Podcasts about Password management

  • 105PODCASTS
  • 121EPISODES
  • 37mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jun 4, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Password management

Latest podcast episodes about Password management

THE VALLEY CURRENT®️ COMPUTERLAW GROUP LLP
The Valley Current®: Why Are Cybersecurity Breaches Inevitable?

THE VALLEY CURRENT®️ COMPUTERLAW GROUP LLP

Play Episode Listen Later Jun 4, 2025 27:06


Is anyone safe in today's digital battlefield? In today's episode of The Valley Current®, host Jack Russo is joined by tech-savvy CPA Steve Rabin to unpack why cybersecurity breaches are no longer a matter of if but when. From fake clients to data-wiping hacks, they reveal how everyone from elderly investors to high-powered business professionals is a target. Password management, multi-factor authentication, and shifting liability to fiduciaries may be your best defenses. Don't just plan for recovery, focus on prevention! No one is too small to be a target.   https://taxservice2u.com/ https://www.washingtonpost.com/national-security/2025/05/02/cia-layoffs-trump-administration/?carta-url=https%3A%2F%2Fs2.washingtonpost.com%2Fcar-ln-tr%2F4261ab8%2F6815e92a08718a083aa424c3%2F596962349bbc0f4b7754a9b5%2F11%2F59%2F6815e92a08718a083aa424c3   Jack Russo Managing Partner Jrusso@computerlaw.com www.computerlaw.com https://www.linkedin.com/in/jackrusso "Every Entrepreneur Imagines a Better World"®️  

Breakfast with Refilwe Moloto
What the Hack! Safety tech leads at Auto Shanghai and more

Breakfast with Refilwe Moloto

Play Episode Listen Later Apr 29, 2025 7:21


In this week’s edition of What the Hack! on CapeTalk, Arthur Goldstuck joined John Maytham to explore the shift towards vehicle safety at the Auto Shanghai 2025 expo, unpack the power (and challenges) of the new Acer Predator Connect W6x Wi-Fi router, preview Meta’s LlamaCon and its AI ambitions, and share expert advice for World Password Day on how to better protect your online accounts. Good Morning Cape Town with Lester Kiewit is a podcast of the CapeTalk breakfast show. This programme is your authentic Cape Town wake-up call. Good Morning Cape Town with Lester Kiewit is informative, enlightening and accessible. The team’s ability to spot & share relevant and unusual stories make the programme inclusive and thought-provoking. Don’t miss the popular World View feature at 7:45am daily. Listen out for #LesterInYourLounge which is an outside broadcast – from the home of a listener in a different part of Cape Town - on the first Wednesday of every month. This show introduces you to interesting Capetonians as well as their favourite communities, habits, local personalities and neighbourhood news. Thank you for listening to a podcast from Good Morning Cape Town with Lester Kiewit. Listen live – Good Morning CapeTalk with Lester Kiewit is broadcast weekdays between 06:00 and 09:00 (SA Time) https://www.primediaplus.com/station/capetalk Find all the catch-up podcasts here https://www.primediaplus.com/capetalk/good-morning-cape-town-with-lester-kiewit/audio-podcasts/good-morning-cape-town-with-lester-kiewit/ Subscribe to the CapeTalk daily and weekly newsletters https://www.primediaplus.com/competitions/newsletter-subscription/ Follow us on social media: CapeTalk on Facebook: www.facebook.com/CapeTalk   CapeTalk on TikTok: www.tiktok.com/@capetalk   CapeTalk on Instagram: www.instagram.com/capetalkza  CapeTalk on X: www.x.com/CapeTalk  CapeTalk on YouTube: www.youtube.com/@CapeTalk567  See omnystudio.com/listener for privacy information.

The Empowered Parent with Dana Baltutis
Episode 56: Craig Clarke (Cybersecurity Expert) - Safeguarding Families in the Digital Age Through Practical Technology and Privacy Strategies

The Empowered Parent with Dana Baltutis

Play Episode Listen Later Feb 5, 2025 45:46 Transcription Available


Send us a textUnlock the secrets of keeping your family safe in the digital world with insights from our guest, Craig Clarke, a cybersecurity expert passionate about bridging technology and parenting. As children spend more time online for school and play, understanding cybersecurity beyond antivirus software is crucial. Craig shares practical advice for aligning school and home safety practices, from reviewing school cybersecurity policies to choosing secure devices like Chromebooks for their robust safety features and cloud-based efficiency.Explore the nuances of password management and technology awareness with us. Craig highlights the differences between popular communication platforms like Microsoft Teams, Zoom, and Google Meet, emphasizing the user-friendly nature of Chromebooks, especially for the less tech-savvy. Discover the power of dedicated password managers like LastPass and Bitwarden in protecting against identity theft and cyber threats, while we caution against the pitfalls of relying on built-in web browser password managers on shared devices.Empower yourself with strategies for enhancing your child's online safety through education and privacy management. Learn the importance of two-factor authentication, the risks associated with phishing, and how to maintain tech-free zones to protect personal privacy. Craig offers guidance on engaging with schools about cybersecurity policies and teaching children responsible technology use, ensuring they grow up to be savvy, informed digital citizens.Useful links:https://www.cyber.gov.au/learn-basicshttps://www.choice.com.au/consumers-and-datahttps://www.grc.com/securitynow.htmhttps://www.grc.com/haystack.htmhttps://bitwarden.com/https://foundation.mozilla.org/en/privacynotincluded/https://en.wikipedia.org/wiki/Computer_security danabaltutis.com, mytherapyhouse.com.au, https://mytherapyhouse.com.au/your-childs-therapy-journey/ https://www.danabaltutis.com/services

The Ridiculously Good Virtual Assistant Show
Interview with VA Jacki Hollywood Brown

The Ridiculously Good Virtual Assistant Show

Play Episode Listen Later Jan 24, 2025 48:29


Today we are talking with VA Jacki Hollywood Brown about data organization, data management and records management.  Jacki is an organization specialist who helps her clients by designing structures and procedures to help them improve their efficiency and productivity. Tune in to learn about: Mistakes VAs (and business owners!) make with data and records management Why your brain should not be a storage facility How to turn data into usable information Privacy and security best practices Password management And a whole lot more! To get in touch with Jacki to discuss your support needs, connect with her here: Website: https://productivelyorganized.com LinkedIn: https://[https://linkedin.com/in/jackihollywoodbrown or book a discovery call with her here: https://productivelyorganized.com/contact/ About this episode: Jacki Hollywood Brown is a military spouse and professional organizer-turned Virtual Assistant, and she brings her outstanding organizational skills to her VA clients by offering boutique VA services. I spoke with Jacki about the importance of creating and updating procedures and processes in our business (and in our client's businesses). We also talked about what you should have in place to protect your business data, and so much more. Enjoy!

Cyber Security Today
Cyber Security Today Week in Review for September 14, 2024

Cyber Security Today

Play Episode Listen Later Sep 14, 2024 36:21 Transcription Available


Cybersecurity Insights: Vulnerabilities, Insider Threats, and the Future of Online Safety In this weekend edition of Cybersecurity Today, host Jim Love is joined by regulars Terry Cutler of Cyology Labs and David Shipley of Beauceron Security, alongside special guest Laura Payne from White Tuque. They discuss significant cybersecurity news including the new additions to CISA's known exploited vulnerabilities catalog, a hilarious yet eye-opening domain purchase incident, and the ongoing issue of insider threats. The panel also dives into the complexities surrounding recent breaches like the one at Avis and the broader implications of data vulnerabilities. Stay tuned for the latest insights and expert opinions on what's happening in the cybersecurity world. 00:00 Introduction and Panelist Introductions 01:31 Format Overview and First Cybersecurity Story 01:47 Discussion on CISA's Vulnerability Catalog 02:51 Challenges in Patch Management 06:45 Microsoft's Patch Tuesday Controversy 10:49 The $20 Domain Vulnerability 15:42 Insider Threats and Real-World Incidents 18:11 Handling Disgruntled Employees 18:51 Insider Threats: Real-Life Examples 19:41 Preventing Insider Threats 21:30 Password Management and Security 22:53 Case Study: Sales Employee Walks Out with Client List 23:42 Jurassic Park and Risk Management 24:32 Avis Data Breach: What Happened? 25:51 The Importance of Identity Theft Protection 29:44 Challenges in Cybersecurity Awareness 34:27 Microsoft's New Security Measures 35:07 Conclusion and Farewell

EisnerAmper Podcast
TechTalk: The Future of Data Security: How a Startup Is Redefining Password Management and Security

EisnerAmper Podcast

Play Episode Listen Later Aug 27, 2024 16:46


McKelvey Packard, Co-Founder of Everykey, talks with EisnerAmper's TechTalk host Fritz Spencer about how his startup is improving protections for users' credentials against data breaches with the world's first patented universal smart key. In this episode, McKelvey shares the unique features of Everykey, which replaces passwords and keys by using proximity-based authentication. Learn how McKelvey and his team are making security for user data more convenient and unintrusive than ever before.

