ars Technica News Notes read from around the landscape Electronic Frontier Foundation will deprecate HTTPS Everywhere plugin Ars Technica Company that routes SMS for all major US carriers was hacked for five years Ars Technica Former TD Bank, Bank of America employee allegedly helped email scammers launder money Cyberscoop Suspected Chinese hackers masqueraded as Indian government to send COVID-19 phishing emails Cyberscoop
National Cybersecurity Awareness Month (NCSAM) is October! In this special week 2 of 4 of NCSAM episode we are speaking to consumers and individuals about device security. All your phones, TVs, and routers and such. protect yourself, and not just this month.
We are from the first (or last) people to say this, but 2021 is the year of ransomware. It's by far the biggest story on the security landscape right now. And everything from oil pipelines, to grain co-ops, to hospitals and schools have been targeted by ransomware this year. Azim Khodjibaev joins the show for National Cybersecurity Awareness Month to wrap up everything we've seen on the ransomware landscape this year. Azim reflects on his interview with a LockBit operator, the research he's done into “double extortion campaigns,” and discusses the lessons defenders can learn from the past 10 months.
NCSAM is now in full swing, this week, Are You Cyber Smart? A Checklist from Lastpass will be what you need to look at with 5 great tips and things that might be of interest to you. In my writeup of this, I talked about the Neiman Marcus breach and how people should be aware of it even if they aren't affected. We'll have news, notes and more. Hope you'll enjoy the show! News Notes Police raid in Ukraine results in arrests of 2 alleged ransomware hackers Cyberscoop The Rise of One-Time Password Interception Bots Krebs On Security Thanks so much for reading and participating in the show!
National Cybersecurity Awareness Month (NCSAM) is October! In this special week 1 of 4 of NCSAM episode we are speaking to consumers and individuals about surfing (the web) safely.
Everyone loves to talk and write about how tough it is that we are all working remotely during the COVID-19 pandemic. So for once — to celebrate National Cybersecurity Awareness Month — Talos Takes wants to talk about the positives! Christopher Marshall, the head of Talos' detection research team, joins the show to discuss how he's kept his team's morale up during this time. Cybersecurity is a rough industry to be in, regardless of any external factors. So it's important for him to avoid employee burnout and turnover. He and Jon also discuss the positives of working remotely, what they're most looking forward to when they can go back into the office and their favorite pandemic-era hobbies.
Welcome to podcast number 63 of the Security Box series. On this podcast, come and learn about the password trends of 2021, thanks to lastpass's article. Next, a 5.9 million dollar ransomware paid by a farming co-op and a very interesting discussion I heard recently about this. We'll definitely have some news and notes from around the landscape, and even some commentary from any guests that participated through Clubhouse on the live program as well as anyone else through email, imessage and other contact points. Topics New Report: 2021 Psychology of Passwords Lastpass $5.9 million ransomware attack on farming co-op may cause food shortage Ars Technica Phone scammers use COVID-19 vaccine appointments to try tricking victims into downloading malware Cyberscoop Nation-state espionage group breaches Alaska Department of Health Ars Technica Hackers are using CAPTCHA techniques to scam email users Cyberscoop Apple users warned: Clicking this attachment will take over your macOS Ars Technica Thanks so much for listening to today's program, and we'll be back for a month of NCSAM. Enjoy!
Hosted by Dominique, Security in Color is a podcast delivering the top national and worldwide cybersecurity news in a modern and digestible format. New episodes on Tuesdays and occasional Thursdays. ******* This week on Security in Color I discuss: CSAM Wrap up Summary Donald Trump Campaign Website Hijack Pharmaceutical COVID-19 attack Mental Health Attacker FB MFA Scams More Information To support the platform and get exclusive content, join our patreon community here: https://www.patreon.com/securityincolor Join our cyber mailing list: https://bit.ly/sicsubscribe Visit our website: www.securityincolor.com Follow us on social media (@securityincolor, @domyboo)
"We've combined three years of cybersecurity conversations, 20 episodes to choose from, all via just ONE link". (131). Because it's Cybersecurity Awareness Month 2020, we've put together a special playlist of 20 cybersecurity-focused episodes. Find them by clicking on this link: CyberSec20 Resources. Use these links to find out more about this topic, or to access free guidance and resources to implement in your own team or organisation. Browse your dedicated cybersecurity episode playlist at CyberSec20. Find technology and cybersecurity resources for CPAs at CPA.com. Discover how Cybersecurity Month is being marked in the USA as "NCSAM", and the EU as "ECSM". Visit dedicated coronavirus online resource centres for our AICPA and CIMA networks. Share. Know someone who should hear this podcast? Click on these links to automatically share this episode with colleagues and friends. Recommend it to your LinkedIn connections, send to Twitter, auto-share on your Facebook page, or simply tell someone via email. Social. Use #GoBeyondDisruption, @AICPANews or @CIMA_News. About Our Podcast. These conversations with expert guests are recorded by different members of the AICPA & CIMA team from our offices around the world. While the sound quality may vary, we hope that the insights will be consistently useful. Get in touch. How did you discover our podcast? Where do you listen? What would you like to hear more of? Finance pro or not, we're keen to know what you think. Email us here. ©2018-2020 Association of International Certified Professional Accountants (AICPA & CIMA)
In this episode, Erich and Javvad are joined by Thom Langford from (TL)2 Security, who somehow got us to refer to him as a sponsor. I think Javvad is taking bribes now. The important and valuable parts of this episode are our chats about National CyberSecurity Awareness Month (NCSAM) and ways to make your programs work well and about MFA. Thom and Erich offer great advice while Javvad just nods his head.
