WGTD Listen Live
Kaseya VSA Breach Analysis
Practical Usage of Cyber Liability Insurance
Location Services, Face Unlock on iPhone, Colonial Pipeline attack
Incident response and strategies for mitigating supply chain attacks
Exchange HAFNIUM attack
· Pretty much every Exchange server on the planet got hacked that was internet accessible without protections in front of it
Challenges with having baseline 101 level quality IT services
Beware of outsourced help desks
Items to use to assess your IT services provider
Dark web scanning, identity and access management, cybersecurity training for staff
Solarwinds hack and how it related Dominion voting machines
Juice jacking - don't use public charging stations
Overview of the secure endpoint strategy you need to be using for 2021
Zero trust cybersecurity posture concepts. How many agents should be on an endpoint? Examples of some good products we should use and why Concepts of the technology security stack
Bluetooth BLUR attacks
Bluetooth range estimator
How easy is it to not get hacked?
Wireless troubleshooting transitive trust agreements and how they introduce risk to your organization.
Real world examples of small business security compliance problems
Geofence Warrants, Waze for COVID
Those who invested in security proactively are in an excellent condition now.
Waze for COVID
Wireless security, wireless TCO, 3-2-1 backup strategy, MFA and IP access control strategies
Vehicles and privacy
Location services issues and how it relates to personal physical security
Why many IT business decision makers make mistakes. Why bidding out IT jobs often fails
Topics: Sim jacking, More AWS data breaches affect hundreds of thousands of people, Hacking using smart light bulbs, IoT bricker, MFA options
email security and cyber risk insurance htt
The dark side of smart cities, A clothing line designed to distract the panopticon, Geofencing warrants, and horror stories of hospital IN-security
Facial recognition, systems with Windows Defender compromised, and 11 recent security vulnerabilities highlight the necessity of viable network layer security strategy.
FTC vs LabMD court case and what we can learn from it.
Security News: Legal liabilities of read receipts, VFEMail and data stores completely destroyed, Facebook storing passwords in cleartext, Why WPA3 is not secure either, and ASUS software updates install backdoors on thousa
NotPetya; the most devastating cyber attack in history.
Browser add-in NewsGuard
Communications Decency Act - Section 230
Privileged identity management
Failure of the one identity concept.
Virtual Patching, Telecom Fraud, Running VM Server on NAS
TruthFinder evaluation, SIM jacking, and Why SMS for multi-factory authentication is very risky.
Appliances versus real server hardware and video surveillance system design.
Server Hardware, Windows 10 and IPv6 requirement, Running a VM on a Synology NAS
Tech companies and their scoring system
Security Protocols and Ciphers- Educate yourself about the dangers of 5G radiation to human health
Dangers of 5G Radiation
Avoiding Identity Theft and Location Data Sharing
Website Security, how to keep your website secure and why it is necessary. TLS 1.3 impact for all end users of all browsers and what it means
How to avoid business email compromise scams
Part 2 of the Verizon data breach team's report analysis and related identity theft topics
Verizon Data Breach Investigations Report review.
Cloud hosted servers are usually a rip-off;Explanation of SaaS versus IaaS
Deprecated software follow-up, Examples of more VOIP providers and discussion about the security or lack thereof regarding their services, Amazon spy devices
Deprecated Software and Network Security Strategy
Biometric Auth Defeats, Internet of Things Insecurity, and Recovery Time Objectives
Fine Arts Director
Digital Director and Development Specialist
Russ WellerGRRS and HD2 Director