Technically U

Building a Cybersecurity Fortress: Protect Your Business from Phishing, Ransomware & More!


Listen Later

This three-part podcast episode details business network vulnerabilities, focusing on common cyberattacks like phishing and ransomware.

It outlines preventative measures, including software updates, multi-factor authentication, and network firewalls.

This podcast also emphasizes the importance of employee training and regular security audits. Furthermore, it advocates for using Managed Security Service Providers (MSSPs) to enhance protection and streamline security management.

Finally, the episode stresses the ever-evolving nature of cyber threats and encourages proactive security strategies.

NIST: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf

ISO Standards: https://www.iso.org/standards.html

The Center for Internet Security Controls (CIS): https://www.cisecurity.org/controls

SOC2: https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/serviceorganization-smanagement

PCS-DSS: https://www.pcisecuritystandards.org/about_us/

COBIT: http://isaca.org/

HITRUST: https://hitrustalliance.net/

CMMC 2.0: https://dodcio.defense.gov/CMMC/

CISA: https://www.cisa.gov/topics/cybersecurity-best-practices

What are Network Vulnerabilities?: (1:05)

Hackers Tactics: (1:40)

DDoS Attacks: (2:55)

Man In The Middle Attacks: (3:35)

Zero Day Exploits: (4:15)

SQL Injections Attacks: (4:50)

Insider Threats: (5:35)

Building The Fortress (6:30)

Software Updates: (6:40)

Strong Authentication: (7:08)

Network Firewalls: (7:50)

Data Encryption: (8:20)

Endpoint Security: (9:20)

Security Audits - Pen Testing: (10:30)

MSP - MSSPs: (12:05)

Part Two - DeepDives: (14:00)

Patch Management: (14:35)

Role-Based Access Control - RBAC: (15:30)

Types of Firewalls: (16:15)

Symmetrical and Asymmetrical Encryption: (17:50)

Tailored Industry Training: (19:15)

Endpoint Solutions: (20:00)

Security Audits - Pen Testing: (21:20)

Benefits of an MSSP: (22:30)

Individual Security Efforts: (25:00)

Part Three - Layered Defense: (25:40)

People and Processes: (27:00)

Risk Management: (27:50)

...more
View all episodesView all episodes
Download on the App Store

Technically UBy Technically U