Home
Categories
EXPLORE
True Crime
Comedy
Sports
Society & Culture
Business
News
History
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts125/v4/52/9f/2b/529f2bd3-a76d-dfde-edc9-7c91be1328d6/mza_12252681607191186128.jpg/600x600bb.jpg
The CyberGuide
COMPASS Cyber Security
11 episodes
1 week ago
Humans are the weakest link when it comes to cyber security and criminals are preying on this through email. Learn more about email threats and best practice tips to mitigate these risks in this episode of The CyberGuide.
Show more...
Technology
RSS
All content for The CyberGuide is the property of COMPASS Cyber Security and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Humans are the weakest link when it comes to cyber security and criminals are preying on this through email. Learn more about email threats and best practice tips to mitigate these risks in this episode of The CyberGuide.
Show more...
Technology
Episodes (11/11)
The CyberGuide
Email Security
Humans are the weakest link when it comes to cyber security and criminals are preying on this through email. Learn more about email threats and best practice tips to mitigate these risks in this episode of The CyberGuide.
Show more...
8 years ago
11 minutes 27 seconds

The CyberGuide
WannaCry Ransomware
The WannaCry Ransomware attack that began May 12, 2017 is one of the largest ransomware attacks in history. This attack used a computer worm, borrowed from leaked NSA exploits, to target Microsoft Windows operating systems at an unprecedented scale. To date, over 300,000 machines in 150 countries have been affected. This podcast offers an in-depth analysis of the attack and best practice tips to prevent ransomware from affecting your organization.
Show more...
8 years ago
6 minutes 4 seconds

The CyberGuide
Protecting Yourself From Your Internet Service Provider
President Trump recently signed legislation that blocked the implementation of the Federal Communications Commission’s Online Privacy Rule that was to take effect at the end of this year. This rule was intended to prevent Internet Service Providers (ISPs) from capturing and selling user data. Learn best practice tips to secure your sensitive information from ISPs on this episode of The CyberGuide.
Show more...
8 years ago
8 minutes 34 seconds

The CyberGuide
The CIA Vault 7 Release
This episode of The CyberGuide discusses the CIA Vault 7 Release on WikiLeaks. This exposed the CIA’s ability to manipulate and exploit software without consumer knowledge. For example, the documents introduced a new series of threat actors of which demonstrate the CIA’s capability to hack smart TVs and smartphones. Tune in for more information about the wide range of effects this leak has.
Show more...
8 years ago
12 minutes 54 seconds

The CyberGuide
2016 A Look Back & 2017 A Look Forward
This episode of The CyberGuide reviews the landscape of cyber security in 2016 and offers predictions for 2017. Organizations are in the early stages of understanding the importance of cyber security and investing in it. However, threats, including ransomware and spear phishing, are becoming more sophisticated. These facts make way for an interesting future in an ever-changing technological world.
Show more...
8 years ago
33 minutes 36 seconds

The CyberGuide
The Internet of Things
The Internet of Things (IoT) is the interconnectedness of devices that have an IP address, that are embedded in everyday objects, and have the ability to send and receive data. Examples of IoT devices include mobile devices, fitness trackers, and smart speakers, among many others. These devices have endless potential but users must be aware of the security implications of using them. Learn more during this episode of The CyberGuide.
Show more...
8 years ago
19 minutes 54 seconds

The CyberGuide
Threat Identification & Analysis
It is impossible to protect your organization from a threat you don’t know exists. As a result, it is imperative your organization goes through the threat identification and analysis process at least once a year. This episode of The CyberGuide explains this procedure and how it is applicable and it begins by broadly examining potential threat sources. Then it discusses how organizations must determine the most relevant and unique threats to their organization and act on them. Listen to learn more.
Show more...
8 years ago
25 minutes 7 seconds

The CyberGuide
The 5 Steps to a Security Plan
It is difficult for organizations to make informed decisions on cyber security risk management without understanding the unique threats they may face. As a result, the 5 Steps to Develop a Security Program helps businesses determine where their vulnerabilities exist and offer suggestions on remediation. To allocate your resources effectively, it is important to assess your organization before investing in new technology. Companies that are methodical in their defense strategy are much more successful in protecting their organization from the cyber security attacks they may face, as discussed in this episode of The CyberGuide.
Show more...
8 years ago
11 minutes 13 seconds

The CyberGuide
10 Most Common Findings in Security Assessments
Regardless of an organization’s size and industry, the Top 10 Most Common Findings in Security Assessments are applicable and help organizations understand their unique cyber security threats. The commonalities in these assessments allow organizations to better allocate their resources. The top 10 findings are broken out across the Three Pillars of Cyber Security: People, Policies, and Technology. It is crucial that your organization understands the impact that cyber security threats can have. You will find The CyberGuide suggests your organization is proactive and takes an enterprise risk management approach.
Show more...
8 years ago
21 minutes

The CyberGuide
Insider Threats
Negligent and malicious insiders are major threats to organizations as they are responsible for a large percentage of data breaches. Insiders pose a unique threat to your organization because they know your network the best and typically have access that an outsider does not. Businesses must find a balance between security and functionality because insiders must be able to do their job however, they also have the ability to circumvent security controls and policies. You can discover the difference between negligent and malicious insiders and how their actions can affect your business in this episode of The CyberGuide.
Show more...
8 years ago
15 minutes 55 seconds

The CyberGuide
How to Talk to Executives about Cyber Security
Cyber security is a foreign language to most executives. This episode offers suggestions when speaking with executives about cyber security and enterprise risk management in your organization. Cyber security is a broad topic that addresses a range of topics from risk management to regulatory compliance. Executives need to think of cyber security as a business risk, not just an IT issue, to best protect their organization.
Show more...
8 years ago
13 minutes 53 seconds

The CyberGuide
Humans are the weakest link when it comes to cyber security and criminals are preying on this through email. Learn more about email threats and best practice tips to mitigate these risks in this episode of The CyberGuide.