Podcasts about Password management

  • 114PODCASTS
  • 132EPISODES
  • 35mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Oct 1, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Password management

Latest podcast episodes about Password management

RunAs Radio
HaveIBeenPwned with Troy Hunt

RunAs Radio

Play Episode Listen Later Oct 1, 2025 41:01


How do you know if one of your accounts has been part of a security breach? Richard chats with Troy Hunt about HaveIBeenPwned, a free service that allows individuals to receive notifications when their accounts appear in a security breach. Troy discusses other services available alongside HaveIBeenPwned for sysadmins, including password checking, identifying accounts associated with a specific domain, and more. When considering the cost of managing a customer with an exploited account, being able to prevent or mitigate potential risk is highly valuable. LinksHaveIBeenPwnedPark Mobile SettlementSnowflake Data BreachRecorded September 25, 2025

Ask The Tech Guys (Audio)
HOT 230: Cross-Platform Password Management - Picking the Right Password Manager

Ask The Tech Guys (Audio)

Play Episode Listen Later Aug 24, 2025 10:27


On Hands-On Tech, Mikah helps out viewer Jim with selecting a new password manager. Send in your questions for Mikah to answer on the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

All TWiT.tv Shows (MP3)
Hands-On Tech 230: Cross-Platform Password Management

All TWiT.tv Shows (MP3)

Play Episode Listen Later Aug 24, 2025 10:27 Transcription Available


On Hands-On Tech, Mikah helps out viewer Jim with selecting a new password manager. Send in your questions for Mikah to answer on the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

The Tech Guy (Video HI)
HOT 230: Cross-Platform Password Management - Picking the Right Password Manager

The Tech Guy (Video HI)

Play Episode Listen Later Aug 24, 2025 10:27


On Hands-On Tech, Mikah helps out viewer Jim with selecting a new password manager. Send in your questions for Mikah to answer on the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Hands-On Tech (Video HD)
HOT 230: Cross-Platform Password Management - Picking the Right Password Manager

Hands-On Tech (Video HD)

Play Episode Listen Later Aug 24, 2025 10:27


On Hands-On Tech, Mikah helps out viewer Jim with selecting a new password manager. Send in your questions for Mikah to answer on the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Hands-On Tech (MP3)
HOT 230: Cross-Platform Password Management - Picking the Right Password Manager

Hands-On Tech (MP3)

Play Episode Listen Later Aug 24, 2025 10:27


On Hands-On Tech, Mikah helps out viewer Jim with selecting a new password manager. Send in your questions for Mikah to answer on the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Hands-On Tech (Video HI)
HOT 230: Cross-Platform Password Management - Picking the Right Password Manager

Hands-On Tech (Video HI)

Play Episode Listen Later Aug 24, 2025 10:27 Transcription Available


On Hands-On Tech, Mikah helps out viewer Jim with selecting a new password manager. Send in your questions for Mikah to answer on the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Total Mikah (Audio)
Hands-On Tech 230: Cross-Platform Password Management

Total Mikah (Audio)

Play Episode Listen Later Aug 24, 2025 10:27 Transcription Available


On Hands-On Tech, Mikah helps out viewer Jim with selecting a new password manager. Send in your questions for Mikah to answer on the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Cyber Security Headlines
Google issues Chrome security update, ICC targeted by new attack, Microsoft nixes Authenticator password management

Cyber Security Headlines

Play Episode Listen Later Jul 2, 2025 7:23


Chrome Zero-Day CVE-2025-6554 under active attack — Google issues security update International Criminal Court targeted by new ‘sophisticated' attack Kelly Benefits says 2024 data breach impacts 550,000 customers, Esse Health says recent data breach affects over 263,000 patients Huge thanks to our sponsor, Palo Alto Networks You're moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. Cortex Cloud by Palo Alto Networks bridges this divide, unifying teams and stopping attacks with real-time cloud security that includes AI-powered protection, detection and automated response capabilities. Threats are stopped in minutes instead of days, and teams can finally protect cloud environments at the speed and scale of modern attacks. To learn more about how Cortex Cloud stops cloud attacks before they become breaches, visit: paloaltonetworks.com/cortex/cloud-detection-and-response

Social Entrepreneur with Nathan A Webster
EP 264 - AI and Cybersecurity Risks for Small Businesses

Social Entrepreneur with Nathan A Webster

Play Episode Listen Later Jun 30, 2025 23:32


Nathan interviews Mark Tishenko, founder of edgefi, discussing the critical intersection of cybersecurity and AI. Mark emphasizes the need for proactive measures against internal and external threats and the role of AI in shaping the future of cybersecurity. Cybersecurity is essential for protecting businesses from various threats, including phishing attacks, because most cybersecurity threats originate from within organizations, often due to human error. Guest Name: Mark Tishenko Title: Founder and CEO  Company: edgefi LinkedIn: https://www.linkedin.com/in/marktishenko/ Website: ‪https://edgefi.com/  

THE VALLEY CURRENT®️ COMPUTERLAW GROUP LLP
The Valley Current®: Why Are Cybersecurity Breaches Inevitable?

THE VALLEY CURRENT®️ COMPUTERLAW GROUP LLP

Play Episode Listen Later Jun 4, 2025 27:06


Is anyone safe in today's digital battlefield? In today's episode of The Valley Current®, host Jack Russo is joined by tech-savvy CPA Steve Rabin to unpack why cybersecurity breaches are no longer a matter of if but when. From fake clients to data-wiping hacks, they reveal how everyone from elderly investors to high-powered business professionals is a target. Password management, multi-factor authentication, and shifting liability to fiduciaries may be your best defenses. Don't just plan for recovery, focus on prevention! No one is too small to be a target.   https://taxservice2u.com/ https://www.washingtonpost.com/national-security/2025/05/02/cia-layoffs-trump-administration/?carta-url=https%3A%2F%2Fs2.washingtonpost.com%2Fcar-ln-tr%2F4261ab8%2F6815e92a08718a083aa424c3%2F596962349bbc0f4b7754a9b5%2F11%2F59%2F6815e92a08718a083aa424c3   Jack Russo Managing Partner Jrusso@computerlaw.com www.computerlaw.com https://www.linkedin.com/in/jackrusso "Every Entrepreneur Imagines a Better World"®️  

Breakfast with Refilwe Moloto
What the Hack! Safety tech leads at Auto Shanghai and more

Breakfast with Refilwe Moloto

Play Episode Listen Later Apr 29, 2025 7:21


In this week’s edition of What the Hack! on CapeTalk, Arthur Goldstuck joined John Maytham to explore the shift towards vehicle safety at the Auto Shanghai 2025 expo, unpack the power (and challenges) of the new Acer Predator Connect W6x Wi-Fi router, preview Meta’s LlamaCon and its AI ambitions, and share expert advice for World Password Day on how to better protect your online accounts. Good Morning Cape Town with Lester Kiewit is a podcast of the CapeTalk breakfast show. This programme is your authentic Cape Town wake-up call. Good Morning Cape Town with Lester Kiewit is informative, enlightening and accessible. The team’s ability to spot & share relevant and unusual stories make the programme inclusive and thought-provoking. Don’t miss the popular World View feature at 7:45am daily. Listen out for #LesterInYourLounge which is an outside broadcast – from the home of a listener in a different part of Cape Town - on the first Wednesday of every month. This show introduces you to interesting Capetonians as well as their favourite communities, habits, local personalities and neighbourhood news. Thank you for listening to a podcast from Good Morning Cape Town with Lester Kiewit. Listen live – Good Morning CapeTalk with Lester Kiewit is broadcast weekdays between 06:00 and 09:00 (SA Time) https://www.primediaplus.com/station/capetalk Find all the catch-up podcasts here https://www.primediaplus.com/capetalk/good-morning-cape-town-with-lester-kiewit/audio-podcasts/good-morning-cape-town-with-lester-kiewit/ Subscribe to the CapeTalk daily and weekly newsletters https://www.primediaplus.com/competitions/newsletter-subscription/ Follow us on social media: CapeTalk on Facebook: www.facebook.com/CapeTalk   CapeTalk on TikTok: www.tiktok.com/@capetalk   CapeTalk on Instagram: www.instagram.com/capetalkza  CapeTalk on X: www.x.com/CapeTalk  CapeTalk on YouTube: www.youtube.com/@CapeTalk567  See omnystudio.com/listener for privacy information.