We get to week 3 of #BeCyberSmart NCSAM. We had no idea when we made this plan that OCR would start dropping settlements at the same time. After a pretty quiet year they announced more settlements in September than they ever had in a single month before. Again, we have a lot to review! Reminds me of one of my favorite movie quotes: “Life moves pretty fast. If you don't stop and look around once in a while, you could miss it.” Ferris Bueller More info at HelpMeWithHIPAA.com/276
Shay Trembley, Information Security Manager of South Blount Utility District, and I finish up the remaining 4 "P's of Basic Cybersecurity" - a timely topic in recognition of National Cybersecurity Awareness Month (NCSAM). We address passwords, privacy, patching, and protection, and include several of our personal favorite resources for cybersecurity awareness for everyone. Shay's final tip: she encourages everyone to speak up and share information. The more everyone shares information about the cyber threats and risks, or even suspected threats and risks, the better we will all be informed and #BeCyberSmart. In recognition of NCSAM, we individually listed a ton of resources to help businesses and individuals to #BeCyberSmart: https://staysafeonline.org/, including National Cybersecurity Awareness Month and other NCSA resources https://www.sba.gov/ https://www.cisa.gov/ https://www.cisa.gov/information-sharing-and-awareness(for more on Information Sharing and Analysis Centers) https://krebsonsecurity.com/ https://paper.li/gate15#/ https://www.sans.org/security-awareness-training/ouch-newsletter https://cybercrimesupport.org/ https://fraudsupport.org/ https://cyberreadinessinstitute.org/ https://www.idtheftcenter.org/ https://haveibeenpwned.com/ https://www.ic3.gov/ https://stopthinkconnect.org/
"This is a very significant step for the profession; it's a LEADERSHIP step." (130). What's the security value of a name? CPA.com CEO Erik Asgeirsson outlines the many security and branding benefits of .cpa, a new top-level domain for the finance and accounting profession. Talking Points. These are just some of the topics discussed in this episode. what a top-level domain is. why it's been developed. who'd find it useful. the benefits to members of the accounting and finance profession. its cybersecurity value, especially in assurance, credibility and verifiability. Our Guest. Erik Asgeirsson has been President and CEO of CPA.com for the past fifteen years and was part of the original founding team. Under his leadership, CPA.com has established itself as a leader on emerging technologies and as a key solution provider to accounting firms in the United States, with a growing global focus. Erik also led the creation of RIVIO, a private company financial information clearinghouse, and is overseeing the launch of .cpa, a new top level domain for the profession. Before joining CPA.com, Erik held a variety of positions over a ten-year period at AT&T in business development, operations, and product management. He holds an MBA in Finance from The New York University Stern School of Business and a B.S. in Electrical Engineering from George Washington University, where he was elected to the Eta Kappa Nu engineering honour society. Connect with him at www.cpa.com/speakers/erik-asgeirsson Resources. Use these links to find out more about this topic, or to access free guidance and resources to implement in your own team or organisation. Learn more about .cpa at domains.cpa. Find technology and cybersecurity resources for CPAs at CPA.com. Discover how Cybersecurity Month is being marked in the USA as "NCSAM", and the EU as "ECSM". Visit dedicated coronavirus online resource centres for our AICPA and CIMA networks. Share. Know someone who should hear this podcast? Click on these links to automatically share this episode with colleagues and friends. Recommend it to your LinkedIn connections, send to Twitter, auto-share on your Facebook page, or simply tell someone via email. Social. Use #GoBeyondDisruption, @AICPANews or @CIMA_News. About Our Podcast. These conversations with expert guests are recorded by different members of the AICPA & CIMA team from our offices around the world. While the sound quality may vary, we hope that the insights will be consistently useful. Get in touch. How did you discover our podcast? Where do you listen? What would you like to hear more of? Finance pro or not, we're keen to know what you think. Email us here. ©2018-2020 Association of International Certified Professional Accountants (AICPA & CIMA)
Our commitment to include #BeCyberSmart each week this month did not anticipate that OCR would set a record for resolution announcements in September. This week we give you info to plan for next week’s activities for NCSAM plus a review of the Athens Orthopedic resolution agreement. A lot to cover! More at HelpMeWithHIPAA.com/275
The show notes are not lengthy this time, that is because we don't have a whole lot for them. Yes, news notes was covered, yet, we have some interesting discussion. Below, please find the show notes. Welcome to podcast 13 of the technology blog and podcast series known as the Security Box/. On this episode, we are going to cover NCSAM, week 1. The big thing now a days are your security and identity protection when it comes to your online safety. The first article Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis is discussed in a taped segment. Speaking of identity, Preston from Pensylvania is going to be on with an interview that I did with him talking about experience, stories, and the like. We'll also cover some news if time allows. Please make sure that you tune in to the blog web site for all of the news, as NCSAM will be busy and lots of items will be posted. You may want to decide to subscribe so you don't miss anything. Thanks for listening!
