
Sign up to save your podcasts
Or


This three-part podcast episode details business network vulnerabilities, focusing on common cyberattacks like phishing and ransomware.
It outlines preventative measures, including software updates, multi-factor authentication, and network firewalls.
This podcast also emphasizes the importance of employee training and regular security audits. Furthermore, it advocates for using Managed Security Service Providers (MSSPs) to enhance protection and streamline security management.
Finally, the episode stresses the ever-evolving nature of cyber threats and encourages proactive security strategies.
NIST: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf
ISO Standards: https://www.iso.org/standards.html
The Center for Internet Security Controls (CIS): https://www.cisecurity.org/controls
SOC2: https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/serviceorganization-smanagement
PCS-DSS: https://www.pcisecuritystandards.org/about_us/
COBIT: http://isaca.org/
HITRUST: https://hitrustalliance.net/
CMMC 2.0: https://dodcio.defense.gov/CMMC/
CISA: https://www.cisa.gov/topics/cybersecurity-best-practices
What are Network Vulnerabilities?: (1:05)
Hackers Tactics: (1:40)
DDoS Attacks: (2:55)
Man In The Middle Attacks: (3:35)
Zero Day Exploits: (4:15)
SQL Injections Attacks: (4:50)
Insider Threats: (5:35)
Building The Fortress (6:30)
Software Updates: (6:40)
Strong Authentication: (7:08)
Network Firewalls: (7:50)
Data Encryption: (8:20)
Endpoint Security: (9:20)
Security Audits - Pen Testing: (10:30)
MSP - MSSPs: (12:05)
Part Two - DeepDives: (14:00)
Patch Management: (14:35)
Role-Based Access Control - RBAC: (15:30)
Types of Firewalls: (16:15)
Symmetrical and Asymmetrical Encryption: (17:50)
Tailored Industry Training: (19:15)
Endpoint Solutions: (20:00)
Security Audits - Pen Testing: (21:20)
Benefits of an MSSP: (22:30)
Individual Security Efforts: (25:00)
Part Three - Layered Defense: (25:40)
People and Processes: (27:00)
Risk Management: (27:50)
By Technically UThis three-part podcast episode details business network vulnerabilities, focusing on common cyberattacks like phishing and ransomware.
It outlines preventative measures, including software updates, multi-factor authentication, and network firewalls.
This podcast also emphasizes the importance of employee training and regular security audits. Furthermore, it advocates for using Managed Security Service Providers (MSSPs) to enhance protection and streamline security management.
Finally, the episode stresses the ever-evolving nature of cyber threats and encourages proactive security strategies.
NIST: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf
ISO Standards: https://www.iso.org/standards.html
The Center for Internet Security Controls (CIS): https://www.cisecurity.org/controls
SOC2: https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/serviceorganization-smanagement
PCS-DSS: https://www.pcisecuritystandards.org/about_us/
COBIT: http://isaca.org/
HITRUST: https://hitrustalliance.net/
CMMC 2.0: https://dodcio.defense.gov/CMMC/
CISA: https://www.cisa.gov/topics/cybersecurity-best-practices
What are Network Vulnerabilities?: (1:05)
Hackers Tactics: (1:40)
DDoS Attacks: (2:55)
Man In The Middle Attacks: (3:35)
Zero Day Exploits: (4:15)
SQL Injections Attacks: (4:50)
Insider Threats: (5:35)
Building The Fortress (6:30)
Software Updates: (6:40)
Strong Authentication: (7:08)
Network Firewalls: (7:50)
Data Encryption: (8:20)
Endpoint Security: (9:20)
Security Audits - Pen Testing: (10:30)
MSP - MSSPs: (12:05)
Part Two - DeepDives: (14:00)
Patch Management: (14:35)
Role-Based Access Control - RBAC: (15:30)
Types of Firewalls: (16:15)
Symmetrical and Asymmetrical Encryption: (17:50)
Tailored Industry Training: (19:15)
Endpoint Solutions: (20:00)
Security Audits - Pen Testing: (21:20)
Benefits of an MSSP: (22:30)
Individual Security Efforts: (25:00)
Part Three - Layered Defense: (25:40)
People and Processes: (27:00)
Risk Management: (27:50)