The Empowered Parent with Dana Baltutis
Episode 56: Craig Clarke (Cybersecurity Expert) - Safeguarding Families in the Digital Age Through Practical Technology and Privacy Strategies

The Empowered Parent with Dana Baltutis

Play Episode Listen Later Feb 5, 2025 45:46 Transcription Available


Send us a textUnlock the secrets of keeping your family safe in the digital world with insights from our guest, Craig Clarke, a cybersecurity expert passionate about bridging technology and parenting. As children spend more time online for school and play, understanding cybersecurity beyond antivirus software is crucial. Craig shares practical advice for aligning school and home safety practices, from reviewing school cybersecurity policies to choosing secure devices like Chromebooks for their robust safety features and cloud-based efficiency.Explore the nuances of password management and technology awareness with us. Craig highlights the differences between popular communication platforms like Microsoft Teams, Zoom, and Google Meet, emphasizing the user-friendly nature of Chromebooks, especially for the less tech-savvy. Discover the power of dedicated password managers like LastPass and Bitwarden in protecting against identity theft and cyber threats, while we caution against the pitfalls of relying on built-in web browser password managers on shared devices.Empower yourself with strategies for enhancing your child's online safety through education and privacy management. Learn the importance of two-factor authentication, the risks associated with phishing, and how to maintain tech-free zones to protect personal privacy. Craig offers guidance on engaging with schools about cybersecurity policies and teaching children responsible technology use, ensuring they grow up to be savvy, informed digital citizens.Useful links:https://www.cyber.gov.au/learn-basicshttps://www.choice.com.au/consumers-and-datahttps://www.grc.com/securitynow.htmhttps://www.grc.com/haystack.htmhttps://bitwarden.com/https://foundation.mozilla.org/en/privacynotincluded/https://en.wikipedia.org/wiki/Computer_security danabaltutis.com, mytherapyhouse.com.au, https://mytherapyhouse.com.au/your-childs-therapy-journey/ https://www.danabaltutis.com/services

The Ridiculously Good Virtual Assistant Show
Interview with VA Jacki Hollywood Brown

The Ridiculously Good Virtual Assistant Show

Play Episode Listen Later Jan 24, 2025 48:29


Today we are talking with VA Jacki Hollywood Brown about data organization, data management and records management.  Jacki is an organization specialist who helps her clients by designing structures and procedures to help them improve their efficiency and productivity. Tune in to learn about: Mistakes VAs (and business owners!) make with data and records management Why your brain should not be a storage facility How to turn data into usable information Privacy and security best practices Password management And a whole lot more! To get in touch with Jacki to discuss your support needs, connect with her here: Website: https://productivelyorganized.com LinkedIn: https://[https://linkedin.com/in/jackihollywoodbrown or book a discovery call with her here: https://productivelyorganized.com/contact/ About this episode: Jacki Hollywood Brown is a military spouse and professional organizer-turned Virtual Assistant, and she brings her outstanding organizational skills to her VA clients by offering boutique VA services. I spoke with Jacki about the importance of creating and updating procedures and processes in our business (and in our client's businesses). We also talked about what you should have in place to protect your business data, and so much more. Enjoy!

Cyber Security Today
Cyber Security Today Week in Review for September 14, 2024

Cyber Security Today

Play Episode Listen Later Sep 14, 2024 36:21 Transcription Available


Cybersecurity Insights: Vulnerabilities, Insider Threats, and the Future of Online Safety In this weekend edition of Cybersecurity Today, host Jim Love is joined by regulars Terry Cutler of Cyology Labs and David Shipley of Beauceron Security, alongside special guest Laura Payne from White Tuque. They discuss significant cybersecurity news including the new additions to CISA's known exploited vulnerabilities catalog, a hilarious yet eye-opening domain purchase incident, and the ongoing issue of insider threats. The panel also dives into the complexities surrounding recent breaches like the one at Avis and the broader implications of data vulnerabilities. Stay tuned for the latest insights and expert opinions on what's happening in the cybersecurity world. 00:00 Introduction and Panelist Introductions 01:31 Format Overview and First Cybersecurity Story 01:47 Discussion on CISA's Vulnerability Catalog 02:51 Challenges in Patch Management 06:45 Microsoft's Patch Tuesday Controversy 10:49 The $20 Domain Vulnerability 15:42 Insider Threats and Real-World Incidents 18:11 Handling Disgruntled Employees 18:51 Insider Threats: Real-Life Examples 19:41 Preventing Insider Threats 21:30 Password Management and Security 22:53 Case Study: Sales Employee Walks Out with Client List 23:42 Jurassic Park and Risk Management 24:32 Avis Data Breach: What Happened? 25:51 The Importance of Identity Theft Protection 29:44 Challenges in Cybersecurity Awareness 34:27 Microsoft's New Security Measures 35:07 Conclusion and Farewell

EisnerAmper Podcast
TechTalk: The Future of Data Security: How a Startup Is Redefining Password Management and Security

EisnerAmper Podcast

Play Episode Listen Later Aug 27, 2024 16:46


McKelvey Packard, Co-Founder of Everykey, talks with EisnerAmper's TechTalk host Fritz Spencer about how his startup is improving protections for users' credentials against data breaches with the world's first patented universal smart key. In this episode, McKelvey shares the unique features of Everykey, which replaces passwords and keys by using proximity-based authentication. Learn how McKelvey and his team are making security for user data more convenient and unintrusive than ever before.

Family Office Podcast:  Private Investor Interviews, Ultra-Wealthy Investment Strategies| Commercial Real Estate Investing, P
Focus on What Every Ultra-Wealthy Person Does but Nobody Else is Doing [Low Hanging Fruit]

Family Office Podcast: Private Investor Interviews, Ultra-Wealthy Investment Strategies| Commercial Real Estate Investing, P

Play Episode Listen Later Aug 20, 2024 3:32


Send us a Text Message.In this video, Richard C. Wilson discusses what every ultra-wealthy person does that sets them apart. Learn from the expert in family offices!**Why You Need an "If I Die" Document to Protect Your Assets & Secure Your Family's Future**In this eye-opening video, we dive into the crucial but often overlooked topic of creating an "If I Die" document. Discover why having a comprehensive plan can be more valuable than a life insurance policy, and learn how it can protect your assets and ensure your family's financial security.In this video you'll learn:- The importance of documenting all your financial accounts, including hidden assets like crypto holdings and 529 accounts.- How to create a detailed guide for managing your affairs, from passwords to business operations.- Tips on selecting trusted individuals to manage your assets and ensure continuity.- The impact of having a clear and accessible document on your family's peace of mind and financial stability.- Don't leave your family in the dark. -----------------------Welcome to the "Private Investor Club - 7,500 Investors. Subscribe now to hear what our 7,500+ investors are allocating to and stay on top of trends related to structuring and closing deals.Our 17-year-old investor club, the Family Office Club, has 25 team members, and 12 million social followers, has closed on over $500M of transactions, has over 7,500 active investors, and hosts 15 live events a year.  To join our investor club as a capital raiser or CEO of a company needing capital to access our live community events, please visit https://FamilyOffices.comTo register with us as an investor to access live community events please visit https://InvestorClub.comWe have free web classes and books for you to download at https://lp.FamilyOffices.com/book https://CapitalRaising.com To date, our podcast and YouTube content has been downloaded over 5 million times.  I hope you love this podcast! Have a nice day!