"You do have to be equipped to ask enough of the RIGHT questions." (129). October is Cybersecurity Month in the EU and the USA, so all month we'll be sharing episodes about IT risks, threat-mitigation and security strategies. The founder and CEO of NMGI, our guest Randy Johnston is recognised as a Top 25 thought-leader in accounting and technology. Hosted by Kacee Johnson, Strategic Advisor at CPA.com (the business and technology arm of the AICPA), this conversation with Randy introduces the concept of 'shadow IT'. Talking Points. These are just some of the topics discussed in this episode. Definition of "Shadow IT". The increased risks associated with the decentralised and remote workforces which are the new normal for business. How to identify risks. Best practices to minimise potential threats. Our Guest. Randy Johnston is a veteran technologist with almost 40 years' experience guiding accounting firms and businesses to select the most appropriate technology tools, manage security, and optimise systems. Recognised as a Top 25 thought-leader in accounting and technology, he's regularly featured in Accounting Today's list of the Top 100 Most Influential People in the profession. Connect with him at www.randyjohnston.com. Resources. Use these links to find out more about this topic, or to access free guidance and resources to implement in your own team or organisation. Find technology and cybersecurity resources for CPAs at CPA.com. Randy's additional suggestion for further help. Discover how Cybersecurity Month is being marked in the USA as "NCSAM", and the EU as "ECSM". Visit dedicated coronavirus online resource centres for our AICPA and CIMA networks. Share. Know someone who should hear this podcast? Click on these links to automatically share this episode with colleagues and friends. Recommend it to your LinkedIn connections, send to Twitter, auto-share on your Facebook page, or simply tell someone via email. Social. Use #GoBeyondDisruption, @AICPANews or @CIMA_News. About Our Podcast. These conversations with expert guests are recorded by different members of the AICPA & CIMA team from our offices around the world. While the sound quality may vary, we hope that the insights will be consistently useful. Get in touch. How did you discover our podcast? Where do you listen? What would you like to hear more of? Finance pro or not, we're keen to know what you think. Email us here. ©2018-2020 Association of International Certified Professional Accountants (AICPA & CIMA)
While the podcast is an hour, I know that I want to do more with the tech podcast in all kinds of tech not just the security landscape. In this podcast, I think I have covered a bit, even talking about some stuff in a different light unlike the Security Box. Here are the show notes. Welcome to podcast 353 of the technology podcast. NCSAM is out now, its the month of October and its definitely going to be an interesting month. Our first segment talks about the fact that identity theft may be more of a problem now more than ever. blog post KNFB reader was intigrated in to newsline. People were griping about it on Apple Vis, and may have been in social media as well. I looked at the app one day, and I find it quite interesting but still easy to use. They griped because they had to reverify their info, otherwise known as reauthenticate. KNFB Reader lite works well, and I am glad I have choices. blog post Michael in Tennessee taught me about Google and pairing to bluetooth devices. While I told my phone to forget the device, I had to go back in to google and get it repaired as I tried to demo how I got it to work. Be that as it may, this was kind of cool. Thanks Michael for this! On a prior podcast, we covered SSL and what is happening with threat actors today. I intend to write a blog post with my thoughts, but the Security Box definitely covered this. Podcast 12 of the box covers this in a talk show format, but I figure it should be covered here for those who don't want the longer program. Tell me what you think. The full program lasts an hour, so I hope you'll enjoy it. Thanks for listening! See you on another edition of the program.
To kick off the month of October and the National Cybersecurity Awareness Month (NCSAM), I was fortunate to speak to Daniel Eliot of the National Cyber Security Alliance (NCSA). Daniel is the Director of Education and Strategic Initiatives for the NCSA. Since this conversation took place during the kickoff of NCSAM, I took the opportunity to ask Daniel about the purpose behind the month, the activities, themes, and importance of being cyber smart. Daniel's Bio: In this role, Daniel is responsible for NCSA's educational portfolio, and helms one of NCSA's most successful initiatives, CyberSecure My Business, which is a national program designed to help organizations of all sizes learn to be safer and more secure online. Daniel assembles the federal government, state and local governments, academia, and the private sector to discuss cutting-edge issues and create and implement high-quality, large-scale education and awareness efforts. Daniel is an accomplished speaker and champion when it comes to cybersecurity, and regularly speaks at events across the country and collaborates on regional and national cybersecurity initiatives. Social Media: Twitter & Facebook: @StaySafeOnline Links: NCSA: https://staysafeonline.org/
The first week of National Cybersecurity Awareness Month (NCSAM) 2020 is next week. The theme: If You Connect It, Protect It. How can you use it in your organization? We cover that plus OCR’s 5 resolutions in one announcement reiterating their commitment to patient access rights. For more info: HelpMeWithHIPAA.com/274
Hosted by Dominique, Security in Color is a podcast delivering the top national and worldwide cybersecurity news in a modern and digestible format. New episodes on Tuesdays and occasional Thursdays. ******* This week on Security in Color I discuss: National Cybersecurity Awareness Month! NCSAM takes place every October and Security in Color will be releasing weekly episode corresponding with this year's theme: “Do Your Part. #BeCyberSmart.” Be sure to follow along! More Information To support the platform and get exclusive content, join our patreon community here: https://www.patreon.com/securityincolor Join our cyber mailing list: https://bit.ly/sicsubscribe Visit our website: www.securityincolor.com Follow us on social media (@securityincolor, @domyboo)
Featuring: Jessica A. Mertz | Executive Director, Clery Center Bill Mitchell | Board Member, Clery Center and author of When Dating Hurts Jessica converses with author and advocate Bill Mitchell as he shares the inspiration for his new book When Dating Hurts. Bill will discuss one of the other health crises the global pandemic brought to light in 2020- intimate partner violence.
We missed the boat on National Insider Threat Awareness month in Sept: Insider Threat Mitigation but we are not going to miss NCSAM this year. Do Your Part. #BeCyberSmart and If You Connect It, Protect It. are going to be all over the place here in October. More at HelpMeWithHIPAA.com/273
Featuring: Sarah F. Barrett | Director of Training & Education, Clery Center Ruth Perrin | Senior Counsel for the Campus Violence Project, Network for Victim Recovery of DC Naida Henao | Managing Counsel for Strategic Advocacy & Communications, Network for Victim Recovery of DC Join us as we sit down with Ruth Perrin and Naida Henao from Network for Victim Recovery of DC (NVRDC) to discuss how intersectionality plays a role in their ability to deliver culturally-safe and equity-informed services.
Featuring: Sarah F. Barrett | Director of Training & Education, Clery Center Jessica A. Mertz | Executive Director, Clery Center Sarah and Jessica discuss how the historic events of 2020 can guide conversations about personal and campus safety. Although the same obligations under the Clery Act apply, our campus communities must embrace the differences. This year has brought many new challenges and lessons, and yet the goals of campus safety remain the same. Join us as we examine how much of the work we do is the same, yet different this year.