Family Office Podcast:  Private Investor Interviews, Ultra-Wealthy Investment Strategies| Commercial Real Estate Investing, P
Focus on What Every Ultra-Wealthy Person Does but Nobody Else is Doing [Low Hanging Fruit]

Family Office Podcast: Private Investor Interviews, Ultra-Wealthy Investment Strategies| Commercial Real Estate Investing, P

Play Episode Listen Later Aug 20, 2024 3:32


Send us a Text Message.In this video, Richard C. Wilson discusses what every ultra-wealthy person does that sets them apart. Learn from the expert in family offices!**Why You Need an "If I Die" Document to Protect Your Assets & Secure Your Family's Future**In this eye-opening video, we dive into the crucial but often overlooked topic of creating an "If I Die" document. Discover why having a comprehensive plan can be more valuable than a life insurance policy, and learn how it can protect your assets and ensure your family's financial security.In this video you'll learn:- The importance of documenting all your financial accounts, including hidden assets like crypto holdings and 529 accounts.- How to create a detailed guide for managing your affairs, from passwords to business operations.- Tips on selecting trusted individuals to manage your assets and ensure continuity.- The impact of having a clear and accessible document on your family's peace of mind and financial stability.- Don't leave your family in the dark. -----------------------Welcome to the "Private Investor Club - 7,500 Investors. Subscribe now to hear what our 7,500+ investors are allocating to and stay on top of trends related to structuring and closing deals.Our 17-year-old investor club, the Family Office Club, has 25 team members, and 12 million social followers, has closed on over $500M of transactions, has over 7,500 active investors, and hosts 15 live events a year.  To join our investor club as a capital raiser or CEO of a company needing capital to access our live community events, please visit https://FamilyOffices.comTo register with us as an investor to access live community events please visit https://InvestorClub.comWe have free web classes and books for you to download at https://lp.FamilyOffices.com/book https://CapitalRaising.com To date, our podcast and YouTube content has been downloaded over 5 million times.  I hope you love this podcast! Have a nice day!

Today in Health IT
Newsday: Unified Endpoints, Rising Ransomware, and Human in the Loop with Michael Robinson

Today in Health IT

Play Episode Listen Later Jul 26, 2024 15:37 Transcription Available


July 26, 2024: Michael Robinson, VP of Healthcare Solutions for the Americas at Omnissa, joins Bill for the news. They delve into the current state of cybersecurity in healthcare, emphasizing the rise in ransomware demands and the crucial need for mature security postures in health systems. How can health systems better manage the increasing threat vectors from device proliferation? What role does AI play in enhancing security measures, and how effective is the adoption of zero-trust architecture in preventing breaches? The conversation also touches on the evolving use of Gen AI in healthcare, particularly in administrative versus clinical applications. As Gen AI tools become more prevalent, what are the implications for patient interactions and the necessity of human oversight in AI-driven healthcare solutions?Key Points:00:28 Michael Robinson from Omnissa00:58 Omnissa: Company Background and Offerings02:56 Ransomware and Security in Healthcare06:52 Password Management and Zero Trust11:03 Gen AI: Opportunities and ChallengesNews articles:Ransomware Extortion Demands Soar to $5.2M per AttackAI Ushers in New Era of Global Healthcare Equity and Efficiency

IBS Intelligence Podcasts
EP734: What happens if your smartphone with all your banking apps is stolen?

IBS Intelligence Podcasts

Play Episode Listen Later Jul 23, 2024 11:49


James O'Sullivan, CEO & Founder, Nuke from OrbitTheft of a smartphone used to be about the value of the device. Now it is about the value of the data on the device. What is needed is a simple 'kill switch' solution to protect your data and accounts, a FinTech security platform designed to mitigate the impact of security breaches. Founded in 2023, Nuke From Orbit is currently operating in beta but aims to enable a user to block access to multiple services and accounts simultaneously, avoiding account compromise issues and monetary loss when their smartphone gets stolen. James O'Sullivan of Nuke from Orbit speaks to Robin Amlôt of IBS Intelligence. 

Pondering Thoughts Podcast
The Changing Landscape of Cybersecurity: A Conversation with IT Security Leader Keilyn Kirkland

Pondering Thoughts Podcast

Play Episode Listen Later May 30, 2024 64:23


In this episode, host K. Wilkes and IT Security Leader Keilyn Kirkland delve into the current landscape of cybersecurity and the importance of personal cybersecurity. They discuss the evolving nature of cybersecurity, the challenges individuals face in safeguarding their information, and the role of data breaches. The conversation emphasizes the necessity of monitoring and protecting personal data, including checking privacy settings and utilizing credit and dark web monitoring services. The vulnerabilities of popular platforms like Venmo and the risks associated with sharing personal information online are highlighted. This episode covers various topics, such as data breaches, the significance of safeguarding DNA information, the cost of cybersecurity threats, and everyday security practices. Kirkland, a cybersecurity expert, shares insights on the significance of cybersecurity and provides tips for individuals to protect themselves online. She explains the concept of doxing and the dangers of personal information exposure. Kirkland also offers advice on removing personal information from websites and emphasizes the need for individuals to stay informed about cybersecurity issues.  Get ready to empower yourself with the knowledge to take care of your online security!TakeawaysCybersecurity has become essential for everyone, not just experts, due to the increasing digitalization of our lives.Individuals should regularly check their privacy settings on social media platforms and be cautious about the information they share online.Monitoring personal data and using services for credit monitoring and dark web monitoring can help individuals stay informed about potential data breaches.Popular platforms like Venmo can have vulnerabilities that expose personal information, highlighting the importance of being cautious when using such platforms. Data breaches can have severe consequences, exposing personal information and potentially compromising DNA data.Basic security practices, such as strong passwords, password managers, and two-factor authentication, can significantly enhance personal security.Vigilance is crucial in recognizing and avoiding phishing attempts, which often use urgent messages and deceptive links.Being aware of common scams and practicing skepticism can help individuals avoid falling victim to fraud. Doxing is a dangerous activity where personal information is exposed online, leading to potential threats and intimidation.Individuals should regularly search for their own information online and take steps to remove or limit its availability.Cybersecurity is a continuous journey, and individuals should stay informed about the latest threats and best practices.The cybersecurity landscape is constantly evolving, and individuals need to be aware of the risks and take necessary precautions.Chapters00:00Introduction and the Importance of Cybersecurity06:34The Risks and Challenges of Data Breaches29:20The Importance of Password Management and Two-Factor Authentication38:44Recognizing and Avoiding Phishing Attempts45:18Protecting Against Identity Theft through Credit Monitoring55:07The Evolving Cybersecurity Landscape01:06:00ClosingResources mentioned in episode:I Have I Been PwndReputationDefenderKrebs SecurityCyberwire IdentityTheft.gov Like what you heard? Share with others and follow us @ponderingthoughtspodcast Instagram

The Nifty Thrifty Dentists
Secure Password Management for Dental Practices with Tanner Applegate and Dr. Glenn Vo

The Nifty Thrifty Dentists

Play Episode Listen Later May 27, 2024 0:28


In this episode of the Nifty Thrifty Dentists Podcast, Dr. Glenn Vo chats with Tanner Applegate, Founder and CEO of Unify—a platform that helps dental practices securely manage and share passwords. Tanner shares his journey from initially wanting to be a dentist to realizing his passion was really in optimizing the business side of dentistry through technology solutions. His latest venture, Unify, aims to solve major pain points around password management that most dental offices face. Key Highlights: 85% of dental offices manage shared passwords through unsecure spreadsheets, exposing them to data breaches and HIPAA violations. Unify provides a secure, centralized solution.In addition to security, Unify greatly improves efficiency by eliminating time wasted hunting down passwords. With one-click access to all your platforms, you can seamlessly switch between tools.Unify allows you to easily onboard new team members, control permissions, and ensure past employees no longer have access—all critical for practices with high turnover.As a special offer for Nifty Thrifty Dentists, Tanner is offering a 30-day free trial of Unify with white glove onboarding support. The first 10 offices to sign up will get 6 months free in exchange for an honest review. To learn more about Unify and claim this exclusive offer, visit: https://www.unify.dental/ To get more FREE Dental Resources and Deals, visit: https://niftythriftydentists.com/ Join our Nifty Thrifty Dentists Facebook community of over 55,000 Dental Professionals: Must be a member of Nifty Thrifty Grp: https://www.facebook.com/groups/niftythriftydentists/

The Ops Experts Club Podcast
22. That's a Cool Tool: OBS Studio, LastPass and Fathom