Today in Health IT
Newsday: Unified Endpoints, Rising Ransomware, and Human in the Loop with Michael Robinson

Today in Health IT

Play Episode Listen Later Jul 26, 2024 15:37 Transcription Available


July 26, 2024: Michael Robinson, VP of Healthcare Solutions for the Americas at Omnissa, joins Bill for the news. They delve into the current state of cybersecurity in healthcare, emphasizing the rise in ransomware demands and the crucial need for mature security postures in health systems. How can health systems better manage the increasing threat vectors from device proliferation? What role does AI play in enhancing security measures, and how effective is the adoption of zero-trust architecture in preventing breaches? The conversation also touches on the evolving use of Gen AI in healthcare, particularly in administrative versus clinical applications. As Gen AI tools become more prevalent, what are the implications for patient interactions and the necessity of human oversight in AI-driven healthcare solutions?Key Points:00:28 Michael Robinson from Omnissa00:58 Omnissa: Company Background and Offerings02:56 Ransomware and Security in Healthcare06:52 Password Management and Zero Trust11:03 Gen AI: Opportunities and ChallengesNews articles:Ransomware Extortion Demands Soar to $5.2M per AttackAI Ushers in New Era of Global Healthcare Equity and Efficiency

Pondering Thoughts Podcast
The Changing Landscape of Cybersecurity: A Conversation with IT Security Leader Keilyn Kirkland

Pondering Thoughts Podcast

Play Episode Listen Later May 30, 2024 64:23


In this episode, host K. Wilkes and IT Security Leader Keilyn Kirkland delve into the current landscape of cybersecurity and the importance of personal cybersecurity. They discuss the evolving nature of cybersecurity, the challenges individuals face in safeguarding their information, and the role of data breaches. The conversation emphasizes the necessity of monitoring and protecting personal data, including checking privacy settings and utilizing credit and dark web monitoring services. The vulnerabilities of popular platforms like Venmo and the risks associated with sharing personal information online are highlighted. This episode covers various topics, such as data breaches, the significance of safeguarding DNA information, the cost of cybersecurity threats, and everyday security practices. Kirkland, a cybersecurity expert, shares insights on the significance of cybersecurity and provides tips for individuals to protect themselves online. She explains the concept of doxing and the dangers of personal information exposure. Kirkland also offers advice on removing personal information from websites and emphasizes the need for individuals to stay informed about cybersecurity issues.  Get ready to empower yourself with the knowledge to take care of your online security!TakeawaysCybersecurity has become essential for everyone, not just experts, due to the increasing digitalization of our lives.Individuals should regularly check their privacy settings on social media platforms and be cautious about the information they share online.Monitoring personal data and using services for credit monitoring and dark web monitoring can help individuals stay informed about potential data breaches.Popular platforms like Venmo can have vulnerabilities that expose personal information, highlighting the importance of being cautious when using such platforms. Data breaches can have severe consequences, exposing personal information and potentially compromising DNA data.Basic security practices, such as strong passwords, password managers, and two-factor authentication, can significantly enhance personal security.Vigilance is crucial in recognizing and avoiding phishing attempts, which often use urgent messages and deceptive links.Being aware of common scams and practicing skepticism can help individuals avoid falling victim to fraud. Doxing is a dangerous activity where personal information is exposed online, leading to potential threats and intimidation.Individuals should regularly search for their own information online and take steps to remove or limit its availability.Cybersecurity is a continuous journey, and individuals should stay informed about the latest threats and best practices.The cybersecurity landscape is constantly evolving, and individuals need to be aware of the risks and take necessary precautions.Chapters00:00Introduction and the Importance of Cybersecurity06:34The Risks and Challenges of Data Breaches29:20The Importance of Password Management and Two-Factor Authentication38:44Recognizing and Avoiding Phishing Attempts45:18Protecting Against Identity Theft through Credit Monitoring55:07The Evolving Cybersecurity Landscape01:06:00ClosingResources mentioned in episode:I Have I Been PwndReputationDefenderKrebs SecurityCyberwire IdentityTheft.gov Like what you heard? Share with others and follow us @ponderingthoughtspodcast Instagram

The Nifty Thrifty Dentists
Secure Password Management for Dental Practices with Tanner Applegate and Dr. Glenn Vo

The Nifty Thrifty Dentists

Play Episode Listen Later May 27, 2024 0:28


In this episode of the Nifty Thrifty Dentists Podcast, Dr. Glenn Vo chats with Tanner Applegate, Founder and CEO of Unify—a platform that helps dental practices securely manage and share passwords. Tanner shares his journey from initially wanting to be a dentist to realizing his passion was really in optimizing the business side of dentistry through technology solutions. His latest venture, Unify, aims to solve major pain points around password management that most dental offices face. Key Highlights: 85% of dental offices manage shared passwords through unsecure spreadsheets, exposing them to data breaches and HIPAA violations. Unify provides a secure, centralized solution.In addition to security, Unify greatly improves efficiency by eliminating time wasted hunting down passwords. With one-click access to all your platforms, you can seamlessly switch between tools.Unify allows you to easily onboard new team members, control permissions, and ensure past employees no longer have access—all critical for practices with high turnover.As a special offer for Nifty Thrifty Dentists, Tanner is offering a 30-day free trial of Unify with white glove onboarding support. The first 10 offices to sign up will get 6 months free in exchange for an honest review. To learn more about Unify and claim this exclusive offer, visit: https://www.unify.dental/ To get more FREE Dental Resources and Deals, visit: https://niftythriftydentists.com/ Join our Nifty Thrifty Dentists Facebook community of over 55,000 Dental Professionals: Must be a member of Nifty Thrifty Grp: https://www.facebook.com/groups/niftythriftydentists/

The Ops Experts Club Podcast
22. That's a Cool Tool: OBS Studio, LastPass and Fathom

The Ops Experts Club Podcast

Play Episode Listen Later May 16, 2024 32:52


SUMMARY: In this episode of The Ops Experts Club Podcast, we dive into the world of productivity tools, uncovering three gems that can revolutionize your workflow. Join us as we explore OBS Studio, a versatile software ideal for video recording and live streaming, not just for gamers but also for educators and entrepreneurs. Learn how OBS Studio's flexibility and simplicity can enhance your digital content creation and streaming experience. Next up, we unravel the mysteries of LastPass, a password management tool that simplifies secure password sharing and storage. Discover how LastPass streamlines password management across teams, ensuring efficiency and security without the hassle of manual updates. Lastly, we introduce Fathom for Zoom, a game-changing meeting recorder that seamlessly captures and organizes meeting transcripts and recordings. Explore how Fathom for Zoom revolutionizes post-meeting workflows, making it effortless to share recordings and extract key insights. Join us as we uncover the potential of these productivity powerhouses and unlock new levels of efficiency in your daily operations!   Minute by Minute: 0:00 Welcome everyone 2:05 OBS Studio 13:11 Password sharing with LastPass 24:06 Recording meetings with Fathom for Zoom

The Nifty Thrifty Dentists
Secure Password Management for Dental Practices with Tanner Applegate and Dr. Glenn Vo

The Nifty Thrifty Dentists

Play Episode Listen Later May 7, 2024 29:39


In this episode of the Nifty Thrifty Dentists Podcast, Dr. Glenn Vo chats with Tanner Applegate, Founder, and CEO of Unify—a platform that helps dental practices securely manage and share passwords. Tanner shares his journey from initially wanting to be a dentist to realizing his passion was really in optimizing the business side of dentistry through technology solutions. His latest venture, Unify, aims to solve major pain points around password management that most dental offices face. Key Highlights: -85% of dental offices manage shared passwords through unsecure spreadsheets, exposing them to data breaches and HIPAA violations. Unify provides a secure, centralized solution. -In addition to security, Unify greatly improves efficiency by eliminating time wasted hunting down passwords. With one-click access to all your platforms, you can seamlessly switch between tools. -Unify allows you to easily onboard new team members, control permissions, and ensure past employees no longer have access—all critical for practices with high turnover. -As a special offer for Nifty Thrifty Dentists, Tanner is offering a 30-day free trial of Unify with white glove onboarding support. The first 10 offices to sign up will get 6 months free in exchange for an honest review. To learn more about Unify and claim this exclusive offer, visit: https://www.unify.dental/ To get more FREE Dental Resources and Deals, visit: https://niftythriftydentists.com/ Join our Nifty Thrifty Dentists Facebook community of over 55,000 Dental Professionals: https://www.facebook.com/groups/niftythriftydentists

Bob Sirott
Password management advice

Bob Sirott

Play Episode Listen Later Apr 23, 2024


Social media strategist Scott Kleinberg joins Bob Sirott to talk about why generating a strong password is important, having multiple records of your passwords, and how to use a password manager. He also discusses how you can prevent being hacked, how passkeys are gaining popularity, and answers this week’s genius bar questions.

