Welcome to the Cyber24 Podcast
your source for the latest on cyber security Subscribe on iTunesSubscribe on Google PlayEpisode 118: Awareness training benefits and best practices
Hackers know your business is only as secure as your weakest link and they'll try anything to trick your employees into giving away a password. Training your employees to be on the lookout for social engineering efforts and making sure they understand their role in...
Episode 117: Ransomeware as a service
The year 2020 brought a lot of change to the word but it didn't stop ransomware. Now a new Ransomeware as a Service is growing in popularity among hackers. Egregor has publicly claimed over 150 victims since September and the FBI is warning business about this new...
Episode 116: Crisis Communication for a cyber breach
You have worked for years or decades to build your business reputation. Customers have come to trust you for the quality of your service and all that takes a significant hit when a hacker penetrates your defenses and compromises the security of customer data. The good...
Episode 115: Equipping your team to respond to a hack
A hacker gets into your network and your tech team springs into action. What do they need to be trained and equipped to do when every second counts? We discuss response actions you need to have ready with our panel of cybersecurity experts. Anthony Booyse, Sophos Dan...
Episode 114: Invest in investigation tools, forensics
A hacker breaches your system and causes any number of problems. Figuring out how they got in and what you can do to prevent it is a key part of your response. As Sophos security experts put it: "The more data that is collected – from the endpoints and beyond – the...
Episode 113: Knowing who has access to what is a critical part of your security, incident response plan
Not everyone in your organization should have access to the same parts of your network or to all your data. It only makes sense that the marketing team and the human resources team have distinct roles and each doesn't need access to the same data and systems in order...