National Campus Safety Awareness Month September is National Campus Safety Awareness Month and each year Clery Center provides professional development resources and learning opportunities to support your work on campus. Learn more about this year's theme and connect to this year's resources below. The Same, Yet Different In the wake of COVID-19 and an advancing civil rights movement, institutions around the nation are reaffirming their commitments to campus safety. As communities wrestle with a new normal, the Clery Act remains the same— a call to action. This September, Clery Center will highlight how the Clery Act can serve as a guidepost, centering conversations around personal and campus safety following the historic events of 2020. Whether examining the increase in reports of intimate partner violence during lockdown, or the uptick in hate crimes and bias-related incidents, the Clery Act can serve as the barometer to examine campus climate. There is little doubt that 2020 will go down in history. So, please plan to join us this September to explore the Clery Act's continued relevance as we enter a fall semester that will be the same, yet very different.
All week, I'm talking about Cybersecurity Awareness Month -- and how IT companies in the US can leverage this event in your marketing. Today's suggestion? Use your newsletter! If it's too late for the October issue, there's no reason you can't talk about cybersecurity in November, right? A few ideas: 1. Free cybersecurity resource - leverage vendor content for reports, infographics or facts/figures that you can repurpose, or create your own FAQ document 2. Write an article - LOTS of different topic ideas: current events, phishing, MFA 1. Offer a free cybersecurity resource. Leverage vendor content for free reports or infographics. Or create your own infographic. 2. Write an article! Highlight a recent hack and explain how it pertains to your small business clients. Talk about phishing, how to spot it, and best practices. Educate your readers on multi-factor authentication. Be sure to make this small business friendly, and share real world examples with your readers. #cybersecurityawarenessmonth, #msp, #msps, #mssp, #mssps, #itsupport, #itsecurity, #infosec, #infosec101, #ransomware, #cyber, #cybersecurity, #cyberattack, #education, #technology, #hack, #informationsecurity, #cybersecurityexpert, #smallbusiness, #endpointsecurity, #NCSAM, #BeCyberSmart, #cybersecuritysherpa
In the continued effort to piggyback off of the press that Cybersecurity Awareness Month is bound to receive, what is another marketing idea you should implement? Schedule risk assessments! Utilize a simple "email plus call" campaign to offer risk assessments to your small business clients and prospects. Remember to explain in plain, non-technical language exactly what weaknesses you discovered and what those weaknesses mean to their business (financially, operationally, and to their reputation.) #cybersecurityawarenessmonth, #msp, #msps, #mssp, #mssps, #itsupport, #itsecurity, #infosec, #infosec101, #ransomware, #cyber, #cybersecurity, #cyberattack, #education, #technology, #hack, #informationsecurity, #cybersecurityexpert, #smallbusiness, #endpointsecurity, #NCSAM, #BeCyberSmart, #cybersecuritysherpa
Here's another way to educate your clients and prospects, especially in light of National Cybersecurity Awareness Month: social media. I don't just have THREE tips for you today; I have a whole list of ideas for you! Make sure your content is a nice mix of educational and engaging/fun. Use your best judgement to decide what content to share in each channel, but here's a list to get you started: - Memes - Cartoons - Infographics - Free reports - Risk Assessment offer - Invitations to an upcoming event (lunch & learn, webinar, or seminar) - Poll your audience! - Shout out to a client - FB lives - Stats #MSPMarketing, #mspchannel, #itchannel, #cybersecurityawarenessmonth, #msp, #msps, #mssp, #mssps, #itsupport, #itsecurity, #infosec, #infosec101, #cyber, #cybersecurity, #cyberattack, #education, #technology, #hack, #informationsecurity, #cybersecurityexpert, #smallbusiness, #endpointsecurity, #NCSAM, #BeCyberSmart, #cybersecuritysherpa
How to leverage Cybersecurity Awareness Month: Idea number 5: Infographics. Spend a few hours to get at least one created. Three steps to get this task accomplished: 1. Pick a topic - lots to choose from! (Social engineering, phishing, etc.) 2. Brainstorm some ideas to include on your infographic: Stats, definition, examples, trends (what are you seeing today vs 5 years ago,) tips, implications to the business. 3. Talk to a designer and get it created! #MSPMarketing, #mspchannel, #itchannel, #cybersecurityawarenessmonth, #msp, #msps, #mssp, #mssps, #itsupport, #itsecurity, #infosec, #infosec101, #ransomware, #cyber, #cybersecurity, #cyberattack, #education, #technology, #hack, #informationsecurity, #cybersecurityexpert, #smallbusiness, #endpointsecurity, #NCSAM, #BeCyberSmart, #cybersecuritysherpa
Welcome to podcast 329. How can we keep ourselves as safe as possible when databases that companies hold them online? I completeluy understand the aspect of why they need to do so. It isn't possible for them to store it like I do, and its just becoming a problem. A telecom company breached, mongo DB to blame is the blog post referencing this segment. National Cyber Security month is now complete. Why? In this ever changing landscape where everything is online must we have only one month to teach how to be as secure as possible? Please check out my blog post penning this topic: NCSAM is over, shall we stop teaching for my written thoughts on this important topic. Its something we should be discussing, and we should be discussing it all the time. I found an article through dark reading, and instead of covering that, I think we should try to discuss it in a different light whereby we ask how consumers can be safe in this time of major security problems. It isn't just the entity that we shop at that should be the main problem, it is in both things. Merchants need to fix their security, but shoppers need to be careful and some tips are discussed on what we can all good. Dice world has some interesting updates and I tie that in to other games and the accessibility landscape. There is always something to learn and I'm happy to see what happens as we continue to grow. Michelle Dyer was a dear friend of mine. I let the domain go because I was under the assumption that the domain was not needed. Family contacted her closest friend, contacted me, and I've relaunched the domain on October 31st. Due to some other technical issues I could not fix, the domain is now relaunched and I only made some changes to clean some outdated info. Please click on this link to go to the Michelle Dyer Memorial page where you'll find tech podcasts to download that she was a part of. We thank each and everyone for your continued support of my work. The track I selected for this podcast comes from the artist Ehren Starks from the depths of a Year. Contact information is also available at the end of the program. Thanks so much for listening!