CISO Tradecraft
#169 - MFA Mishaps

CISO Tradecraft

Play Episode Listen Later Feb 19, 2024 33:21 Transcription Available


In this episode of CISO Tradecraft, host G Mark Hardy discusses various mishaps that can occur with Multi-Factor Authentication (MFA) and how these can be exploited by attackers. The talk covers several scenarios such as the misuse of test servers, bypassing of MFA via malicious apps and phishing scams, violation of the Illinois Biometric Information Protection Act by using biometric data without proper consent, and potential future legal restrictions on biometric data usage. G Mark also highlights the significance of correct implementation of MFA to ensure optimum organizational security and how companies can fail to achieve this due to overlooking non-technical issues like legal consent for biometric data collection. Transcripts: https://docs.google.com/document/d/1FPCFlFRV1S_5eaFmjp5ByU-FCAzg_1kO References: Evil Proxy Attack- https://www.resecurity.com/blog/article/evilproxy-phishing-as-a-service-with-mfa-bypass-emerged-in-dark-web Microsoft Attack - https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/security/microsoft-reveals-how-hackers-breached-its-exchange-online-accounts/amp/ Illinois Biometric Law - https://www.ilga.gov/legislation/publicacts/fulltext.asp?Name=095-0994 Chapters 00:00 Introduction 00:43 Understanding Multi Factor Authentication 01:05 Exploring Different Levels of Authentication 03:30 The Risks of Multi Factor Authentication 03:51 The Importance of Password Management 04:27 Exploring the Use of Trusted Platform Module for Authentication 06:17 Understanding the Difference Between TPM and HSM 09:00 The Challenges of Implementing MFA in Enterprises 11:25 Exploring Real-World MFA Mishaps 15:30 The Risks of Overprivileged Test Systems 17:16 The Importance of Monitoring Non-Production Environments 19:02 Understanding Consent Phishing Scams 30:37 The Legal Implications of Biometric Data Collection 32:24 Conclusion and Final Thoughts

CISO Tradecraft
#169 - MFA Mishaps

CISO Tradecraft

Play Episode Listen Later Feb 19, 2024 33:21


In this episode of CISO Tradecraft, host G Mark Hardy discusses various mishaps that can occur with Multi-Factor Authentication (MFA) and how these can be exploited by attackers. The talk covers several scenarios such as the misuse of test servers, bypassing of MFA via malicious apps and phishing scams, violation of the Illinois Biometric Information Protection Act by using biometric data without proper consent, and potential future legal restrictions on biometric data usage. G Mark also highlights the significance of correct implementation of MFA to ensure optimum organizational security and how companies can fail to achieve this due to overlooking non-technical issues like legal consent for biometric data collection. Transcripts: https://docs.google.com/document/d/1FPCFlFRV1S_5eaFmjp5ByU-FCAzg_1kO References: Evil Proxy Attack- https://www.resecurity.com/blog/article/evilproxy-phishing-as-a-service-with-mfa-bypass-emerged-in-dark-web Microsoft Attack - https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/security/microsoft-reveals-how-hackers-breached-its-exchange-online-accounts/amp/ Illinois Biometric Law - https://www.ilga.gov/legislation/publicacts/fulltext.asp?Name=095-0994 Chapters 00:00 Introduction 00:43 Understanding Multi Factor Authentication 01:05 Exploring Different Levels of Authentication 03:30 The Risks of Multi Factor Authentication 03:51 The Importance of Password Management 04:27 Exploring the Use of Trusted Platform Module for Authentication 06:17 Understanding the Difference Between TPM and HSM 09:00 The Challenges of Implementing MFA in Enterprises 11:25 Exploring Real-World MFA Mishaps 15:30 The Risks of Overprivileged Test Systems 17:16 The Importance of Monitoring Non-Production Environments 19:02 Understanding Consent Phishing Scams 30:37 The Legal Implications of Biometric Data Collection 32:24 Conclusion and Final Thoughts

My Amazon Guy
Managing Multiple Amazon Seller Accounts: Proven Strategies for Agencies & Sellers

My Amazon Guy

Play Episode Listen Later Feb 17, 2024 5:48


Discover expert strategies for managing multiple Amazon Seller Central accounts with ease in this insightful video. Join us as we delve into the importance of One Time Password (OTP) systems, best practices for account security using tools like One Password, and effective methods for handling client turnover. Whether you're a boutique agency or looking to scale beyond 40 accounts, get actionable advice to streamline your Amazon account management process and ensure seamless operations. Perfect for Amazon sellers, agencies, and anyone interested in optimizing their Amazon business operations.#AmazonSeller, #AccountManagement, #SellerCentralTips, #EcommerceStrategy, #AmazonAgencyGet a free professional video where we analyze your ASIN:https://myamazonguy.com/asin-review/Timestamps:00:00 - Introduction and Greetings00:11 - Managing Multiple Amazon Accounts: Question00:33 - Importance of OTP Systems for Amazon Sellers01:35 - Strategy for Managing Multiple Client Accounts02:47 - Using One Password for Account Security03:59 - Benefits of One Password for Agencies04:10 - Follow-Up on Password Management and Virtual Desktops05:32 - Advice for Scaling Beyond 40 Accounts→ Save 20% on your first 6 months of Helium 10!↳ Use code STEVENPOPE6M20 at https://bit.ly/3RTm5id→ Already have Helium 10?↳ Exclusive MAG discount for upgrading existing accounts at https://myamazonguy.com/h10upgrade-----------------------------------------------------------------------------------------Join My Amazon Guy on LinkedIn: hhttps://www.linkedin.com/company/28605816/Follow us:Twitter: https://twitter.com/myamazonguyInstagram: https://www.instagram.com/stevenpopemag/Pinterest: https://www.pinterest.com/myamazonguys/Please subscribe to the podcast at: https://podcast.myamazonguy.comApple Podcast:  https://podcasts.apple.com/us/podcast/my-amazon-guy/id1501974229Spotify: https://open.spotify.com/show/4A5ASHGGfr6s4wWNQIqyVwSupport the show

Cloud Security Podcast
Cybersecurity Best Practices and Password Security in Cloud and AI

