DIY Cyber Guy

podcast

Suscribirse

DIY Cyber Guy

#63 - New Concerns About Two-Factor Authentication

Should phone reps be Identity Investivators?  Can all reps be trusted to keep hackers out of your...

Añadir a ... 

#62 - Ransomware Hits The Brakes At Ferrari - Protect Your Network Now

Hackers speed off with Ferrari data in a #ransomware attack. See how to stop an attack before it...

Añadir a ... 

#61 - How to Make Sure that Your IT Provider Is Not A Ransomware Target

If you use a managed service provider (MSP) to manage your company's IT needs, learn how to hold...

Añadir a ... 

#60 - How Lessons Learned by Large Companies Can Help YOU Keep Your Cloud Data Secure

Uber just had another data breach.  Learn from their mistakes, and the mistakes of other larege...

Añadir a ... 

#59 - How Twitter Could Have Avoided Their Massive Data Breach (And How You Can, Too)

Hackers are using the recent Twitter breach, combined with the other 4,100 data breaches in 2022,...

Añadir a ... 

#58 - Samsung Customer Data Hacked - What You Need To Do

Hackers stole Samsung's customer data from a US-based facility.  Were you affected?  What sis...

Añadir a ... 

#57 - Hackers are Using Personal Smartphones and Emails as a Backdoor Into Your Employer

Phishing attacks have evolved. Hackers have found new ways to use private messaging apps,...

Añadir a ... 

#56 - The Best Cybersecurity Defense (And It’s Not Found In Technology)

Why do you wear a seatbelt?  Is it because of protection, or the penalty for not doing it? Adopt...

Añadir a ... 

#55 - Update Apple Devices Now

Serious vulnerabilities have just been patched in Apple products. If you own an Apple iPhone,...

Añadir a ... 

#54 -  Developing a Digital Vision in Education

Preparing students for success in a digital world requires educators, administrators and parents...

Añadir a ... 

#53 - Cybersecurity and the Future of Education

What is the future of education, and how does cybersecurity impact  Education differently?  How...

Añadir a ... 

#52 - New Privacy Law for People Who Live in Connecticut, and Any Company That Serves Them

If you are a customer in Connecticut, you should to understand this. But if you sell to any...

Añadir a ... 

#51 - How Hackers Can Steal Your Cryptocurrency from Your Mobile Phone

New report from Trend Micro details how hackers steal your money and your passwords. Learn how to...

Añadir a ... 

#50 - You Are On The Front Lines Of A Cyber War, And It Just Escalated

Ransomware has become a mature industry, and it is waging war on vulnerable companies with cash...

Añadir a ... 

#49 - How To Detect Data Tampering

Ransomware is increasing, and it is the worst form of data tampering.  Find out new ways to...

Añadir a ... 

#48 - Five Steps to Landing Your First Cybersecurity Job

Experienced developer and educator Bobby Davis, Jr. simplifies the process of landing your first...

Añadir a ... 

#46 - How to Get Your First Cloud-Security Certification

Learn how to Get your first cloud-security certification to start your career in Cybersecurity!\r\n

Añadir a ... 

#45 - How to Get a Job in Cybersecurity

Learn how to get a job in cybersecurity from cybersecurity head-hunter Martin Burnett.\r\n

Añadir a ... 

#44 - How to Make a Cybersecurity Game Plan in 15 Minutes

You open your laptop, and find that you have been locked out by ransomware. Do you have a plan?...

Añadir a ... 

#47 - How SMB\'s Can Be More Productive and Resilient Using the Cloud

Learn how your small or medium-size business can be more productive and resilient using the...

Añadir a ...