Hi folks, welcome to podcast 328. Transportation: can we use something like Navi Lens in conjunction with apps like transit app, Go Metro, or other apps to get us around by bus or train? Making The Smart Bet On Cybersecurity Whats going on with web threats? The October webinar by Trend Micro Protecting Our Children Online Contact info I hope you enjoy the program.
Welcome to podcast 327 for October 27, 2019. What do you think about giving out or phone numbers? I'm not talking about business, I'm talking about phone numbers for personal use. I heard this on a telephone line on a bulletin board, and got to thinking. VPN services is the next topic. I'm looking at express vpn as they were talked about on a prior post on the blog through tech warm. My thoughts are on this one. I'm putting a feeler out there. On this third segment, I'm curious on your thoughts on the braille transcription course as a whole. I know I have had some struggles, but i'm curious on other people who have taken the course or are still taking it with me. Contact me by email for a phone call, as I'd like to discuss it with you. Cachet Financial Reeling from MyPayrollHR Fraud is the next segment and the article is linked here. What an interesting story here. Best Practices for Defanging Social Media Phishing Attacks is the final segment and lots of terms given here and info. This could be put under the NCSAM category as the cyber security awareness month is coming to an end. Please feel free to contact me on the podcast contact info given, and I look forward in hearing from you!
First up, Dr. Rick Spinrad, President of the Marine Technology Society, will be in Honolulu this Thursday and Friday 10/17 &10/18. MTS is an international, not-for-profit, community of ocean engineers, technologists, policymakers and educators. The former Chief Scientist for the National Oceanic and Atmospheric Administration, or NOAA, will be speaking at a dinner meeting at … Continue reading "Episode 581: NCSAM + Hydrogen Cars – Oct 16, 2019"
First up, Dr. Rick Spinrad, President of the Marine Technology Society, will be in Honolulu this Thursday and Friday 10/17 &10/18. MTS is an international, not-for-profit, community of ocean engineers, technologists, policymakers and educators. The former Chief Scientist for the National Oceanic and Atmospheric Administration, or NOAA, will be speaking at a dinner meeting at … Continue reading "Episode 581: NCSAM + Hydrogen Cars – Oct 16, 2019"
On this podcast, Jaws and firefox's latest version. NCSAM should be all the time, yes or no? We've got a braille transcription update, and Dice World has a new layout.
This week I was fortunate to be interviewed by Terri Stacy of WIBC here in Indianapolis. Terri invited me on her show to talk cyber safety and the NCSAM.
Welcome to the technology blog and podcast. Doordash is the latest major breach, lots of coverage on it. It happened between the release of 324 and now. Is this the beginning of the end? Here is the blog post on it. There is some commentary left by Joseph. We'd love to hear more on what you have to say, so please leave thoughts on segments. Password managers and phone calls is the third segment as we start NCSAM. Here is the blog post on phone numbers which should be really discussed. JHere is the blog post on password managers as well. Scott Schober wrote a new book. Here is the blog post on this book. I talk about chapter 3 specifically, and my thoughts on it, as it did hit home for me. Finally, I've got a braille transcription update as I continue to struggle with assignment 15. I think I'm almost there! Thoughts? My contact information is available at the end of the program, and thanks for listening.
Happy October everyone and welcome to National Cybersecurity Awareness month. This year's theme is Own it, Secure, it, Protect it. NCSAM is in its 16th year and is supported by US-DHS, the National Cybersecurity Alliance, multiple state and local governments and the private sector. My company Iuvare Cyber, which supports this podcast is a NCSAM Champion for the second year in a row. This whole month is meant to raise awareness of the importance of cybersecurity. I will talk a bit more about NCSAM after bit. There were some troubling stories that I came across this past week from the US and from the EU about government bodies and individuals in government pushing social medial companies specifically Facebook and Twitter to delete “offense” posts about government officials and political parties to suspend a political rivals account. This is a dangerous and slippery slope that we are facing. In my opinion it is a dangerous if not more dangerous than what the democrats are accusing Trump of doing with the Ukraine's. [Links] https://thehill.com/policy/technology/464161-top-eu-court-rules-that-facebook-can-be-forced-to-remove-some-material https://thehill.com/homenews/campaign/463952-harris-presses-twitter-to-do-something-over-trumps-coup-tweet https://thehill.com/homenews/campaign/464006-harris-spokesman-points-to-gabbard-pushback-on-call-to-suspend-trump-on https://thehill.com/policy/technology/463856-dnc-accuses-facebook-of-allowing-trump-to-mislead-american-people NCSAM Links https://staysafeonline.org/ncsam/themes/ https://staysafeonline.org/ncsam/get-involved/ https://niccs.us-cert.gov/national-cybersecurity-awareness-month-2019 https://staysafeonline.org/ncsam/about-ncsam/
An In The News Podcast on ITSPmagazine With Sean Martin and Marco Ciappelli Guests: - Kelvin Coleman - Angel Grant Guess what time it is … It’s National Cybersecurity Awareness Month (NCSAM)! It happens every year. And this year marks the 16th anniversary of the initiative. So, what is NCSAM, you ask? We’re glad you did. Initially launched by the National Cyber Security Alliance & the U.S. Department of Homeland Security in October 2004, here’s what this year’s program is about: "Under the overarching theme of ‘Own IT. Secure IT. Protect IT.’, the 16th annual National Cybersecurity Awareness Month (NCSAM) is focused on encouraging personal accountability and proactive behavior in security best practices, digital privacy and draw attention to careers in cybersecurity." Of course, a lot is going on this month, and we wanted to get the inside scoop from the team at NCSA and one of their partners, RSA Security. During our conversation, we get to chat with Kelvin Coleman, Executive Director, National Cyber Security Alliance, and Angel Grant, Director, Identity, Fraud and Risk Intelligence at RSA Security. These are some of the points we discussed: - What is NCSAM and what is its purpose - What are the activities taking place this year - Why does NCSAM matter and what the connection is between business and society - What can people do to participate // how can they help spread the word In the end, we all have a role to play. What will your part be? ________ This episode of In The News is made possible by the generosity of our sponsors. Today, that's us! Learn more about becoming a sponsor of one of our columns here: https://www.itspmagazine.com/podcast-series-sponsorships To catch more stories In The News, be sure to visit https://www.itspmagazine.com/in-the-news