Cloud Security Podcast

Play Episode Listen Later Jan 26, 2024 29:59


We caught up with Troy Hunt and Scott Helme at NDC Security Oslo 2024 to talk about best practices when it come to decoding TLS, password security and data breaches in cloud and AI. Troy Hunt, known for his work with haveibeenpwned.com, spoke to us about the complexities of cloud deployment and paradox of data input versus privacy risk in Large Language Models (LLMs), Cloud. Scott Helme, a security researcher and founder of securityheaders.com, spoke about the importance of early security training in the development lifecycle for applications built in 2024. We dissected the critical yet often overlooked aspects of cybersecurity in cloud and ai. Guest Socials: ⁠Troy Hunt + Scott Helme Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - ⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠ Questions asked: (00:00) Introduction (01:37) Evolving Landscape of Password Management (04:17) Analyzing Data Breach Trends: (05:48) Latest Security Protocols with TLS and Encryption (08:24) Debating Encryption Key Management (10:59) AI's Role in Data Breaches: (13:59) Best Practices for Enterprise Password Management (16:01) Best Practices for Password Management in Small to Medium Sized Businesses (18:04) Top 5 security best practices (19:58) Understanding Security Headers (27:14) The Fun Section

Security Now (MP3)
SN 956: The Inside Tracks - 23andME Mess, Ukraine Telecom Hack, LastPass

Security Now (MP3)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

All TWiT.tv Shows (MP3)
Security Now 956: The Inside Tracks

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

Security Now (Video HD)
SN 956: The Inside Tracks - 23andME Mess, Ukraine Telecom Hack, LastPass

Security Now (Video HD)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

Security Now (Video HI)
SN 956: The Inside Tracks - 23andME Mess, Ukraine Telecom Hack, LastPass

Security Now (Video HI)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

Radio Leo (Audio)
Security Now 956: The Inside Tracks

Radio Leo (Audio)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

Security Now (Video LO)
SN 956: The Inside Tracks - 23andME Mess, Ukraine Telecom Hack, LastPass

Security Now (Video LO)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

All TWiT.tv Shows (Video LO)
Security Now 956: The Inside Tracks

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

Radio Leo (Video HD)
Security Now 956: The Inside Tracks

Radio Leo (Video HD)

Play Episode Listen Later Jan 10, 2024 113:33


More on Apple's hardware backdoor Russian Hacking of Ukranian cameras Russian hackers were inside Ukraine telecoms giant for months Things are still a mess at 23andMe CoinsPaid was the victim of another cyberattack Crypto Hacking in 2023 Mandiant Twitter scam Defining "cyber warfare" LastPass is making some changes Windows Watch Google settles $5 billion lawsuit Return Oriented Programming Shutting Down Edge Root Certificates Credit freezing SpinRite Update Show Notes - https://www.grc.com/sn/SN-956-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: lookout.com paloaltonetworks.com/ot-security-tco kolide.com/securitynow bitwarden.com/twit

My Amazon Guy
Grow an Agency AMA Live with Steven Pope - Jan 9, 2024

My Amazon Guy

Play Episode Listen Later Jan 9, 2024 96:57


Join us live for an engaging Agency AMA session with Steven Pope on January 9 at 1PM ET!Helpful Reminders:→ Ask Steven your burning questions live by accessing this Streamyard link: https://streamyard.com/3pzvceuws6→ Ensure your mic and camera are ready if you're stepping onto the virtual stage.→ You can also type your questions into the chatbox during the stream.Learn strategies to scale your business with more clients and a better operation from leading experts! Attend the My Agency Guy Summit happening on January 9-10, 2024.Visit the link to secure your ticket: https://myagencyguysummit.comEver wondered about the nitty-gritty of running a successful agency? Ask Steven anything during our live session and get answers in real-time.Set your alarms and notifications so you don't miss out!This is an invaluable opportunity for digital and Amazon agencies ready to make big moves. Whether you're starting fresh or scaling up, there's something here for you.Don't just be a part of the conversation—lead it. Grow your agency empire with proven strategies from the front lines.#MyAgencyGuySummit #AgencyEvolution #DigitalMarketingInsights #AskStevenPope #AgencyAMATimestamps:00:00 - Introduction and Overview of My Agency Guy Service05:02 - Details on Today's Show Format09:52 - Start of Live AMA: Agency Growth and Challenges11:12 - Offering Additional Services and Summit Information11:18 - Introduction of First Guest: Thomas from Shipux LLC12:02 - Thomas Discusses His Business and Expansion Goals13:24 - Host Offers Business Expansion Strategies16:02 - Discussing Affiliate Relationships and Networking17:25 - Introduction of Next Guest: Josh from Seattle17:44 - Josh's Query on Managing Multiple Amazon Accounts19:05 - Detailed Discussion on Account Management Techniques20:24 - Addressing Account Suspension Concerns21:46 - Tips on Password Management and Employee Turnover24:41 - Introduction of Another Guest24:54 - Guest Shares His Progress and Seeks Advice27:46 - Strategies for Handling Demanding Clients29:29 - Preparing for Transition to Full-time Agency Work30:01 - Managing Time and Client Expectations32:39 - Tips on Navigating Client Relationships and Expansion34:13 - More on Amazon EU Expansion Challenges35:46 - Overview of the My Agency Guy Summit37:00 - Discussion on Acquiring Clients and Business Expansion38:04 - Insights on Effective Website Setup and Lead Generation38:51 - Strategies for Building a Potential Client Database39:05 - Exploring CRM Options for Agency Management42:43 - Discussion on Handling Challenging Clients and Business Scalability43:55 - Exploring Amazon and Walmart Services for Agency Expansion44:42 - Tips for Creating Engaging Content and Scaling an Agency45:46 - Strategies for Closing Deals and Managing Client Expectations47:00 - Evaluating the Pros and Cons of Expanding Services48:56 - Identifying and Focusing on Core Services for Agency Growth50:44 - Additional Insights on Agency Growth and Diversification51:05 - Discussion on Previous Amazon Business Experience and Contemplating New Ventures52:20 - Insights on Deciding Between Starting an Amazon Agency, New Product Line, or a YouTube Channel54:58 - Evaluating Skills and Determining Agency Direction57:14 - Exploring Different Business Models and Approaches for Agencies1:03:00 - Emphasizing the Importance of Creating Content and Sharing Expertise1:04:55 - Exploring Various Approaches to Agency Growth and Client Management1:06:00 - Conversations with Agency Owners About Business Development and Client Acquisition1:08:04 - Discussing Revenue Share Models and Negotiating Client Support the show

Roadmap To Grow Your Business
Ep #289: Life Proof Your Business

Roadmap To Grow Your Business

Play Episode Listen Later Dec 26, 2023 37:15


Are you prepared for unexpected challenges in your business? Learn how to life-proof your business with tips from our guest, Chelsea Brinkley. Life-proofing your business is attainable, even if you're a solopreneur, and it can significantly impact how your business adapts to various circumstances. Chelsea shares valuable insights and tips on how to create a business that can thrive and continue to succeed, even when you have to step away. I also share my personal experience of undergoing back surgery earlier this year and how my business not only survived but thrived during that time. Resources and links mentioned in this episode can be found on the show notes page at http://www.staceybrownrandall.com/289

WCCO Tech Talk
Password Management, Windows , and Much More!

WCCO Tech Talk

Play Episode Listen Later Dec 23, 2023 40:06


Putting a bow on 2023 in Tech Talk we chatted about password management, cleaning your devices, PrivaZer and much more as Doug Swinhart and Steve Thomson answer any of your tech questions to close out the year! 

