Welcome to the Cyber24 Podcast
your source for the latest on cyber security Subscribe on iTunesSubscribe on Google PlayEpisode 91: Engaging your leadership team and board to your cybersecurity efforts
Building a culture of cybersecurity in your business doesn’t just happen. And when it doesn’t happen, trouble is just a few clicks away. So how do you keep your IT team connected to senior leadership and even to your governing board? Cybersecurity is an effort that...
Episode 90: Twitter hacked and playing cyber defense to protect COVID-19 research
One of the world’s largest and most influential social media platforms had a breach of some of its most high-profile users. In this episode of the CYBER24 podcast, presented by VLCM, we look at the hack of verified Twitter accounts and discuss foreign attempts to...
Episode 89: The Anatomy of a Hack
Protecting your business from cyber criminals means you have to think like a hacker. In this episode of CYBER24, presented by VLCM, we connect with Webcheck Security CEO Greg Johnson and Webcheck Security VP of Engineering Curt Jeppson, to get some insight on how...
Episode 88: Zoom fatigue and big biz found lax in protecting domains
For many businesses, their most valuable asset may be their web domain. If customers can’t find you on the web, you may as well not exist. But a new study shows a shocking number of businesses don’t take basic steps to protect their domains. Plus, we look at the new...
Episode 87: Risk ransomware or invest in security? Small biz struggles
In this episode of the CYBER24 podcast, presented by VLCM, we discuss why many businesses are willing to risk a cybersecurity incident rather than invest in security training and technology. We also look into a recent phishing incident at a Utah hospital system....
Episode 86: SOC 2 and other Corporate Certs – What, Why? How?
In this episode of the CYBER24 podcast, presented by VLCM, we continue our look cyber frameworks and certifications. We take a deep dive into the popular SOC 2. We learn more about SOC 2, to whom it applies, why some organizations need it, and how they get it....