Subscribe: itunes | Email | Stitcher | RadioPlayer 1/3 of all healthcare employees who should receive cyber security training, don’t get cyber security training. This shocking statistic is from the recent report from Kaspersky, Cyber Pulse: The State of Cybersecurity in Healthcare – Part Two I believe that we can do better! Today, I want to share with you some easy, no-cost resources that you can use right away to start or add to your cyber security awareness training in your healthcare practice. There is no software to buy, and if you have email, you can do this today. October is Cyber Security Awareness Month! A great no-cost opportunity to provide cyber security awareness training to your team! Whether you’re at work, at home, or on the go, threats to cyber security and sensitive data can follow you. Our uber-connected world makes it more important than ever to know the threats and their potential consequences. Information Managers Ltd has been a Cyber Security Champion for many years - and now you can, too! NCSAM was launched by the National Cyber Security Alliance & the U.S. Department of Homeland Security in October 2004. This US organization sponsors a multi-media resource campaign each October. You can become a Champion, too - and get direct access to all the resources. Demonstrate to team the importance of cyber security at work. Share with your patients - by posters in your practice, blog posts, or your email newsletters - and demonstrate that your practice is cyber aware and you want to share tips with them. If you have team members who work remotely, work from home, use their own mobile devices, or use the internet to connect with apps and resources - give them additional skills to do their work as safely as possible. Help your team members better manage their own personal information in their personal lives - good habits that will help them at work, too! Become a Champion here https://staysafeonline.org/ncsam/champions/ Or, follow Information Managers blog posts, social media, and resources that you can download and use right away! Start Your Cyber Security Awareness Training! Throughout the month of October, Information Managers is providing to you Cyber Security Awareness tips by email. Follow the link to receive an email every few days throughout October with a short training tip to be more Cyber Security Aware. Emails will have additional resources that you can download. You can forward the email to easily share with your team. Or, they can sign up to the campaign, too, and then they will receive emails directly to their in-box. Click Here to sign-up for Cyber Security Awareness Tips today! https://informationmanagers.ca/cyber-security-awareness-2019 Show Notes Recorded October 1, 2019 You can advance the audio to these time markers: 00:42 Introduction 02:20 Cyber Security Awareness Month 06:59 Key Messages 10:18 Engage Your Community 11:25 Raise Awareness 11:53 Become a Cyber Security Champion https://staysafeonline.org 12:00 Cyber Security Awareness Training by Email https://informationmanagers.ca/cyber-security-awareness-2019
For this final October episode of National Cyber Security Awareness Month, Rebecca Herold answers questions from listeners and Privacy Professor Tips readers. Just a few of the topics covered include: • 8 things everyone should do to secure their computing devices • Wi-fi security and privacy • ATMs, self-pay devices, and skimmers • Privacy protections • Exactis privacy breach • Web cam hacking Join Rebecca to hear how she answers what your fellow listeners and Tips readers ask! #RebeccaHerold #NCSAM #DataSecurity #CyberSecurity #Privacy #Awareness
What you are about to listen is the third and final conversation with Daniel Eliot, Director of Small Business Education at the National Cybersecurity Alliance. Sean and I recorded three episodes with Daniel because it is National Cybersecurity Awareness Month and you need to listen to all of them - in no particular order - to become Cyber Aware Awesome and earn a Cyber Society Pin Badge. Gosh, it seems like just yesterday when we published the first podcast, and so much has happened since then, that I am honestly struggling to find the words to introduce this final conversation. Truth is… I am so proud of you all. I am shedding a tear of joy as I am thinking about how we have all come together, educated ourselves and transformed our cyber society from a sinister landscape into a welcoming safe heaven, with a chicken in every pot and a car in every garage. At the time of the first episode nobody gave a flying unicorn ass about cybersecurity; back then we were all going around the web clicking recklessly on every link, buying unsafe IoT devices and connecting them in our homes and offices, repeating our - undeniably brilliant and unforgettable - “mY12345pW” password on every account we own, and connecting our phones, tablets and laptops to any WiFi in range, even the ones labeled “free candies”. Not now. Not anymore. That was yesterday. Today, we have listened to the first two podcasts with Daniel Eliot, Sean Martin and me, and we are all grown up, aware, mature, and ready to venture into the digital world, proud, knowledgeable, and secure. Well, this was my hope, but I realize that it is not that easy. There is still a lot more to do, starting with one more podcast, this one, and then we will go from here. ITSPmagazine is not going to give up educating everybody, and neither is the The National Cyber Security Alliance. Look, it doesn’t really matter if you listen to this podcast in October, November, March or July. National Cybersecurity Awareness Month is simply a way to get your attention so you can listen to what the experts have to say about being safe online, all year long. We spoke about the value of sharing cybersecurity responsibility — from the consumer to the large enterprise and from the boardroom to the break room. Then we spoke about what small and medium sized businesses have to do when it comes to protecting their systems, information, and even their capital from cybercrime and cyber fraud. But in the end, everything comes down to all of us, as individuals assuming the responsibility for our own cyber life, which at this point is not separate from our real life. We must educate ourselves and take that knowledge wherever we go and apply it to everything we do, for ourself, our business, our family and the future generations for which we are, believe it or not, very much responsible. In this podcast there are many actionable tips and advice for you to implement immediately and to share with all your loved ones. So listen up, be connected, and be merry. ________________ Listen to episode 1 and 2 with Daniel Eliot, plus more NCSAM stories here on ITSPmagazine: https://www.itspmagazine.com/itsp-chronicles/national-cyber-security-awareness-month-ncsam-2018