Remarkable Results Radio Podcast
Security Strategies for Safe and Sound Marketing [E074] - The Auto Repair Marketing Podcast

Remarkable Results Radio Podcast

Play Episode Listen Later Nov 15, 2023 56:20


In this episode of the Auto Repair Marketing Podcast, host Kim Walker and her team at Shop Marketing Pros discuss the importance of marketing security. They provide tips on securing marketing assets, managing passwords, verifying identities on platforms like Facebook and Google, and identifying spam and scams. They also emphasize the importance of knowing who has access to your accounts and regularly reviewing this access. The team encourages shop owners to be proactive in securing their digital assets.Thank you to RepairPal for sponsoring The Auto Repair Marketing Podcast. Learn more about RepairPal at https://repairpal.com/shopsShow Notes with TimestampsAccount Access and Security (00:05:27) Discussion on the importance of being the primary account holder for your website, email, and Google listing, and the potential issues that can arise if you don't have access.Different Types of Access in Facebook (00:06:53) Explanation of the different levels of access in Facebook's business manager, including partial access for specific tasks and full access that allows partners to act as page owners.Assigning Access to Facebook and Instagram Accounts (00:08:23) Further discussion on assigning partial or full access to team members, marketing agencies, or other partners for Facebook and Instagram accounts.The importance of owning your Facebook page (00:08:29) Discussion on the importance of being the owner of your Facebook page and how to assign different accesses.Properly storing passwords (00:11:02) Discussion on different methods for storing passwords, including using Google, writing them down, and using password management tools like LastPass.Benefits of LastPass for password management (00:12:10) Discussion on the features and benefits of using LastPass, including the ability to store and share passwords securely, organize passwords in folders, and access passwords on both browsers and mobile devices.Identity Verification on Google Ads (00:19:05) Discussion on the requirement to verify Google Ads accounts with documentation and ID to eliminate fake advertisers and ensure legitimacy.Google Business Profiles Verification (00:22:24) Exploration of the verification process for Google business listings, including submitting documentation and a video of the shop's interior and exterior.Importance of Security and Password Management (00:15:45) Emphasis on the need for strong passwords, two-factor authentication, and the use of password managers like LastPass for enhanced security.The Google Business Profile (00:23:41) How to find and claim a Google Business Profile for a business, including ownership access and management access.Facebook Ownership and Levels (00:26:19) The different levels of ownership and access on Facebook and Instagram, including the importance of having a meta business account and a business manager.Facebook Ownership Dispute and Resolution (00:29:06) The process of resolving ownership disputes on Facebook, including submitting proof of business ownership and working with Facebook support.The security levels of Facebook accounts (00:32:46) Discusses the different levels of access on Facebook accounts and the importance of being cautious with granting admin privileges.Securing personal Facebook profiles (00:34:43) Provides tips on securing personal Facebook profiles, including setting friends list to private and enabling two-factor authentication.Identifying spam and scams on Facebook and Google (00:37:49) Explains how to recognize and handle spam and scams on Facebook and Google, specifically related to fake messages, emails, and ownership requests.Spam and Scam Emails for Google Business Listings (00:38:10) Discussion on how to identify and handle spam or scam emails...

The Auto Repair Marketing Podcast
Security Strategies for Safe and Sound Marketing [E074]

The Auto Repair Marketing Podcast

Play Episode Listen Later Nov 15, 2023 56:20


In this episode of the Auto Repair Marketing Podcast, host Kim Walker and her team at Shop Marketing Pros discuss the importance of marketing security. They provide tips on securing marketing assets, managing passwords, verifying identities on platforms like Facebook and Google, and identifying spam and scams. They also emphasize the importance of knowing who has access to your accounts and regularly reviewing this access. The team encourages shop owners to be proactive in securing their digital assets.Thank you to RepairPal for sponsoring The Auto Repair Marketing Podcast. Learn more about RepairPal at https://repairpal.com/shopsShow Notes with TimestampsAccount Access and Security (00:05:27) Discussion on the importance of being the primary account holder for your website, email, and Google listing, and the potential issues that can arise if you don't have access.Different Types of Access in Facebook (00:06:53) Explanation of the different levels of access in Facebook's business manager, including partial access for specific tasks and full access that allows partners to act as page owners.Assigning Access to Facebook and Instagram Accounts (00:08:23) Further discussion on assigning partial or full access to team members, marketing agencies, or other partners for Facebook and Instagram accounts.The importance of owning your Facebook page (00:08:29) Discussion on the importance of being the owner of your Facebook page and how to assign different accesses.Properly storing passwords (00:11:02) Discussion on different methods for storing passwords, including using Google, writing them down, and using password management tools like LastPass.Benefits of LastPass for password management (00:12:10) Discussion on the features and benefits of using LastPass, including the ability to store and share passwords securely, organize passwords in folders, and access passwords on both browsers and mobile devices.Identity Verification on Google Ads (00:19:05) Discussion on the requirement to verify Google Ads accounts with documentation and ID to eliminate fake advertisers and ensure legitimacy.Google Business Profiles Verification (00:22:24) Exploration of the verification process for Google business listings, including submitting documentation and a video of the shop's interior and exterior.Importance of Security and Password Management (00:15:45) Emphasis on the need for strong passwords, two-factor authentication, and the use of password managers like LastPass for enhanced security.The Google Business Profile (00:23:41) How to find and claim a Google Business Profile for a business, including ownership access and management access.Facebook Ownership and Levels (00:26:19) The different levels of ownership and access on Facebook and Instagram, including the importance of having a meta business account and a business manager.Facebook Ownership Dispute and Resolution (00:29:06) The process of resolving ownership disputes on Facebook, including submitting proof of business ownership and working with Facebook support.The security levels of Facebook accounts (00:32:46) Discusses the different levels of access on Facebook accounts and the importance of being cautious with granting admin privileges.Securing personal Facebook profiles (00:34:43) Provides tips on securing personal Facebook profiles, including setting friends list to private and enabling two-factor authentication.Identifying spam and scams on Facebook and Google (00:37:49) Explains how to recognize and handle spam and scams on Facebook and Google, specifically related to fake messages, emails, and ownership requests.Spam and Scam Emails for Google Business Listings (00:38:10) Discussion on how to identify and handle spam or scam emails...

The PeopleSoft Administrator Podcast
#339 - Uptime Monitoring

The PeopleSoft Administrator Podcast

Play Episode Listen Later Nov 11, 2023 38:07


This week on the podcast, Dan shares how he uses Heartbeat to track uptime in PeopleSoft and Kyle discusses the new Password Management features in Cloud Manager 16. Show Notes Uptime Monitoring with PeopleSoft @ 2:00 My Preferences Phone Number @ 16:00 Cloud Manager and Passwords @ 18:00 Graham Smith - Cloud Manager 16 Features psst - PeopleSoft Secrets Tool

Remarkable Results Radio Podcast
Network Security: Protecting Your Business [THA 352]

Remarkable Results Radio Podcast

Play Episode Listen Later Nov 2, 2023 48:32


Is your business prepared for cyber-attacks? It's not a question of 'if' it's a question of 'when.' Our panel discusses the importance of network security and protecting businesses from cyber threats. They emphasize the need for multiple layers of protection, including two-factor authentication, and caution against phishing attacks. They also highlight the importance of training employees to recognize such threats and having a proactive approach to cybersecurity. Let's stay ahead of potential threats and make it more difficult for hackers to target our businesses. Chris Cloutier is co-owner of Golden Rule Auto Care in Dallas Texas and CEO of Autoflow. Chris's previous episodes HERE Jay Mikulovich, founder and CEO of Revival Technology LLC. Stan Stokes, Founder & CEO of Iron Fist Marketing Consultants. Stan's previous episodes HERE Show Notes: Watch Full Video The importance of two-factor authentication (00:02:07) Explains the significance of using two-factor authentication to add an extra layer of security to passwords. The vulnerability of software packages (00:03:48) Discusses how no software is perfect and can have vulnerabilities, emphasizing the need for multiple layers of security. The dangers of phishing attacks (00:08:06) Explains the concept of phishing and how hackers use email to trick users into clicking on malicious links or attachments. The challenges of being reactive to security breaches (00:10:04) The difficulties of being reactive to security breaches and emphasize the importance of being proactive in protecting business operations. The vulnerabilities of relying on technology (00:11:24) The vulnerabilities of relying heavily on technology and the need for shop owners to understand their level of vulnerability and seek expert advice. The importance of backups and cybersecurity measures (00:20:38) Discussion on the need for backup plans, having multiple backups, and the importance of cybersecurity measures to protect against potential data loss or breaches. Difference between IT support and network security (00:23:39) Explaining the distinction between IT support and network security, and the importance of understanding and vetting service providers to ensure proactive cybersecurity measures are in place. Updating Network Security (00:27:58) Discussion on the importance of regularly updating network firewalls, equipment, and passwords to prevent hacking and security breaches. The Risks of Delaying Updates (00:28:51) Exploration of the consequences of not updating desktops, including vulnerabilities, outdated patches, and potential hacking threats. Password Management and Security (00:30:41) Advice on using password managers, generating unique passwords, and the importance of having strong, lengthy passwords to enhance security. The importance of strong passwords and data encryption (00:37:03) Discussion on the significance of using strong passwords and encrypting data to protect against cyber threats. Securing networks and vulnerabilities (00:37:54) Exploration of the importance of...