The Ops Experts Club Podcast

Play Episode Listen Later May 16, 2024 32:52


SUMMARY: In this episode of The Ops Experts Club Podcast, we dive into the world of productivity tools, uncovering three gems that can revolutionize your workflow. Join us as we explore OBS Studio, a versatile software ideal for video recording and live streaming, not just for gamers but also for educators and entrepreneurs. Learn how OBS Studio's flexibility and simplicity can enhance your digital content creation and streaming experience. Next up, we unravel the mysteries of LastPass, a password management tool that simplifies secure password sharing and storage. Discover how LastPass streamlines password management across teams, ensuring efficiency and security without the hassle of manual updates. Lastly, we introduce Fathom for Zoom, a game-changing meeting recorder that seamlessly captures and organizes meeting transcripts and recordings. Explore how Fathom for Zoom revolutionizes post-meeting workflows, making it effortless to share recordings and extract key insights. Join us as we uncover the potential of these productivity powerhouses and unlock new levels of efficiency in your daily operations!   Minute by Minute: 0:00 Welcome everyone 2:05 OBS Studio 13:11 Password sharing with LastPass 24:06 Recording meetings with Fathom for Zoom

The Nifty Thrifty Dentists
Secure Password Management for Dental Practices with Tanner Applegate and Dr. Glenn Vo

The Nifty Thrifty Dentists

Play Episode Listen Later May 7, 2024 29:39


In this episode of the Nifty Thrifty Dentists Podcast, Dr. Glenn Vo chats with Tanner Applegate, Founder, and CEO of Unify—a platform that helps dental practices securely manage and share passwords. Tanner shares his journey from initially wanting to be a dentist to realizing his passion was really in optimizing the business side of dentistry through technology solutions. His latest venture, Unify, aims to solve major pain points around password management that most dental offices face. Key Highlights: -85% of dental offices manage shared passwords through unsecure spreadsheets, exposing them to data breaches and HIPAA violations. Unify provides a secure, centralized solution. -In addition to security, Unify greatly improves efficiency by eliminating time wasted hunting down passwords. With one-click access to all your platforms, you can seamlessly switch between tools. -Unify allows you to easily onboard new team members, control permissions, and ensure past employees no longer have access—all critical for practices with high turnover. -As a special offer for Nifty Thrifty Dentists, Tanner is offering a 30-day free trial of Unify with white glove onboarding support. The first 10 offices to sign up will get 6 months free in exchange for an honest review. To learn more about Unify and claim this exclusive offer, visit: https://www.unify.dental/ To get more FREE Dental Resources and Deals, visit: https://niftythriftydentists.com/ Join our Nifty Thrifty Dentists Facebook community of over 55,000 Dental Professionals: https://www.facebook.com/groups/niftythriftydentists

Bob Sirott
Password management advice

Bob Sirott

Play Episode Listen Later Apr 23, 2024


Social media strategist Scott Kleinberg joins Bob Sirott to talk about why generating a strong password is important, having multiple records of your passwords, and how to use a password manager. He also discusses how you can prevent being hacked, how passkeys are gaining popularity, and answers this week’s genius bar questions.

CISO Tradecraft
#169 - MFA Mishaps

CISO Tradecraft

Play Episode Listen Later Feb 19, 2024 33:21 Transcription Available


In this episode of CISO Tradecraft, host G Mark Hardy discusses various mishaps that can occur with Multi-Factor Authentication (MFA) and how these can be exploited by attackers. The talk covers several scenarios such as the misuse of test servers, bypassing of MFA via malicious apps and phishing scams, violation of the Illinois Biometric Information Protection Act by using biometric data without proper consent, and potential future legal restrictions on biometric data usage. G Mark also highlights the significance of correct implementation of MFA to ensure optimum organizational security and how companies can fail to achieve this due to overlooking non-technical issues like legal consent for biometric data collection. Transcripts: https://docs.google.com/document/d/1FPCFlFRV1S_5eaFmjp5ByU-FCAzg_1kO References: Evil Proxy Attack- https://www.resecurity.com/blog/article/evilproxy-phishing-as-a-service-with-mfa-bypass-emerged-in-dark-web Microsoft Attack - https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/security/microsoft-reveals-how-hackers-breached-its-exchange-online-accounts/amp/ Illinois Biometric Law - https://www.ilga.gov/legislation/publicacts/fulltext.asp?Name=095-0994 Chapters 00:00 Introduction 00:43 Understanding Multi Factor Authentication 01:05 Exploring Different Levels of Authentication 03:30 The Risks of Multi Factor Authentication 03:51 The Importance of Password Management 04:27 Exploring the Use of Trusted Platform Module for Authentication 06:17 Understanding the Difference Between TPM and HSM 09:00 The Challenges of Implementing MFA in Enterprises 11:25 Exploring Real-World MFA Mishaps 15:30 The Risks of Overprivileged Test Systems 17:16 The Importance of Monitoring Non-Production Environments 19:02 Understanding Consent Phishing Scams 30:37 The Legal Implications of Biometric Data Collection 32:24 Conclusion and Final Thoughts

My Amazon Guy
Managing Multiple Amazon Seller Accounts: Proven Strategies for Agencies & Sellers

My Amazon Guy

Play Episode Listen Later Feb 17, 2024 5:48


Discover expert strategies for managing multiple Amazon Seller Central accounts with ease in this insightful video. Join us as we delve into the importance of One Time Password (OTP) systems, best practices for account security using tools like One Password, and effective methods for handling client turnover. Whether you're a boutique agency or looking to scale beyond 40 accounts, get actionable advice to streamline your Amazon account management process and ensure seamless operations. Perfect for Amazon sellers, agencies, and anyone interested in optimizing their Amazon business operations.#AmazonSeller, #AccountManagement, #SellerCentralTips, #EcommerceStrategy, #AmazonAgencyGet a free professional video where we analyze your ASIN:https://myamazonguy.com/asin-review/Timestamps:00:00 - Introduction and Greetings00:11 - Managing Multiple Amazon Accounts: Question00:33 - Importance of OTP Systems for Amazon Sellers01:35 - Strategy for Managing Multiple Client Accounts02:47 - Using One Password for Account Security03:59 - Benefits of One Password for Agencies04:10 - Follow-Up on Password Management and Virtual Desktops05:32 - Advice for Scaling Beyond 40 Accounts→ Save 20% on your first 6 months of Helium 10!↳ Use code STEVENPOPE6M20 at https://bit.ly/3RTm5id→ Already have Helium 10?↳ Exclusive MAG discount for upgrading existing accounts at https://myamazonguy.com/h10upgrade-----------------------------------------------------------------------------------------Join My Amazon Guy on LinkedIn: hhttps://www.linkedin.com/company/28605816/Follow us:Twitter: https://twitter.com/myamazonguyInstagram: https://www.instagram.com/stevenpopemag/Pinterest: https://www.pinterest.com/myamazonguys/Please subscribe to the podcast at: https://podcast.myamazonguy.comApple Podcast:  https://podcasts.apple.com/us/podcast/my-amazon-guy/id1501974229Spotify: https://open.spotify.com/show/4A5ASHGGfr6s4wWNQIqyVwSupport the show

Cloud Security Podcast
Cybersecurity Best Practices and Password Security in Cloud and AI

Cloud Security Podcast

Play Episode Listen Later Jan 26, 2024 29:59


We caught up with Troy Hunt and Scott Helme at NDC Security Oslo 2024 to talk about best practices when it come to decoding TLS, password security and data breaches in cloud and AI. Troy Hunt, known for his work with haveibeenpwned.com, spoke to us about the complexities of cloud deployment and paradox of data input versus privacy risk in Large Language Models (LLMs), Cloud. Scott Helme, a security researcher and founder of securityheaders.com, spoke about the importance of early security training in the development lifecycle for applications built in 2024. We dissected the critical yet often overlooked aspects of cybersecurity in cloud and ai. Guest Socials: ⁠Troy Hunt + Scott Helme Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - ⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠ Questions asked: (00:00) Introduction (01:37) Evolving Landscape of Password Management (04:17) Analyzing Data Breach Trends: (05:48) Latest Security Protocols with TLS and Encryption (08:24) Debating Encryption Key Management (10:59) AI's Role in Data Breaches: (13:59) Best Practices for Enterprise Password Management (16:01) Best Practices for Password Management in Small to Medium Sized Businesses (18:04) Top 5 security best practices (19:58) Understanding Security Headers (27:14) The Fun Section

Security Now (MP3)
SN 956: The Inside Tracks - 23andME Mess, Ukraine Telecom Hack, LastPass

Security Now (MP3)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

All TWiT.tv Shows (MP3)
Security Now 956: The Inside Tracks

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

Security Now (Video HD)
SN 956: The Inside Tracks - 23andME Mess, Ukraine Telecom Hack, LastPass

Security Now (Video HD)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

Security Now (Video HI)
SN 956: The Inside Tracks - 23andME Mess, Ukraine Telecom Hack, LastPass

