
Sign up to save your podcasts
Or


🔥New Episode🔥 The Cybercrime Junkies show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime to ensure your online safety.
CHAPTERS
00:00 Introduction: Why Your First Call During a Cyber Attack Matters
00:10 Welcome and Overview: Hospital Ransomware Scenario at 2AM
01:14 Meet Nick Morrison: Kentucky Office of Homeland Security
02:04 What is a Fusion Center and Why Nobody Knows About It
03:07 Building Relationships Before Crisis: The Public-Private Partnership
04:19 Statistics That Prove Law Enforcement Involvement Saves Money
06:12 How FBI Can Help Avoid Paying Ransoms
08:06 Incident Response Planning: Why Fire Drills Apply to Cyber Attacks
10:10 Real Hospital Breach Scenario: Small IT Team Gets Hit
12:45 First Critical Steps: Detection and Containment When Ransomware Strikes
15:19 What MSPs Do Well vs What's Missing in Cybersecurity
17:16 Why Every Minute Counts During Initial Response
18:21 Network Operations vs Security Operations: Understanding the Difference
18:53 Governance Explained: Proactive vs Reactive Security Mindset
21:40 Why Breached Organizations Are Most Proactive About Security
23:47 Incident Response Plans: Roles, Responsibilities, and Asset Protection
25:55 Car Door Analogy: How Hackers Are Opportunistic, Not Creative
27:10 AI Arms Race: Defenders and Attackers Using Same Technology
28:10 Prompt Injection Attacks Explained: The New AI Vulnerability
30:17 MoltBook Breach: When AI Social Networks Get Compromised in Days
32:55 Who Should Be in the Room for Incident Response Planning
34:30 Risk Appetite: Understanding Acceptable Risk in Cybersecurity
36:14 Living Documen
Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Â
Â
Support the show
🔥New Exclusive Offers for our Listeners! 🔥
Dive Deeper:
🔗 Website: https://cybercrimejunkies.com
📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief
✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
===========================================================
By Cyber Crime Junkies. Host David Mauro.4.8
2828 ratings
🔥New Episode🔥 The Cybercrime Junkies show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime to ensure your online safety.
CHAPTERS
00:00 Introduction: Why Your First Call During a Cyber Attack Matters
00:10 Welcome and Overview: Hospital Ransomware Scenario at 2AM
01:14 Meet Nick Morrison: Kentucky Office of Homeland Security
02:04 What is a Fusion Center and Why Nobody Knows About It
03:07 Building Relationships Before Crisis: The Public-Private Partnership
04:19 Statistics That Prove Law Enforcement Involvement Saves Money
06:12 How FBI Can Help Avoid Paying Ransoms
08:06 Incident Response Planning: Why Fire Drills Apply to Cyber Attacks
10:10 Real Hospital Breach Scenario: Small IT Team Gets Hit
12:45 First Critical Steps: Detection and Containment When Ransomware Strikes
15:19 What MSPs Do Well vs What's Missing in Cybersecurity
17:16 Why Every Minute Counts During Initial Response
18:21 Network Operations vs Security Operations: Understanding the Difference
18:53 Governance Explained: Proactive vs Reactive Security Mindset
21:40 Why Breached Organizations Are Most Proactive About Security
23:47 Incident Response Plans: Roles, Responsibilities, and Asset Protection
25:55 Car Door Analogy: How Hackers Are Opportunistic, Not Creative
27:10 AI Arms Race: Defenders and Attackers Using Same Technology
28:10 Prompt Injection Attacks Explained: The New AI Vulnerability
30:17 MoltBook Breach: When AI Social Networks Get Compromised in Days
32:55 Who Should Be in the Room for Incident Response Planning
34:30 Risk Appetite: Understanding Acceptable Risk in Cybersecurity
36:14 Living Documen
Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Â
Â
Support the show
🔥New Exclusive Offers for our Listeners! 🔥
Dive Deeper:
🔗 Website: https://cybercrimejunkies.com
📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief
✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
===========================================================

187 Listeners

4,402 Listeners

374 Listeners

651 Listeners

1,024 Listeners

684 Listeners

8,083 Listeners

369,837 Listeners

99,723 Listeners

315 Listeners

2,168 Listeners

47,465 Listeners

6,123 Listeners

3 Listeners

167 Listeners