Talos Takes
How to find the right password management solution for you

Talos Takes

Play Episode Listen Later Oct 13, 2023 7:33


Third-party password managers can seem like a daunting, and unnecessary accessory to anyone's internet experience. They can be costly, and most people assume if they can remember their password, who cares? Turns out, if you can easily remember your password, an attacker could probably guess it eventually anyway. To continue our Cybersecurity Awareness Month series, Harpreet Singh from Talos Incident Response joins Jon to talk about password managers. They discuss the upside of using a third-party service like 1Password or LastPass, the potential dangers of using built-in browser password managers like Google Chrome and Safari, and other good password hygiene advice. 

MacVoices Video
MacVoices #23237: Joe Kissell Takes Control of Sonoma (2)

MacVoices Video

Play Episode Listen Later Sep 19, 2023


Our conversation with Joe Kissell, the author of Take Control of Sonoma, continues as we cover Sonoma's new or revised features that include menubar icons, Keychain Access, stickers, animations, and widgets. Joe gives us some cautions on a few Sonoma features, discusses Apple's new documentation for Sonoma, and more. (Part 2)  This edition of MacVoices is supported by MacVoices Magazine, our free magazine on Flipboard. Updated daily with the best articles on the web to help you do more with your Apple gear and adjacent tech, access MacVoices Magazine content on Flipboard, on the web, or in your favorite RSS reader. Show Notes: Chapters: 0:03:24 Mac OS: The Target Audience and Windows vs Widgets 0:06:12 Web Browser vs. App: Personal Preference 0:07:03 Apple's Lack of Exciting Features for Productivity 0:08:31 Challenges of Navigating Different Mac Setups 0:11:08 Annoying Menu Bar Icon and Screen Recording Permissions 0:12:31 Bartender App to Organize Menu Bar Icons 0:13:22 Annoyance with Bartender app and recording screen all the time 0:14:33 Apple's purple icon taking up space in menu bar 0:15:47 Additional security and privacy features in Safari 0:18:06 Keychain Access: The Most Hideous App You'll Ever Encounter 0:20:37 Frustration with Password Management in System Settings 0:22:03 Questioning Apple's Threat Model and User Experience 0:22:48 Introduction and Where to Get Joe's Book 0:24:48 The Value of Joe's Books and his Dedication to Helping Guests: Joe Kissell is the publisher of  Take Control ebooks, as well as the author of over 60 books on a wide variety of tech topics. Keep up with him if you can on his personal site, JoeKissell.com, and on Twitter. Support: Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect: Web:      http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices Mastodon:      https://mastodon.cloud/@chuckjoiner Facebook:      http://www.facebook.com/chuck.joiner MacVoices Page on Facebook:      http://www.facebook.com/macvoices/ MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice LinkedIn:      https://www.linkedin.com/in/chuckjoiner/ Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

MacVoices Audio
MacVoices #23237: Joe Kissell Takes Control of Sonoma (2)

MacVoices Audio

Play Episode Listen Later Sep 19, 2023 28:46


Our conversation with Joe Kissel, the author of Take Control of Sonoma, continues as we cover Sonoma's new or revised features that include menubar icons, Keychain Access, stickers, animations, and widgets. Joe gives us some cautions on a few Sonoma features, discusses Apple's new documentation for Sonoma, and more. (Part 2)  This edition of MacVoices is supported by MacVoices Magazine, our free magazine on Flipboard. Updated daily with the best articles on the web to help you do more with your Apple gear and adjacent tech, access MacVoices Magazine content on Flipboard, on the web, or in your favorite RSS reader. Show Notes: Chapters: 0:03:24 Mac OS: The Target Audience and Windows vs Widgets 0:06:12 Web Browser vs. App: Personal Preference 0:07:03 Apple's Lack of Exciting Features for Productivity 0:08:31 Challenges of Navigating Different Mac Setups 0:11:08 Annoying Menu Bar Icon and Screen Recording Permissions 0:12:31 Bartender App to Organize Menu Bar Icons 0:13:22 Annoyance with Bartender app and recording screen all the time 0:14:33 Apple's purple icon taking up space in menu bar 0:15:47 Additional security and privacy features in Safari 0:18:06 Keychain Access: The Most Hideous App You'll Ever Encounter 0:20:37 Frustration with Password Management in System Settings 0:22:03 Questioning Apple's Threat Model and User Experience 0:22:48 Introduction and Where to Get Joe's Book 0:24:48 The Value of Joe's Books and his Dedication to Helping Guests: Joe Kissell is the publisher of  Take Control ebooks, as well as the author of over 60 books on a wide variety of tech topics. Keep up with him if you can on his personal site, JoeKissell.com, and on Twitter. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss 00:03:24 Mac OS: The Target Audience and Windows vs Widgets 00:06:11 Web Browser vs. App: Personal Preference 00:07:02 Apple's Lack of Exciting Features for Productivity 00:08:30 Challenges of Navigating Different Mac Setups 00:11:07 Annoying Menu Bar Icon and Screen Recording Permissions 00:12:30 Bartender App to Organize Menu Bar Icons 00:13:21 Annoyance with Bartender app and recording screen all the time 00:14:33 Apple's purple icon taking up space in menu bar 00:15:47 Additional security and privacy features in Safari 00:18:05 Keychain Access: The Most Hideous App You'll Ever Encounter 00:20:36 Frustration with Password Management in System Settings 00:22:02 Questioning Apple's Threat Model and User Experience 00:22:47 Introduction and Where to Get Joe's Book 00:24:48 The Value of Joe's Books and his Dedication to Helping

Cybercrime Magazine Podcast
Cybersecurity Elevator Pitch: Password Management & Online Security. Provided By Dashlane.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 5, 2023 1:05


Dashlane stores and auto-fills login credentials across all devices, seamlessly providing a hassle-free and secure login experience for all users. In one click, old, weak passwords will be transformed into strong, unbreakable ones, ensuring the highest level of protection for all of your accounts. For more information, visit https://dashlane.com

Federal Contracting Made Easy's podcast
Streamline Your Day: BOOST Your Productivity With AUTOMATION