Security Now (Video HI)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

Radio Leo (Audio)
Security Now 956: The Inside Tracks

Radio Leo (Audio)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

Security Now (Video LO)
SN 956: The Inside Tracks - 23andME Mess, Ukraine Telecom Hack, LastPass

Security Now (Video LO)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

All TWiT.tv Shows (Video LO)
Security Now 956: The Inside Tracks

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

Radio Leo (Video HD)
Security Now 956: The Inside Tracks

Radio Leo (Video HD)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

My Amazon Guy
Grow an Agency AMA Live with Steven Pope - Jan 9, 2024

My Amazon Guy

Play Episode Listen Later Jan 9, 2024 96:57


Join us live for an engaging Agency AMA session with Steven Pope on January 9 at 1PM ET!Helpful Reminders:→ Ask Steven your burning questions live by accessing this Streamyard link: https://streamyard.com/3pzvceuws6→ Ensure your mic and camera are ready if you're stepping onto the virtual stage.→ You can also type your questions into the chatbox during the stream.Learn strategies to scale your business with more clients and a better operation from leading experts! Attend the My Agency Guy Summit happening on January 9-10, 2024.Visit the link to secure your ticket: https://myagencyguysummit.comEver wondered about the nitty-gritty of running a successful agency? Ask Steven anything during our live session and get answers in real-time.Set your alarms and notifications so you don't miss out!This is an invaluable opportunity for digital and Amazon agencies ready to make big moves. Whether you're starting fresh or scaling up, there's something here for you.Don't just be a part of the conversation—lead it. Grow your agency empire with proven strategies from the front lines.#MyAgencyGuySummit #AgencyEvolution #DigitalMarketingInsights #AskStevenPope #AgencyAMATimestamps:00:00 - Introduction and Overview of My Agency Guy Service05:02 - Details on Today's Show Format09:52 - Start of Live AMA: Agency Growth and Challenges11:12 - Offering Additional Services and Summit Information11:18 - Introduction of First Guest: Thomas from Shipux LLC12:02 - Thomas Discusses His Business and Expansion Goals13:24 - Host Offers Business Expansion Strategies16:02 - Discussing Affiliate Relationships and Networking17:25 - Introduction of Next Guest: Josh from Seattle17:44 - Josh's Query on Managing Multiple Amazon Accounts19:05 - Detailed Discussion on Account Management Techniques20:24 - Addressing Account Suspension Concerns21:46 - Tips on Password Management and Employee Turnover24:41 - Introduction of Another Guest24:54 - Guest Shares His Progress and Seeks Advice27:46 - Strategies for Handling Demanding Clients29:29 - Preparing for Transition to Full-time Agency Work30:01 - Managing Time and Client Expectations32:39 - Tips on Navigating Client Relationships and Expansion34:13 - More on Amazon EU Expansion Challenges35:46 - Overview of the My Agency Guy Summit37:00 - Discussion on Acquiring Clients and Business Expansion38:04 - Insights on Effective Website Setup and Lead Generation38:51 - Strategies for Building a Potential Client Database39:05 - Exploring CRM Options for Agency Management42:43 - Discussion on Handling Challenging Clients and Business Scalability43:55 - Exploring Amazon and Walmart Services for Agency Expansion44:42 - Tips for Creating Engaging Content and Scaling an Agency45:46 - Strategies for Closing Deals and Managing Client Expectations47:00 - Evaluating the Pros and Cons of Expanding Services48:56 - Identifying and Focusing on Core Services for Agency Growth50:44 - Additional Insights on Agency Growth and Diversification51:05 - Discussion on Previous Amazon Business Experience and Contemplating New Ventures52:20 - Insights on Deciding Between Starting an Amazon Agency, New Product Line, or a YouTube Channel54:58 - Evaluating Skills and Determining Agency Direction57:14 - Exploring Different Business Models and Approaches for Agencies1:03:00 - Emphasizing the Importance of Creating Content and Sharing Expertise1:04:55 - Exploring Various Approaches to Agency Growth and Client Management1:06:00 - Conversations with Agency Owners About Business Development and Client Acquisition1:08:04 - Discussing Revenue Share Models and Negotiating Client Support the show

Roadmap To Grow Your Business
Ep #289: Life Proof Your Business

Roadmap To Grow Your Business

Play Episode Listen Later Dec 26, 2023 37:15


Are you prepared for unexpected challenges in your business? Learn how to life-proof your business with tips from our guest, Chelsea Brinkley. Life-proofing your business is attainable, even if you're a solopreneur, and it can significantly impact how your business adapts to various circumstances. Chelsea shares valuable insights and tips on how to create a business that can thrive and continue to succeed, even when you have to step away. I also share my personal experience of undergoing back surgery earlier this year and how my business not only survived but thrived during that time. Resources and links mentioned in this episode can be found on the show notes page at http://www.staceybrownrandall.com/289

WCCO Tech Talk
Password Management, Windows , and Much More!

WCCO Tech Talk

Play Episode Listen Later Dec 23, 2023 40:06


Putting a bow on 2023 in Tech Talk we chatted about password management, cleaning your devices, PrivaZer and much more as Doug Swinhart and Steve Thomson answer any of your tech questions to close out the year! 

Remarkable Results Radio Podcast
Security Strategies for Safe and Sound Marketing [E074] - The Auto Repair Marketing Podcast

Remarkable Results Radio Podcast

Play Episode Listen Later Nov 15, 2023 56:20


In this episode of the Auto Repair Marketing Podcast, host Kim Walker and her team at Shop Marketing Pros discuss the importance of marketing security. They provide tips on securing marketing assets, managing passwords, verifying identities on platforms like Facebook and Google, and identifying spam and scams. They also emphasize the importance of knowing who has access to your accounts and regularly reviewing this access. The team encourages shop owners to be proactive in securing their digital assets.Thank you to RepairPal for sponsoring The Auto Repair Marketing Podcast. Learn more about RepairPal at https://repairpal.com/shopsShow Notes with TimestampsAccount Access and Security (00:05:27) Discussion on the importance of being the primary account holder for your website, email, and Google listing, and the potential issues that can arise if you don't have access.Different Types of Access in Facebook (00:06:53) Explanation of the different levels of access in Facebook's business manager, including partial access for specific tasks and full access that allows partners to act as page owners.Assigning Access to Facebook and Instagram Accounts (00:08:23) Further discussion on assigning partial or full access to team members, marketing agencies, or other partners for Facebook and Instagram accounts.The importance of owning your Facebook page (00:08:29) Discussion on the importance of being the owner of your Facebook page and how to assign different accesses.Properly storing passwords (00:11:02) Discussion on different methods for storing passwords, including using Google, writing them down, and using password management tools like LastPass.Benefits of LastPass for password management (00:12:10) Discussion on the features and benefits of using LastPass, including the ability to store and share passwords securely, organize passwords in folders, and access passwords on both browsers and mobile devices.Identity Verification on Google Ads (00:19:05) Discussion on the requirement to verify Google Ads accounts with documentation and ID to eliminate fake advertisers and ensure legitimacy.Google Business Profiles Verification (00:22:24) Exploration of the verification process for Google business listings, including submitting documentation and a video of the shop's interior and exterior.Importance of Security and Password Management (00:15:45) Emphasis on the need for strong passwords, two-factor authentication, and the use of password managers like LastPass for enhanced security.The Google Business Profile (00:23:41) How to find and claim a Google Business Profile for a business, including ownership access and management access.Facebook Ownership and Levels (00:26:19) The different levels of ownership and access on Facebook and Instagram, including the importance of having a meta business account and a business manager.Facebook Ownership Dispute and Resolution (00:29:06) The process of resolving ownership disputes on Facebook, including submitting proof of business ownership and working with Facebook support.The security levels of Facebook accounts (00:32:46) Discusses the different levels of access on Facebook accounts and the importance of being cautious with granting admin privileges.Securing personal Facebook profiles (00:34:43) Provides tips on securing personal Facebook profiles, including setting friends list to private and enabling two-factor authentication.Identifying spam and scams on Facebook and Google (00:37:49) Explains how to recognize and handle spam and scams on Facebook and Google, specifically related to fake messages, emails, and ownership requests.Spam and Scam Emails for Google Business Listings (00:38:10) Discussion on how to identify and handle spam or scam emails...

