Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/1e/3a/ce/1e3ace49-6dd7-5dcb-1ca1-7363c048c60c/mza_3733535226389102627.png/600x600bb.jpg
The Tea on Cybersecurity
Trava Security
52 episodes
1 week ago

Cybersecurity—a word we hear all the time, but do you really know what it means?


The Tea on Cybersecurity breaks it down without the confusing jargon. We spill the truth about security and compliance in a way that is easy to understand and actually useful.


Perfect for SaaS startups and small to medium sized businesses starting their journey in cybersecurity and compliance. We've learned to keep it short -15-30 minutes per episode - so you get the facts and none of the fluff.

Show more...
Technology
Education,
News,
How To,
Tech News
RSS
All content for The Tea on Cybersecurity is the property of Trava Security and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.

Cybersecurity—a word we hear all the time, but do you really know what it means?


The Tea on Cybersecurity breaks it down without the confusing jargon. We spill the truth about security and compliance in a way that is easy to understand and actually useful.


Perfect for SaaS startups and small to medium sized businesses starting their journey in cybersecurity and compliance. We've learned to keep it short -15-30 minutes per episode - so you get the facts and none of the fluff.

Show more...
Technology
Education,
News,
How To,
Tech News
https://files.casted.us/fc9cde2a-38f0-484b-a7a4-2f31e6fe6292.png
Recap on Season 3 - Receipts on The Tea on Cybersecurity
The Tea on Cybersecurity
22 minutes
1 year ago
Recap on Season 3 - Receipts on The Tea on Cybersecurity

We’ve come to the end of another Season of The Tea on Cybersecurity and you know what that means. Join host Jara Rowe in her ultimate receipts from season 3. She highlights the most important things she has learned from her guests this season including why MFA is key to keeping yourself safe online, how to manage vulnerabilities, what steps you need in preparing for cybersecurity incidents, and how to cultivate trust and transparency within your organizations.


Listen in as Jara revisits her conversations with all of our Season 3 guests including Trava CEO Jim Goldman, Craig Saldanha and Mario Vlieg with Insight Insurance, and John Boomershine with BlankInkIT, among others. 



In this episode, you’ll learn:


  • Multi-Factor Authentication (MFA) is Your Best Friend: It's like adding an extra lock to your door to keep the bad guys out—and who doesn’t want that extra peace of mind? Enabling MFA can be a game-changer in protecting against cyber vulnerabilities. It's easy to implement and adds that essential layer of security without the hassle!
  • Bring Your Own Device (BYOD) Take Control of Your Digital Inventory: This is a deep dive on how to make sure all devices, company-owned or personal, are secure and compliant in this digitally diverse world. This is super relevant for those offering flexible work arrangements and want to stay ahead in your cybersecurity game.
  • Establishing Trust and Transparency is Key: This isn’t just about securing your systems but also about earning and maintaining the trust of your customers and stakeholders— whether it’s securing communications through encryption or ensuring third-party vendors are just as vigilant. 



Jump into the conversation:


[00:00 - 00:41] Introduction to the Tea on Cybersecurity podcast

[00:41 - 3:46] The importance of MFA

[03:47 - 05:07] MFA in cyber hygiene

[05:08 - 06:02] Employee training as a vital part of cybersecurity defense strategy

[06:52 - 07:45] BOYD (bring your own device) and the challenges of inventory management

[07:45 - 10:07] A different way to think about risk

[10:08 - 12:12] The difference between risks and vulnerabilities

[12:18 - 13:24] The difference between breaches and incidents

[13:25 - 14:15] What to do if an incident should occur

[14:19 - 16:17] Steps to take if an incident were to occur with a third-party vendor

[16:18 - 17:58] Why trust is foundational to cybersecurity

[17:59 - 19:03] How a compliance framework is like a cookbook

[19:03 - 21:21] Cybersecurity in healthcare and banking


Connect with the host:

Jara Rowe’s LinkedIn


Connect with Trava:

Website www.travasecurity.com

Blog www.travasecurity.com/blog

LinkedIn @travasecurity

YouTube @travasecurity

The Tea on Cybersecurity

Cybersecurity—a word we hear all the time, but do you really know what it means?


The Tea on Cybersecurity breaks it down without the confusing jargon. We spill the truth about security and compliance in a way that is easy to understand and actually useful.


Perfect for SaaS startups and small to medium sized businesses starting their journey in cybersecurity and compliance. We've learned to keep it short -15-30 minutes per episode - so you get the facts and none of the fluff.