Federal Contracting Made Easy's podcast

Play Episode Listen Later May 23, 2023 1:58


In this video/podcast, we will explore the topic of boosting productivity through automation. We'll discuss various tools and techniques that can help you streamline your day, saving time and energy. By harnessing the power of automation, you can focus on important tasks and achieve more efficiency in your daily workflow. Zapier and IFTTT: Zapier and IFTTT (If This Then That) are powerful automation platforms that allow you to connect different apps and services. They work on the principle of triggers and actions, enabling you to create automated workflows, known as "Zaps" or "Applets." These tools eliminate the need for repetitive manual tasks by automating them. For example, you can automatically save email attachments to cloud storage or create a task in your to-do list when a new email arrives. Email Templates: Composing similar emails repeatedly can be time-consuming. Email templates are pre-written messages that can be customized and reused for common scenarios. By using email templates, you can save time and maintain consistency in your communication. Many email clients and productivity tools offer built-in or customizable templates, making it easy to respond to inquiries, schedule meetings, or send follow-ups quickly. Calendly or Doodle: Scheduling meetings can be a hassle, especially when coordinating with multiple participants. Tools like Calendly and Doodle simplify the process by allowing you to share your availability and let others choose a suitable time slot. These tools integrate with your calendar and eliminate the back-and-forth emails or messages involved in scheduling. With just a few clicks, you can efficiently manage your appointments and save valuable time. LastPass or 1Password: Remembering multiple passwords for different accounts can be a daunting task. Password managers like LastPass and 1Password securely store your login credentials, generating strong passwords and auto-filling them when needed. By using a password manager, you can improve security, save time, and reduce the frustration of password management. Additionally, these tools often offer features like secure note storage, form filling, and synchronization across devices. RescueTime or Toggl: Maintaining focus and tracking time spent on various tasks is crucial for productivity. RescueTime and Toggl are productivity apps that help you analyze and manage your time effectively. RescueTime runs in the background, tracking your activity on different applications and websites. It provides detailed reports on your time usage, allowing you to identify time sinks and make informed decisions. Toggl, on the other hand, is a time-tracking tool that lets you log the time you spend on specific tasks or projects. By understanding how you allocate your time, you can optimize your workflow and prioritize important activities. Conclusion: Automation tools such as Zapier, IFTTT, email templates, scheduling apps like Calendly or Doodle, password managers like LastPass or 1Password, and productivity trackers like RescueTime or Toggl can significantly enhance your productivity by minimizing repetitive tasks, optimizing scheduling, simplifying password management, and providing insights into your time allocation. By incorporating these automation techniques into your daily routine, you can streamline your day and focus on what truly matters, ultimately achieving greater efficiency and productivity.

The Security Podcasts
How AI and other technologies have changed password management

The Security Podcasts

Play Episode Listen Later May 3, 2023 7:58


New technologies such as AI have shifted conversations around best practices for password management. As much as AI can be a great help to protecting credentials, there have also been instances of it making it easier for cybercriminals to hack into accounts. Find out more in this episode of the Security podcast with Parteek Saran, founder and CEO of Uno. In this episode, Saran discusses the impact of human error and the need for complex passwords. Saran also encourages security leaders to properly train their employees on how to best protect their credentials. 

Healthcare Entrepreneur Academy Podcast
#318: Automating Business Processes with Workflow, Tools and AI to Improve Efficiency

Healthcare Entrepreneur Academy Podcast

Play Episode Listen Later Mar 21, 2023 24:59


OVERVIEW: “Efficiency is doing better what is already being done.” – Peter Drucker   Jason A. Duprat, Entrepreneur, Healthcare Practitioner, and Host of the Healthcare Entrepreneur Academy podcast, talks about the importance of systems and processes. In business, every single second of every single team member counts, so in this episode, Jason teaches us how to streamline workflows and maximize efficiency and productivity through automation, software, and A.I. tools. Tune in until the end to learn more about Jason's book!   3 KEY POINTS: Document every step of your team's tasks or job functions. Use software tools to lessen the risk of human errors. Build systems and processes while your business is still small or has yet to start.   EPISODE HIGHLIGHTS: All businesses run on a series of workflows, wherein much of what our team members or we do is repetitive. In today's episode, Jason runs us through his repetitive workflow when producing and publishing his podcast as an example. Jason learned some of his workflow efficiency strategies from Richard Winters, part of his Mastermind Group and a previous guest on this podcast. Document every step of your or your team's tasks or job functions. A summary of Jason's workflow is that he records his podcast episodes and uploads the individual audio and video files on Google Drive to pass on to his podcast team. The team then has its own workflow with multiple steps from editing to publishing. All the individual steps in these processes require multiple clicks and much time. We can optimize any workflow by reducing repetitive tasks to a minimum. To help streamline his business processes, Jason ensures he's always up-to-date with the latest software and technology and utilizes whatever is most beneficial. Jason used to record his Podcast with his Rodecaster Pro and transfer the files to his desktop afterward. To make things easier, he now records on Riverside.fm and pairs it with Zapier to automatically upload his recordings to Google Drive and notify his team. The Healthcare Entrepreneur Academy Podcast uses Libsyn as its hosting platform. One of Libsyn's great features is connecting to Jason's website on WordPress, wherein published episodes will automatically be uploaded to Jason's page. Jason and his team use software and A.I. tools for various purposes: Recording Editing, Project Management, Password Management, and many more. Software tools not only improve efficiency. They help reduce human errors. A Standard Operating Procedure (S.O.P.) is a step-by-step list of instructions for doing something in your business. Start utilizing S.O.P.s, software tools, and automation strategies while your business is small. Once your business grows and is at max capacity, it'll be difficult to build these systems. A benefit of having S.O.P.s is it makes turnovers easier, as all the tasks new people need to be trained on are all located in the same place.   TWEETABLE QUOTES:   "Anytime a human is involved in anything, there's a chance of making errors. Software tools and automation help make workflow less error-prone." – Jason A. Duprat   "Build your systems and processes while your business is still small or before you even start your practice. It's hard to focus on this when your business has grown to at almost max capacity." – Jason A. Duprat   CONNECT WITH JASON DUPRAT LinkedIn | Facebook | Instagram | Youtube Email: support@jasonduprat.com Join our Facebook group: https://jasonduprat.com/group    RESOURCES Want to become a Ketamine Therapy provider? Enroll NOW in The Ketamine Academy course: https://ketamineacademy.com/presentation Sign up for one of our free business start-up Masterclasses at https://jasonduprat.com/freemasterclass.  Have a healthcare business question? Want to request a podcast topic? Text me at 407-972-0084, and I'll add you to my contacts. Occasionally, I'll share important announcements and answer your questions as well. I'm excited to connect with you! Do you enjoy our podcast? Leave a rating and review: https://lovethepodcast.com/hea.  Don't want to miss an episode? Subscribe and follow https://followthepodcast.com/hea.   RELATED EPISODES: #307: TACTICAL TUESDAY: THE RAPID GROWTH OF AI & OPPORTUNITIES IT MEANS FOR YOU #244: TACTICAL TUESDAY: THE CHALLENGES OF CHANGE PLUS EXCITING NEW UPDATES #126: TACTICAL TUESDAY: MY TOP 10 LIST FOR MUST-HAVE SOFTWARE   #HealthcareEntrepreneurAcademy #healthcare #HealthcareBoss #entrepreneur #entrepreneurship #podcast #businessgrowth #teamgrowth #digitalbusiness    

Best Laid Plans
Feb Q&A: Planning Gender Divide, Password Management, Planning in Pregnancy, and Overwhelm with Annual Goals EP 134

Best Laid Plans

Play Episode Listen Later Feb 20, 2023 27:53


In this Q&A episode, after sharing a multi-level Planner Peace segment from listener Emilie, Sarah addresses multiple questions and topics from listeners, including: Passwords + longer term lists - where to store? Planning during pregnancy - from first tri fatigue to what to prioritize How to ease into planning when the annual goals list becomes overwhelming 2 pro tips (a fun use for blank pages + blotting paper) Planning gender divide Resources: BLPA info: https://theshubox.com/blpa Email: sarah.hart.unger@gmail.com Voice questions: https://www.speakpipe.com/bestlaidplans Send me a text or voice memo - (305) 697-7189 Sign up for my newsletter: https://theshubox.com/newsletter Leave me a review if you can (Apple Podcasts Link: https://podcasts.apple.com/us/podcast/best-laid-plans/id1525311647) Episode Sponsors: PrepDish: Easy and healthy weekly meal plans, complete with recipes and prep instructions! PrepDish is offering listeners a free 2-week trial to try it out, so go to PrepDish.com/plans to activate your trial! Learn more about your ad choices. Visit megaphone.fm/adchoices