The Auto Repair Marketing Podcast
Security Strategies for Safe and Sound Marketing [E074]

The Auto Repair Marketing Podcast

Play Episode Listen Later Nov 15, 2023 56:20


In this episode of the Auto Repair Marketing Podcast, host Kim Walker and her team at Shop Marketing Pros discuss the importance of marketing security. They provide tips on securing marketing assets, managing passwords, verifying identities on platforms like Facebook and Google, and identifying spam and scams. They also emphasize the importance of knowing who has access to your accounts and regularly reviewing this access. The team encourages shop owners to be proactive in securing their digital assets.Thank you to RepairPal for sponsoring The Auto Repair Marketing Podcast. Learn more about RepairPal at https://repairpal.com/shopsShow Notes with TimestampsAccount Access and Security (00:05:27) Discussion on the importance of being the primary account holder for your website, email, and Google listing, and the potential issues that can arise if you don't have access.Different Types of Access in Facebook (00:06:53) Explanation of the different levels of access in Facebook's business manager, including partial access for specific tasks and full access that allows partners to act as page owners.Assigning Access to Facebook and Instagram Accounts (00:08:23) Further discussion on assigning partial or full access to team members, marketing agencies, or other partners for Facebook and Instagram accounts.The importance of owning your Facebook page (00:08:29) Discussion on the importance of being the owner of your Facebook page and how to assign different accesses.Properly storing passwords (00:11:02) Discussion on different methods for storing passwords, including using Google, writing them down, and using password management tools like LastPass.Benefits of LastPass for password management (00:12:10) Discussion on the features and benefits of using LastPass, including the ability to store and share passwords securely, organize passwords in folders, and access passwords on both browsers and mobile devices.Identity Verification on Google Ads (00:19:05) Discussion on the requirement to verify Google Ads accounts with documentation and ID to eliminate fake advertisers and ensure legitimacy.Google Business Profiles Verification (00:22:24) Exploration of the verification process for Google business listings, including submitting documentation and a video of the shop's interior and exterior.Importance of Security and Password Management (00:15:45) Emphasis on the need for strong passwords, two-factor authentication, and the use of password managers like LastPass for enhanced security.The Google Business Profile (00:23:41) How to find and claim a Google Business Profile for a business, including ownership access and management access.Facebook Ownership and Levels (00:26:19) The different levels of ownership and access on Facebook and Instagram, including the importance of having a meta business account and a business manager.Facebook Ownership Dispute and Resolution (00:29:06) The process of resolving ownership disputes on Facebook, including submitting proof of business ownership and working with Facebook support.The security levels of Facebook accounts (00:32:46) Discusses the different levels of access on Facebook accounts and the importance of being cautious with granting admin privileges.Securing personal Facebook profiles (00:34:43) Provides tips on securing personal Facebook profiles, including setting friends list to private and enabling two-factor authentication.Identifying spam and scams on Facebook and Google (00:37:49) Explains how to recognize and handle spam and scams on Facebook and Google, specifically related to fake messages, emails, and ownership requests.Spam and Scam Emails for Google Business Listings (00:38:10) Discussion on how to identify and handle spam or scam emails...

The PeopleSoft Administrator Podcast
#339 - Uptime Monitoring

The PeopleSoft Administrator Podcast

Play Episode Listen Later Nov 11, 2023 38:07


This week on the podcast, Dan shares how he uses Heartbeat to track uptime in PeopleSoft and Kyle discusses the new Password Management features in Cloud Manager 16. Show Notes Uptime Monitoring with PeopleSoft @ 2:00 My Preferences Phone Number @ 16:00 Cloud Manager and Passwords @ 18:00 Graham Smith - Cloud Manager 16 Features psst - PeopleSoft Secrets Tool

Remarkable Results Radio Podcast
Network Security: Protecting Your Business [THA 352]

Remarkable Results Radio Podcast

Play Episode Listen Later Nov 2, 2023 48:32


Is your business prepared for cyber-attacks? It's not a question of 'if' it's a question of 'when.' Our panel discusses the importance of network security and protecting businesses from cyber threats. They emphasize the need for multiple layers of protection, including two-factor authentication, and caution against phishing attacks. They also highlight the importance of training employees to recognize such threats and having a proactive approach to cybersecurity. Let's stay ahead of potential threats and make it more difficult for hackers to target our businesses. Chris Cloutier is co-owner of Golden Rule Auto Care in Dallas Texas and CEO of Autoflow. Chris's previous episodes HERE Jay Mikulovich, founder and CEO of Revival Technology LLC. Stan Stokes, Founder & CEO of Iron Fist Marketing Consultants. Stan's previous episodes HERE Show Notes: Watch Full Video The importance of two-factor authentication (00:02:07) Explains the significance of using two-factor authentication to add an extra layer of security to passwords. The vulnerability of software packages (00:03:48) Discusses how no software is perfect and can have vulnerabilities, emphasizing the need for multiple layers of security. The dangers of phishing attacks (00:08:06) Explains the concept of phishing and how hackers use email to trick users into clicking on malicious links or attachments. The challenges of being reactive to security breaches (00:10:04) The difficulties of being reactive to security breaches and emphasize the importance of being proactive in protecting business operations. The vulnerabilities of relying on technology (00:11:24) The vulnerabilities of relying heavily on technology and the need for shop owners to understand their level of vulnerability and seek expert advice. The importance of backups and cybersecurity measures (00:20:38) Discussion on the need for backup plans, having multiple backups, and the importance of cybersecurity measures to protect against potential data loss or breaches. Difference between IT support and network security (00:23:39) Explaining the distinction between IT support and network security, and the importance of understanding and vetting service providers to ensure proactive cybersecurity measures are in place. Updating Network Security (00:27:58) Discussion on the importance of regularly updating network firewalls, equipment, and passwords to prevent hacking and security breaches. The Risks of Delaying Updates (00:28:51) Exploration of the consequences of not updating desktops, including vulnerabilities, outdated patches, and potential hacking threats. Password Management and Security (00:30:41) Advice on using password managers, generating unique passwords, and the importance of having strong, lengthy passwords to enhance security. The importance of strong passwords and data encryption (00:37:03) Discussion on the significance of using strong passwords and encrypting data to protect against cyber threats. Securing networks and vulnerabilities (00:37:54) Exploration of the importance of...

Talos Takes
How to find the right password management solution for you

Talos Takes

Play Episode Listen Later Oct 13, 2023 7:33


Third-party password managers can seem like a daunting, and unnecessary accessory to anyone's internet experience. They can be costly, and most people assume if they can remember their password, who cares? Turns out, if you can easily remember your password, an attacker could probably guess it eventually anyway. To continue our Cybersecurity Awareness Month series, Harpreet Singh from Talos Incident Response joins Jon to talk about password managers. They discuss the upside of using a third-party service like 1Password or LastPass, the potential dangers of using built-in browser password managers like Google Chrome and Safari, and other good password hygiene advice. 

MacVoices Video
MacVoices #23237: Joe Kissell Takes Control of Sonoma (2)

MacVoices Video

Play Episode Listen Later Sep 19, 2023


Our conversation with Joe Kissell, the author of Take Control of Sonoma, continues as we cover Sonoma's new or revised features that include menubar icons, Keychain Access, stickers, animations, and widgets. Joe gives us some cautions on a few Sonoma features, discusses Apple's new documentation for Sonoma, and more. (Part 2)  This edition of MacVoices is supported by MacVoices Magazine, our free magazine on Flipboard. Updated daily with the best articles on the web to help you do more with your Apple gear and adjacent tech, access MacVoices Magazine content on Flipboard, on the web, or in your favorite RSS reader. Show Notes: Chapters: 0:03:24 Mac OS: The Target Audience and Windows vs Widgets 0:06:12 Web Browser vs. App: Personal Preference 0:07:03 Apple's Lack of Exciting Features for Productivity 0:08:31 Challenges of Navigating Different Mac Setups 0:11:08 Annoying Menu Bar Icon and Screen Recording Permissions 0:12:31 Bartender App to Organize Menu Bar Icons 0:13:22 Annoyance with Bartender app and recording screen all the time 0:14:33 Apple's purple icon taking up space in menu bar 0:15:47 Additional security and privacy features in Safari 0:18:06 Keychain Access: The Most Hideous App You'll Ever Encounter 0:20:37 Frustration with Password Management in System Settings 0:22:03 Questioning Apple's Threat Model and User Experience 0:22:48 Introduction and Where to Get Joe's Book 0:24:48 The Value of Joe's Books and his Dedication to Helping Guests: Joe Kissell is the publisher of  Take Control ebooks, as well as the author of over 60 books on a wide variety of tech topics. Keep up with him if you can on his personal site, JoeKissell.com, and on Twitter. Support: Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect: Web:      http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices Mastodon:      https://mastodon.cloud/@chuckjoiner Facebook:      http://www.facebook.com/chuck.joiner MacVoices Page on Facebook:      http://www.facebook.com/macvoices/ MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice LinkedIn:      https://www.linkedin.com/in/chuckjoiner/ Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

MacVoices Audio
MacVoices #23237: Joe Kissell Takes Control of Sonoma (2)