In an era when much of our lives happen online, from banking to social media, cybersecurity is more important than ever. And we all have a role to play—not just in keeping ourselves safe, but also our employers and customers. As we become more connected, we also must also become more vigilant. But what do you do to remain secure? Whether you are a broker, an investor or just simply an internet user, we’ve got tips for you on this episode of FINRA Unscripted. In honor of National Cybersecurity Awareness Month, Barry Suskind and Eugene Mindel of FINRA’s Cyber and Information Security team join us to provide resources and best practices for keeping you, your family and your clients protected while online. Resources mentioned in this episode: Cybersecurity Resources Small Firm Cybersecurity Checklist Fake Phishing, Real Benefits
I've accumulated dozens of data security, cyber security and privacy questions from listeners and Tips readers that I've not yet had time to answer. They cover a very wide range of topics of interest to all folks throughout the world. E.g. E911. HIPAA breaches. Worst security business practices. Ring security system privacy. Keeping people from visually snooping on your tablet or phone. Phishing calls (with a real example recording). Credit reports. Virus Scanning. And much more! We will answer questions on these topics and more during this episode as part of Cyber Security Awareness Month! Join cyber security expert Dr. Terri Curran and me as we go through as many questions as possible during this hour.
Episode 286: ControlTalk NOW — Smart Buildings Videocast and PodCast for week ending October 7, 2018 features our interview with Dan Preston, Director, Independent Distribution Channel, North America, who brings us on-line with all “systems go” at Johnson Controls. Automated Buildings’ Ken Sinclair’s releases his October edition; Your 2018 ControlTrends Awards Nomination Ballot is ready; The New Dialogue in Smart Buildings from Mark Petock;October is National Cybersecurity Awareness Month; Learn How to do KMC Connect Customs Applications; and Vykon Integrated Analytics, Enterprise Security Updates, and More — are here! 2018 ControlTrends Awards Nomination Ballot. It is time to nominate your favorite people, products, solutions and companies, for the 2018 ControlTrends Awards. The top 5 to 6 in each category will move on to the ControlTrends Awards finals. If you don’t already see your nominee on the ballot, or don’t already see a nominee in a category, please use the other option, and write in your choice, we will then add them on to the ballot. Make sure not to check the option 1 box — if you are the first to write in a candidate, as this will result in an error code saying “too many choices.” Just un-click the Option one box, and your ballot will work. ControlTalk NOW interview with Johnson Controls‘ Dan Preston, Director, Independent Distribution Channel, North America, who brings the ControlTrends Community up-to-speed with the JCI Roadshows (already underway); JCI’s two most recent acquisitions: Triatek and Lux Products Corporation; Verasys: JCI’s red hot product line for the Light Commercial Building Space; and JCI’s portfolio of FX IP Controllers. Ken Sinclair’s Automated Buildings’ October, 2018 Issue, Features a uniquely “Edge-You-Cation” Editorial. Ken Sinclair’s October edition of AutomatedBuildings.com, is nothing short of punderful. Ken’s deliberate play on words delivers yet another deep deliberation on humanized interactions, integrated and deployed with the hatching technologies — and how they are soon to reside within the smart and holistic building space, with its occupants and AI-enabled edge devices. The New Dialogue in Smart Buildings, Marc Petock, Chief Marketing & Communications Officer, Lynxspring. Published in Linkedin on September 27, 2018. Commercial real estate operators and building owners are adapting to the change in building automation technology that is occurring in the industry. Innovation has reshaped how we manage, operate and interact with our buildings and facilities. Connected systems, data and analytics is broadening our conversation in the world of smart buildings — engaging not only facility operators in the discussion, but the C-Suite as well. October is National Cybersecurity Awareness Month. October is National Cybersecurity Awareness Month (NCSAM). NCSAM is a collaborative effort between DHS and its public and private partners—including the National Cyber Security Alliance (NCSA)—to raise awareness about the vital role cybersecurity plays in the lives of U.S. citizens. NCCIC will be participating in NCSAM through weekly posts in the Current Activity section of the NCCIC website. Learn How to do KMC Connect Custom Applications. In this webinar, Building Genius, Tom Joslin, shows us Custom Applications in KMC Connect. KMC Connect Operator Workstation is a configuration software tool with which you can configure KMC BACnet controllers for a building automation system. Key time-saving features of KMC Connect include: Build jobs offline and then deploy them on-site with a single click. Use the wizards to quickly and easily configure alarms, schedules, and trends on native BACnet devices. Choose from a library of hundreds of HVAC applications, with pre-configured setups for KMC controllers and accompanying documentation. VYKON Integrated Analytics, Enterprise Security Updates & More are Here! VYKON Integrated Analytics 2.1 brings the ability to create and run energy reports to the end user. The seven new energy report templates available with this release are configurable from the web UI and can be saved for future use. New HTML5 Analytic Web Chart and Analytic Web Table widgets that improve visualization capabilities are available with this release. Analytic Web Chart and Analytic Web Table are configurable from the browser view. The Analytic Web Table supports multiple analytic bindings. The post Episode 286: ControlTalk NOW — Smart Buildings Videocast and PodCast for Week Ending October 7, 2018 appeared first on ControlTrends.
