Share :60 Second InfoSec
Share to email
Share to Facebook
Share to X
By AlphaONE Operations
The podcast currently has 10 episodes available.
In this episode of our series on ransomware, Kevin covers some administrative and physical controls that business owners can employ to secure their facilities along with their information.
Administrative controls cover the human element within computer security and all levels of an organization are considered in scope....from entry level all the way to the C-Suite.
Physical controls cover security measures to deter unauthorized physical access to sensitive material. As they say, "possession is 9/10ths of the law" -- in the data security world, the easiest way to gain a foothold is through physical intrusions.
For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.
Like any other cyber security threat, ransomware needs to be addressed with what's known as "Defense in Depth."
It's a combination of controls used in tandem to support one another... technical controls, physical controls, and administrative controls. In this episode, Kevin hits on some of the technical controls that can make or break your chance of surviving a cyber attack.
The obvious ones that most people think of are network components like firewalls, switches, and routers.
They are important and helpful when configured appropriately, but there are a few others you should think about.
For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.
This is the first episode of a series where we focus on one of the attack types that has been making a lot of noise in the news recently... ransomware.
In this series, we'll cover topics to help you understand what it is, why your business should care, what you can do to protect yourself. And hopefully you never need it, BUT .... how you should prepare in case you're ever in the precarious situation of being locked out of your data.
At AlphaONE, we specialize in working with SMBs -- or Small & Medium Size Businesses. We hear things like "I'm too small, the bad guys don't care about me" or "I have cybersecurity insurance for when I get hit." There are many reasons that this way of thinking can be disastrous and Kevin touches on them all in this series so be sure to listen for help in keeping your name out of the security headlines!
For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.
This is the last week in our coverage on Social Engineering -- or the use of deception to manipulate human behavior.
In this episode, Kevin introduces you to a couple more tactics that the bad guys use to try and bypass your PHYSICAL security controls--"The IT Guy Attack" and “The Cable Guy Attack." Both involve someone pretending to be a tech to gain access to highly controlled spaces and once they're in, they can usually go through a facility unnoticed.
How can you and your employees defend against these attacks? Listen to find out!
AlphaONE is always available to help test, train, and educate your business & employees on social engineering. Get in touch with us at a1ops.com and follow us on social media (FB, Twitter, Insta, LinkedIn).
The word "tailgating" is usually associated with fun and football, but this week, Kevin lets us know that it is also a tactic the bad guys use to gain physical access to your business and its assets by taking advantage of natural human tendencies.
This is Part 3 in our coverage on social engineering—using deception to manipulate human behavior.
Not familiar with the concept of social engineering? Check out our blog for more information about this deceptive practice designed to take advantage of human nature to bypass your electronic security (https://www.a1ops.com/blog/).
For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.
This week, Kevin will continue our coverage on social engineering—using deception to manipulate human behavior.
Our topics in this episode are additional threats on your technical electronic controls--phishing, vishing and smishing. And while the names of these tactics may sound strange or even silly, you better believe they are very effective at gaining access to otherwise protected assets!
Not familiar with the concept of social engineering? Check out our blog for an intro to this deceptive practice designed to take advantage of human nature to bypass your electronic security (https://www.a1ops.com/what-is-social-engineering/).
For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.
Social engineering, simply put, is essentially the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques.
For example, instead of trying to find a software vulnerability, a social engineer might call an employee and pose as an IT support person trying to trick the employee into divulging his password.
In this episode, Kevin explains how one trick at the social engineer's disposal involves using something as simple as a strategically placed USB key.
For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.
The second episode in our series about ransomware. In this episode, Kevin tells you what to do to prevent getting into a situation where you or your company is attacked or targeted by hackers.
For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.
Ransomware. You hear about it a lot in the news, but do you know what it is and how it can effect you and your business? In this episode, Kevin walks you through how to react if you or your business have been attacked with ransomware.
For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.
The podcast currently has 10 episodes available.