MacVoices Audio

Play Episode Listen Later Sep 19, 2023 28:46


Our conversation with Joe Kissel, the author of Take Control of Sonoma, continues as we cover Sonoma's new or revised features that include menubar icons, Keychain Access, stickers, animations, and widgets. Joe gives us some cautions on a few Sonoma features, discusses Apple's new documentation for Sonoma, and more. (Part 2)  This edition of MacVoices is supported by MacVoices Magazine, our free magazine on Flipboard. Updated daily with the best articles on the web to help you do more with your Apple gear and adjacent tech, access MacVoices Magazine content on Flipboard, on the web, or in your favorite RSS reader. Show Notes: Chapters: 0:03:24 Mac OS: The Target Audience and Windows vs Widgets 0:06:12 Web Browser vs. App: Personal Preference 0:07:03 Apple's Lack of Exciting Features for Productivity 0:08:31 Challenges of Navigating Different Mac Setups 0:11:08 Annoying Menu Bar Icon and Screen Recording Permissions 0:12:31 Bartender App to Organize Menu Bar Icons 0:13:22 Annoyance with Bartender app and recording screen all the time 0:14:33 Apple's purple icon taking up space in menu bar 0:15:47 Additional security and privacy features in Safari 0:18:06 Keychain Access: The Most Hideous App You'll Ever Encounter 0:20:37 Frustration with Password Management in System Settings 0:22:03 Questioning Apple's Threat Model and User Experience 0:22:48 Introduction and Where to Get Joe's Book 0:24:48 The Value of Joe's Books and his Dedication to Helping Guests: Joe Kissell is the publisher of  Take Control ebooks, as well as the author of over 60 books on a wide variety of tech topics. Keep up with him if you can on his personal site, JoeKissell.com, and on Twitter. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss 00:03:24 Mac OS: The Target Audience and Windows vs Widgets 00:06:11 Web Browser vs. App: Personal Preference 00:07:02 Apple's Lack of Exciting Features for Productivity 00:08:30 Challenges of Navigating Different Mac Setups 00:11:07 Annoying Menu Bar Icon and Screen Recording Permissions 00:12:30 Bartender App to Organize Menu Bar Icons 00:13:21 Annoyance with Bartender app and recording screen all the time 00:14:33 Apple's purple icon taking up space in menu bar 00:15:47 Additional security and privacy features in Safari 00:18:05 Keychain Access: The Most Hideous App You'll Ever Encounter 00:20:36 Frustration with Password Management in System Settings 00:22:02 Questioning Apple's Threat Model and User Experience 00:22:47 Introduction and Where to Get Joe's Book 00:24:48 The Value of Joe's Books and his Dedication to Helping

Cybercrime Magazine Podcast
Cybersecurity Elevator Pitch: Password Management & Online Security. Provided By Dashlane.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 5, 2023 1:05


Dashlane stores and auto-fills login credentials across all devices, seamlessly providing a hassle-free and secure login experience for all users. In one click, old, weak passwords will be transformed into strong, unbreakable ones, ensuring the highest level of protection for all of your accounts. For more information, visit https://dashlane.com

Federal Contracting Made Easy's podcast
Streamline Your Day: BOOST Your Productivity With AUTOMATION

Federal Contracting Made Easy's podcast

Play Episode Listen Later May 23, 2023 1:58


In this video/podcast, we will explore the topic of boosting productivity through automation. We'll discuss various tools and techniques that can help you streamline your day, saving time and energy. By harnessing the power of automation, you can focus on important tasks and achieve more efficiency in your daily workflow. Zapier and IFTTT: Zapier and IFTTT (If This Then That) are powerful automation platforms that allow you to connect different apps and services. They work on the principle of triggers and actions, enabling you to create automated workflows, known as "Zaps" or "Applets." These tools eliminate the need for repetitive manual tasks by automating them. For example, you can automatically save email attachments to cloud storage or create a task in your to-do list when a new email arrives. Email Templates: Composing similar emails repeatedly can be time-consuming. Email templates are pre-written messages that can be customized and reused for common scenarios. By using email templates, you can save time and maintain consistency in your communication. Many email clients and productivity tools offer built-in or customizable templates, making it easy to respond to inquiries, schedule meetings, or send follow-ups quickly. Calendly or Doodle: Scheduling meetings can be a hassle, especially when coordinating with multiple participants. Tools like Calendly and Doodle simplify the process by allowing you to share your availability and let others choose a suitable time slot. These tools integrate with your calendar and eliminate the back-and-forth emails or messages involved in scheduling. With just a few clicks, you can efficiently manage your appointments and save valuable time. LastPass or 1Password: Remembering multiple passwords for different accounts can be a daunting task. Password managers like LastPass and 1Password securely store your login credentials, generating strong passwords and auto-filling them when needed. By using a password manager, you can improve security, save time, and reduce the frustration of password management. Additionally, these tools often offer features like secure note storage, form filling, and synchronization across devices. RescueTime or Toggl: Maintaining focus and tracking time spent on various tasks is crucial for productivity. RescueTime and Toggl are productivity apps that help you analyze and manage your time effectively. RescueTime runs in the background, tracking your activity on different applications and websites. It provides detailed reports on your time usage, allowing you to identify time sinks and make informed decisions. Toggl, on the other hand, is a time-tracking tool that lets you log the time you spend on specific tasks or projects. By understanding how you allocate your time, you can optimize your workflow and prioritize important activities. Conclusion: Automation tools such as Zapier, IFTTT, email templates, scheduling apps like Calendly or Doodle, password managers like LastPass or 1Password, and productivity trackers like RescueTime or Toggl can significantly enhance your productivity by minimizing repetitive tasks, optimizing scheduling, simplifying password management, and providing insights into your time allocation. By incorporating these automation techniques into your daily routine, you can streamline your day and focus on what truly matters, ultimately achieving greater efficiency and productivity.

Great Things with Great Tech!
Collaborative Password Management with Passbolt | Episode #65

Great Things with Great Tech!

Play Episode Listen Later May 18, 2023 39:41


Redefining Password Management focusing on Security, Privacy, and Collaboration! In this episode, I'm joined by Kevin Muller, Founder & CEO of Passbolt, a company transforming how businesses handle passwords with its open-source platform that emphasizes security, transparency, and user privacy. We dive deep into the company's inception, unique security features, the balance between security and usability, and Passbolt's vision for the future. In light of the rising importance of cybersecurity, we also discuss Passbolt's response to notable security incidents and its approach to ongoing challenges in password management and how they aim to make password management more secure and manageable for teams and enterprises. Passbolt was founded in 2011 and headquartered in Luxembourg ☑️ Support the Channel by buying a coffee? - https://ko-fi.com/gtwgt ☑️ Technology and Technology Partners Mentioned: OpenPGP, KeyPass, DevOps, FIDO Alliance, KeyCloak ☑️ Web: https://www.passbolt.com ☑️ UI Walkthrough Video: ⁠https://www.youtube.com/watch?v=XD3lZFyniCE ☑️ Crunch Base Profile: https://www.crunchbase.com/organization/passbolt ☑️ Interested in being on #GTwGT? Contact via Twitter @GTwGTPodcast or go to https://www.gtwgt.com ☑️ Subscribe to YouTube: https://www.youtube.com/@GTwGTPodcast?sub_confirmation=1 Web - https://gtwgt.com Twitter - https://twitter.com/GTwGTPodcast Spotify - https://open.spotify.com/show/5Y1Fgl4DgGpFd5Z4dHulVX Apple Podcasts - https://podcasts.apple.com/us/podcast/great-things-with-great-tech-podcast/id1519439787 ☑️ Music: https://www.bensound.com

The Security Podcasts
How AI and other technologies have changed password management

The Security Podcasts

Play Episode Listen Later May 3, 2023 7:58


New technologies such as AI have shifted conversations around best practices for password management. As much as AI can be a great help to protecting credentials, there have also been instances of it making it easier for cybercriminals to hack into accounts. Find out more in this episode of the Security podcast with Parteek Saran, founder and CEO of Uno. In this episode, Saran discusses the impact of human error and the need for complex passwords. Saran also encourages security leaders to properly train their employees on how to best protect their credentials. 

The Security Podcasts
How AI and other technologies have changed password management

The Security Podcasts

Play Episode Listen Later May 3, 2023 7:58


New technologies such as AI have shifted conversations around best practices for password management. As much as AI can be a great help to protecting credentials, there have also been instances of it making it easier for cybercriminals to hack into accounts. Find out more in this episode of the Security podcast with Parteek Saran, founder and CEO of Uno. In this episode, Saran discusses the impact of human error and the need for complex passwords. Saran also encourages security leaders to properly train their employees on how to best protect their credentials. 