So, it's October 2018, and it's National Cyber Security Awareness Month. Again. James and I have a bit of an issue with this, as you'd guess. Why are we still talking about awareness when we need action? Are there really people out there that are saying "If only I was aware that there are bad people trying to do bad things, I'd had done it differently"? Highlights from this week's show include... We riff on the thing we talk about once a year (and not anymore) James takes a shot at passwords... fish, meet the barrel Raf gets a little upset that we're talking about awareness, since 2004 and nothing really changes Raf & James ask you to take action this year and tell us about it! Hashtag it #DtSR and tell us what you're doing for NCSAM 2018 that's going to make an actual difference
What's even scarier than Halloween? The vast array of cyberthreats facing organizations today. October is National Cybersecurity Awareness Month (NCSAM) in the United States, and who better to speak about securing end-user devices than X-Force Red's very own Space Rogue? In this edition of the X-Force Red in Action podcast series, he outlines must-have security basics and offers best practices for protecting connected devices and managing small business risk. Listen now to discover the 3 "p"s of online safety (hint: the first is passwords), and learn how to practice cybersecurity awareness all year long. For more information on X-Force Red, visit ibm.com/xforcered, and visit https://securityintelligence.com regularly throughout October for more special NCSAM tips and content.
"Security is a table stakes business-survival matter" This October is National Cyber Security Awareness Month in the USA and CyberSecMonth across the EU. On the eve of this month-long focus on the safety and resilience of the internet, we talk to an expert who reveals why it's something that every business should prioritise EVERY day of the year. Kyle Hannan (AICPA & CIMA, London) talks to Tim O'Hara, a Chicago-based IT Solutions Adviser and cybersecurity consultant. OUR GUEST: Tim's clients include C-Level Executives in Finance, Operations, and IT cycles of Fortune 500 and mid-sized named accounts covering financial services, manufacturing, retail, business services, non-profits and consumer goods, telecommunications, media, and government. Founded on his CPA, CGMA and Internal Control Certifications, Tim mastered transaction processing, financial reporting, business information exchanges (B2B, B2C, B2G, G2G) and fraud. He is also a technical reviewer of the AICPA's COSO Enterprise Risk-Management Certificate Programme. Find out more about Timothy O'Hara on LinkedIn WE DISCUSS: how to understand the risks posed by cyber attacks how to build resilience, defences and awareness in response. effective, practical and achievable steps which any company can take RESOURCES MENTIONED: AICPA COSO Enterprise Risk-Management Certificate Programme CyberSecurity Europe (2 Day Event in London) == MORE ABOUT OUR PODCAST == It's recorded by a growing team of AICPA & CIMA staff from offices across the world. DON'T MISS OUT. Get the latest show every week, automatically and free, at https://www.aicpa-cima.com/disruption.html. Share it easily with colleagues and friends by using the icons on the media player. TAKE IT FURTHER. Find related CPD/CPE resources at https://www.aicpastore.com/GoBeyondDisruption and https://www.cgmastore.com/GoBeyonddisruption. STAY CONNECTED. Follow #GoBeyondDisruption, @AICPANews and @CIMA_News on social." ©2018 Association of International Certified Professional Accountants (AICPA & CIMA). All rights reserved
Endpoint security is an important piece of your overall security puzzle. Along with some of the website security tactics we've discussed previously, a strong endpoint security strategy is important for protecting your systems, and your users.
Internet security is becoming more a part of our lives every day. We no longer have to worry about security on just our computers, but our phones, thermostats, and even our refrigerators. Jessica and Michael discuss the future of Internet security: the Internet of Things.
October is National Cyber Security Awareness Month (NCSAM) as well as Halloween season. In honor of this this confluence of events, Space Rogue and Videoman, both of IBM X-Force Red, have come together for a conversation about some scary security blunders and, because we don't want our listeners to have nightmares, some tips for resurrecting your security strategy. To learn more about X-Force Red or to schedule a demo, visit: ibm.co/2wxeb56. Or listen to another podcast on National Cyber Security Awareness Month: http://bit.ly/2xYuATx.
October is National Cyber Security Awareness Month, which is an annual campaign to raise awareness about the importance of cybersecurity. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about the importance of cybersecurity, provide them with tools and resources needed to stay safe online, and increase the resiliency of the Nation in the event of a cyber incident. In the second week of NCSAM, we focus on cybersecurity in the workplace. Creating a culture of cybersecurity is critical for all organizations and must be a shared responsibility among all employees. Join one of our cyber intelligence analysts as she discusses how organizations can protect against the most common cyber threats and the resources available to help strengthen cyber resilience.
Episode 6 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. October is National Cyber Security Awareness Month (NCSAM), and this podcast kicks off 4 weeks of Security Intelligence content [https://ibm.co/2hKTBuZ] dedicated to the role we all play in making the internet safer. Listen now to hear a spirited discussion on the various themes of this year's NCSAM campaign, including "Cybersecurity in the Workplace is Everyone’s Business" and "Protecting Critical Infrastructure From Cyber Threats." You'll learn how Chris uses peer pressure to encourage good online habits among his colleagues and why Paul sees a bright future for machine learning. RESOURCES: Learn more about National Cyber Security Awareness Month: http://bit.ly/2g7RzBL Download the CyberAvengers' Playbook: http://bit.ly/2ylU65M Read the 'State of Cybersecurity in Small and Medium-sized Businesses' report from Ponemon Institute: http://bit.ly/2g6v00b Follow @IBMSecurity on Twitter for daily NCSAM updates: http://bit.ly/2xQVHxI
This week, we discuss the compromise of 2.2 million teens' i-Dressup accounts, the aftermath of the massive 2014 Yahoo breach, and cyber security advocacy campaigns ECSM and NCSAM.