Healthcare Entrepreneur Academy Podcast
#318: Automating Business Processes with Workflow, Tools and AI to Improve Efficiency

Healthcare Entrepreneur Academy Podcast

Play Episode Listen Later Mar 21, 2023 24:59


OVERVIEW: “Efficiency is doing better what is already being done.” – Peter Drucker   Jason A. Duprat, Entrepreneur, Healthcare Practitioner, and Host of the Healthcare Entrepreneur Academy podcast, talks about the importance of systems and processes. In business, every single second of every single team member counts, so in this episode, Jason teaches us how to streamline workflows and maximize efficiency and productivity through automation, software, and A.I. tools. Tune in until the end to learn more about Jason's book!   3 KEY POINTS: Document every step of your team's tasks or job functions. Use software tools to lessen the risk of human errors. Build systems and processes while your business is still small or has yet to start.   EPISODE HIGHLIGHTS: All businesses run on a series of workflows, wherein much of what our team members or we do is repetitive. In today's episode, Jason runs us through his repetitive workflow when producing and publishing his podcast as an example. Jason learned some of his workflow efficiency strategies from Richard Winters, part of his Mastermind Group and a previous guest on this podcast. Document every step of your or your team's tasks or job functions. A summary of Jason's workflow is that he records his podcast episodes and uploads the individual audio and video files on Google Drive to pass on to his podcast team. The team then has its own workflow with multiple steps from editing to publishing. All the individual steps in these processes require multiple clicks and much time. We can optimize any workflow by reducing repetitive tasks to a minimum. To help streamline his business processes, Jason ensures he's always up-to-date with the latest software and technology and utilizes whatever is most beneficial. Jason used to record his Podcast with his Rodecaster Pro and transfer the files to his desktop afterward. To make things easier, he now records on Riverside.fm and pairs it with Zapier to automatically upload his recordings to Google Drive and notify his team. The Healthcare Entrepreneur Academy Podcast uses Libsyn as its hosting platform. One of Libsyn's great features is connecting to Jason's website on WordPress, wherein published episodes will automatically be uploaded to Jason's page. Jason and his team use software and A.I. tools for various purposes: Recording Editing, Project Management, Password Management, and many more. Software tools not only improve efficiency. They help reduce human errors. A Standard Operating Procedure (S.O.P.) is a step-by-step list of instructions for doing something in your business. Start utilizing S.O.P.s, software tools, and automation strategies while your business is small. Once your business grows and is at max capacity, it'll be difficult to build these systems. A benefit of having S.O.P.s is it makes turnovers easier, as all the tasks new people need to be trained on are all located in the same place.   TWEETABLE QUOTES:   "Anytime a human is involved in anything, there's a chance of making errors. Software tools and automation help make workflow less error-prone." – Jason A. Duprat   "Build your systems and processes while your business is still small or before you even start your practice. It's hard to focus on this when your business has grown to at almost max capacity." – Jason A. Duprat   CONNECT WITH JASON DUPRAT LinkedIn | Facebook | Instagram | Youtube Email: support@jasonduprat.com Join our Facebook group: https://jasonduprat.com/group    RESOURCES Want to become a Ketamine Therapy provider? Enroll NOW in The Ketamine Academy course: https://ketamineacademy.com/presentation Sign up for one of our free business start-up Masterclasses at https://jasonduprat.com/freemasterclass.  Have a healthcare business question? Want to request a podcast topic? Text me at 407-972-0084, and I'll add you to my contacts. Occasionally, I'll share important announcements and answer your questions as well. I'm excited to connect with you! Do you enjoy our podcast? Leave a rating and review: https://lovethepodcast.com/hea.  Don't want to miss an episode? Subscribe and follow https://followthepodcast.com/hea.   RELATED EPISODES: #307: TACTICAL TUESDAY: THE RAPID GROWTH OF AI & OPPORTUNITIES IT MEANS FOR YOU #244: TACTICAL TUESDAY: THE CHALLENGES OF CHANGE PLUS EXCITING NEW UPDATES #126: TACTICAL TUESDAY: MY TOP 10 LIST FOR MUST-HAVE SOFTWARE   #HealthcareEntrepreneurAcademy #healthcare #HealthcareBoss #entrepreneur #entrepreneurship #podcast #businessgrowth #teamgrowth #digitalbusiness    

Best Laid Plans
Feb Q&A: Planning Gender Divide, Password Management, Planning in Pregnancy, and Overwhelm with Annual Goals EP 134

Best Laid Plans

Play Episode Listen Later Feb 20, 2023 27:53


In this Q&A episode, after sharing a multi-level Planner Peace segment from listener Emilie, Sarah addresses multiple questions and topics from listeners, including: Passwords + longer term lists - where to store? Planning during pregnancy - from first tri fatigue to what to prioritize How to ease into planning when the annual goals list becomes overwhelming 2 pro tips (a fun use for blank pages + blotting paper) Planning gender divide Resources: BLPA info: https://theshubox.com/blpa Email: sarah.hart.unger@gmail.com Voice questions: https://www.speakpipe.com/bestlaidplans Send me a text or voice memo - (305) 697-7189 Sign up for my newsletter: https://theshubox.com/newsletter Leave me a review if you can (Apple Podcasts Link: https://podcasts.apple.com/us/podcast/best-laid-plans/id1525311647) Episode Sponsors: PrepDish: Easy and healthy weekly meal plans, complete with recipes and prep instructions! PrepDish is offering listeners a free 2-week trial to try it out, so go to PrepDish.com/plans to activate your trial! Learn more about your ad choices. Visit megaphone.fm/adchoices

Apple @ Work
Building a healthy password management ecosystem

Apple @ Work

Play Episode Listen Later Jan 24, 2023 27:11


Apple @ Work is brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that fully integrates 5 different applications on a single Apple-only platform, allowing Businesses to easily and automatically deploy, manage & protect all their Apple devices. Over 38,000 organizations leverage Mosyle solutions to automate the deployment,  management, and security of millions of Apple devices daily. Request a FREE account today and discover how you can put your Apple fleet on auto-pilot at a price point that is hard to believe. In this episode of Apple @ Work, Bradley chats with Gary Orenstein from Bitwarden about self hosting, FIDO, open standards, the acquisition of Passwordless.dev, and the role of healthy password management in the enterprise. Links: Connect with Gary on LinkedIn Bitwarden Bitwarden acquires passwordless authentication startup Passwordless.dev Connect with Bradley Nostr Twitter LinkedIn Listen and subscribe Apple Podcasts Overcast Spotify Pocket Casts Castro RSS Listen to Past Episodes Apple @ Work is brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that fully integrates 5 different applications on a single Apple-only platform, allowing Businesses to easily and automatically deploy, manage & protect all their Apple devices. Over 38,000 organizations leverage Mosyle solutions to automate the deployment,  management, and security of millions of Apple devices daily. Request a FREE account today and discover how you can put your Apple fleet on auto-pilot at a price point that is hard to believe.

Great Things with Great Tech!
Open Source Password Security for Everyone with Bitwarden | Episode #57

Great Things with Great Tech!

Play Episode Listen Later Jan 12, 2023 39:36


In this episode I talk with Ryan Luibrand, Senior Product Manager at Bitwarden. Bitwarden is an open-source password management solution for individuals, teams, and business organizations. It enables users to store, share, and sync sensitive data. In this episode Ryan and I talk about how Bitwarden provides an open-source password management solution for individuals, teams, and enterprises. Bitwarden emphasizes the importance of code transparency and regular security assessments, and offers a free version to ensure that password security is accessible to everyone. The company's founder, Kyle Spearrin, started the company with the goal of making password management easier and more secure for both developers and everyday users. The company's growth strategy is to continue to provide professional support for their open-source platform and to prioritize customer satisfaction and community engagement. Bitwarden was founded in 2015 and is headquartered in Santa Barbara, California. ☑️ Support the Channel by buying a coffee? - https://ko-fi.com/gtwgt ☑️ Technology and Technology Partners Mentioned: OSS, Windows, Linux, Docker, Password Management, Azure ☑️ Raw Talking Points: What constitutes a password manager Personal plus Business MSP About Open Source Software Code Repos Self Host with Docker Linux/Mac/Windows pros/cons About Bitwarden Vault Security About the Bitwarden Security Audit What is Bitwarden Send? Zero Knowedgle Architecture Data Compliance SaaS Azure? Web and Mobile Cybersecurity Transparency Individual and Business impact Self Hosting, tinkering element tech ☑️ Web: https://bitwarden.com/ ☑️ Self Hosted Info: https://bitwarden.com/blog/new-deployment-option-for-self-hosting-bitwarden ☑️ Zero Knowledge White Paper: https://bitwarden.com/resources/zero-knowledge-encryption-white-paper ☑️ Crunch Base Profile: https://www.crunchbase.com/organization/bitwarden ☑️ Interested in being on #GTwGT? Contact via Twitter @GTwGTPodcast or go to https://www.gtwgt.com ☑️ Subscribe to YouTube: https://www.youtube.com/@GTwGTPodcast?sub_confirmation=1 ☑️ Music: https://www.bensound.com

iPad Pros
M2 iPad Pro, Ferrite 3, HomeKit and More with Stephen Robles (iPad Pros - 0162)

iPad Pros

Play Episode Listen Later Jan 5, 2023 56:29


Stephen Robles joins us from Apple Insider. He was last on for episode 133. In this episode we touch on a bunch of different topics including HomeKit, networking, the M2 iPad Pro, Ferrite 3, Network Attached Storage, DaVinci Resolve versus Final Cut, and Password Management. You can find his videos at YouTube.com/@BeardFMBonus content and early episodes with chapter markers are available by supporting the podcast at www.patreon.com/ipadpros. Bonus content and early episodes are also now available in Apple Podcasts! Subscribe today to get instant access to iPad Possibilities, iPad Ponderings, and iPad Historia! New episodes of the bonus shows release the first week of every month. Show notes are available at www.iPadPros.net. Feedback is welcomed at iPadProsPodcast@gmail.com.Chapter Markers00:00:00: Opening00:01:38: Stephen Robles00:07:31: NAS00:08:51: Mesh Networks and Ethernet 00:14:42: New iPads00:15:52: HomeKit Upgrade00:23:47: M2 iPad Pro and Ferrite 300:34:06: ProRes?00:35:25: Final Cut vs DaVinci Resolve?00:38:58: New HomeKit Gear?00:40:39: Any new iPad apps?00:42:23: Backing up podcasts00:46:21: Password Management 00:48:28: Advanced Data Protection00:54:05: Anything else?00:55:27: YouTube.com/@BeardFM00:55:48: Closing Hosted on Acast. See acast.com/privacy for more information.

Hacker Public Radio
HPR3715: Secret hat conversations, Part 2.

Hacker Public Radio

Play Episode Listen Later Oct 28, 2022


Quantum computing Quantum computing is a type of computation whose operations can harness the phenomena of quantum mechanics, such as superposition, interference, and entanglement. Devices that perform quantum computations are known as quantum computers. Though current quantum computers are too small to outperform usual (classical) computers for practical applications, larger realizations are believed to be capable of solving certain computational problems, such as integer factorization (which underlies RSA encryption), substantially faster than classical computers. Today’s quantum systems only include tens or hundreds of entangled qubits, limiting them from solving real-world problems. To achieve quantum practicality, commercial quantum systems need to scale to over a million qubits and overcome daunting challenges like qubit fragility and software programmability. Quantum computers, if they mature enough, will be able to crack much of today's encryption. That'll lay bare private communications, company data and military secrets. Today's quantum computers are too rudimentary to do so. But data surreptitiously gathered now could still be sensitive when more powerful quantum computers come online in a few years. Simple passwords can be cracked using brute force; this is where an attacker uses tools that try every possible password until the correct one is found. This generally done using a dictionary attack, where an attacker will try known passwords and words until they find the one that unlocks an account. There are databases available on the internet that contain personal names as well as dictionary and slang words, in scores of languages, along with passwords found in data breaches, and more. Encryption. The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryption converts data to an unintelligible form called ciphertext; decrypting the ciphertext converts the data back into its original form, called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. The National Security Agency (NSA) reviewed all the AES finalists, including Rijndael, and stated that all of them were secure enough for U.S. Government non-classified data. In June 2003, the U.S. Government announced that AES could be used to protect classified information: For cryptographers, a cryptographic "break" is anything faster than a brute-force attack – i.e., performing one trial decryption for each possible key in sequence. A break can thus include results that are infeasible with current technology. Despite being impractical, theoretical breaks can sometimes provide insight into vulnerability patterns. The largest successful publicly known brute-force attack against a widely implemented block-cipher encryption algorithm was against a 64-bit RC5 key by distributed.net in 2006. Password Management. Bitwarden KeepassXC Tips for creating a strong password Enable Two-Factor authentication whenever possible. While a great passphrase will help secure you and the Commonwealth’s data, a second factor makes it that much more difficult for hackers to gain access. Password Generation. pwgen : found in most linux repos Man page for pwgen Example : pwgen -y 50 3 : generates a 50 character password with symbols, with 3 choices Google and Amazon are listening CNET article on Google and Amazon "I don't blame anyone who doesn't want to fill their house with cameras and microphones, but I also don't blame anyone who's willing to trade some of their data with a company they feel comfortable with in order to bring some new convenience and utility into their lives. It's nearly impossible to navigate today's age without making trades like that on a daily basis." What is Web Scraping? Web scraping is an automatic method to obtain large amounts of data from websites. What is Machine Learning? Machine Learning, as the name says, is all about machines learning automatically without being explicitly programmed or learning without any direct human intervention. This machine learning process starts with feeding them good quality data and then training the machines by building various machine learning models using the data and different algorithms. The October Suprise. The fruit of the poisonous tree. This Is the Data Facebook Gave Police to Prosecute a Teenager for Abortion. Google is giving data to police based on search keywords, court docs show. Google bans dad for ‘child porn’ after he sent pics of toddler’s swollen genitals to doctor. Proton VPN Transparency Report & Warrant Canary.

Nurture Small Business
How to Incorporate Gen Z Into Your Company's Technology

Nurture Small Business

Play Episode Listen Later Oct 10, 2022 25:37


Hackers are finding more creative ways to hold your data hostage every day. To keep them at bay and protect your business, every team member needs to be in the know about your security plan. Denis O'Shea, founder of Mobile Mentor, sheds light on what dramatic changes in business tech could mean for you. Once central to security, passwords are phasing out in favor of multi-factor authentication and biometrics. As our tools and technology evolve, so do workers' perceptions of data protection. Years of data show that personal privacy is one of the biggest concerns of many Gen Z workers. Meanwhile, company security is out of sight and out of mind for this generation. To get your entire team on board with security measures, it will take a new approach. Listen in to the ideas that Denis recommends. About Your Host DCA Virtual Business Support President Denise Cagan has been working with small businesses for over 20 years. She has served on the boards of professional organizations such as Business Leaders of Charlotte (BLOC) and the National Association of Women Business Owners Charlotte (NAWBO). Denise is also a graduate of the Goldman Sachs 10,000 Small Business Program, which is a program for small businesses that links learning to action for growth-oriented entrepreneurs. Denise is recognized as a facilitator, problem solver, and builder. She enjoys speaking to business groups about social media for small businesses and motivating remote and work from home (WFH) teams. She holds a Bachelor of Science in Quality Systems Management from James Madison University. She has extensive experience in helping small businesses grow through outsourcing solutions providing administrative, creative, marketing, and website support. Connect with Denise DCA Virtual Business Support website. View and listen to Podcasts with Denise Cagan LinkedIn 

Paul's Security Weekly TV
Funding Rounds Rebound, Bitwarden Password Management, Cymulate, & Ethereum's Merge - ESW #288

Paul's Security Weekly TV

Play Episode Listen Later Sep 17, 2022 49:59


In the Enterprise Security News for this week: Funding rounds are back!, Bitwarden rasies $100M for password management Cymulate raises $70M, and a ton more Series A, Series B, and Seed announcements from vendors just coming out of stealth, Ethereum's merge completes and moves to proof of stake, Some updates on the Twitterpocalypse, The latest in annoying buzzword innovation, and some Cyber Insurance trends that I promise are interesting!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw288

Brothers in Tech
Password Management

Brothers in Tech

Play Episode Listen Later Jun 23, 2022 74:24


Although we think the days of creating and remembering hundreds of passwords are numbered, this is still very much a part of our day to day lives. So, how do you keep track of all of these passwords? In this episode of Brothers in Tech, the Brothers discuss the pros and cons of a variety of password management options. From sticky notes to biometrics…we have you covered! And, although you may still choose to use “password” or “12345” as your passwords, at least we will have a more secure way of managing them! Products/Apps mentioned in this episode: LastPass, 1Password, Keeper, Dashlane, Apple Passkeys Your Hosts:Alan Jackson (the older Brother) is a producer of online content with Jackson Creative and survey researcher with Jackson Insight.Brian Jackson (the younger Brother) is an Associate Professor of Kinesiology at Pacific University and Consultant at Senaptec, Inc.Have any feedback for the Brothers regarding this topic (or future topics)? Visit www.Brothers-In-Tech.com or email info@themesh.tv.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

HAYVN Hubcast
IT: Best Practices for Secure Password Management EP: 28

HAYVN Hubcast

Play Episode Listen Later Feb 14, 2022 21:45


It's been reported that over 85% of data breaches that happen are due to weak passwords. The usual signs of a weak password are using your pet's name, recycling the same few passwords repeatedly, or using your date of birth and any family or friend names. Linda Kuppersmith is not only the President and Chief Technology Advisor of CMIT Solutions, but she is also on the HAYVN board of advisors. She's joining us in the second part of this “All Things IT” series to address what best practices you should follow for more secure password management. Cybercriminals are making $4 trillion globally Key highlights: Password theft is a problem for everyone How a password vault works Why to use second factor authentication When to get IT support  “I'm looking to be able to save the world one password at a time.” Password Tips: Get your passwords into one place and categorize Select 4 random words connected with numbers and symbols in between. Change your passwords frequently Check out more Tech Tips here. Connect with IT expert Linda Kuppersmith: Website Email Connect with Nancy: NancySheed.com