Sinopsis
Join InfoSystems as we discuss the technologies that impact businesses and communities in Tennessee and the surrounding regions. As a leader in business IT, it is our responsibility to help company leaders understand technologies that may impact their business, avoid predatory sales tactics from technology providers, and gain perspective about IT skills needed to deploy and manage technologies.
Episodios
-
Cybersecurity Weekly - Season 1, Episode 24
15/06/2020 Duración: 16minIn this episode, Fred and Garrett discuss how you can adopt defenses to deflect Malicious Software (AKA Malware). This is the second Foundational CIS Control and is crucial for your personal and business security. The Malware Defenses control is most impactful when a company has taken action against the first six Basic CIS Controls and the first Foundational CIS Control (following the CIS Top 20 Cybersecurity Controls).
-
Cybersecurity Weekly - Season 1, Episode 23
08/06/2020 Duración: 11minIn this episode, Fred and Garrett discuss the recent Mozilla Firefox Vulnerability Patches that were issued. These vulnerabilities have been found to allow cyber criminals to install programs, manipulate data, and create new accounts with full user rights under your account(s). Anyone currently using Mozilla Firefox versions prior to 77.0 should take immediate action.
-
Cybersecurity Weekly - Season 1, Episode 22
01/06/2020 Duración: 21minIn this episode, Fred and Rob discuss how you can protect your email and web browsers. This is the first Foundational CIS Control and is used to minimize your vulnerability to attackers. The Email and Web Browser Protections control is most impactful when a company has taken action against the first six Basic CIS Controls (following the CIS Top 20 Cybersecurity Controls).
-
Cybersecurity Weekly - Season 1, Episode 21
27/05/2020 Duración: 13minIn this episode, Fred and Rob discuss how to collect, manage, and analyze audit logs that help a corporation detect, understand, and recover from a cyber-attack. The maintenance, monitoring, and analysis of audit logs is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, practices Continuous Vulnerability Management, has Controlled Use of Administrative Privileges, and has Secured Configuration of Hardware/Software (following the CIS Top 20 Cybersecurity Controls).
-
Cybersecurity Weekly - Season 1, Episode 20
18/05/2020 Duración: 15minIn this episode, Fred and Rob discuss part two of becoming a Cybersecurity professional. Previously, Fred and Rob discussed being on the "offense" in the Cybersecurity industry. Now they'll discuss being on the "defense" and what that side of Cybersecurity looks like. Because the Cybersecurity field is ever changing, there is a great need for these experts and their unique skill set. The industry is booming and new opportunities are arising every day.
-
Cybersecurity Weekly - Season 1, Episode 19
11/05/2020 Duración: 15minIn this episode, Fred and Rob discuss how to establish, implement, and manage security arrangements of hardware and software on devices. This helps prevent cyber attackers from getting control of vulnerable settings and services. The secure configuration for hardware and software is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, practices Continuous Vulnerability Management, and has Controlled Use of Administrative Privileges (following the CIS Top 20 Cybersecurity Controls).
-
Cybersecurity Weekly - Season 1, Episode 18
04/05/2020 Duración: 19minIn this episode, Fred and Rob discuss professional roles in the Cybersecurity industry and why you should consider it. Not only are Cybersecurity experts the most sought after professionals in the technology industry, but because the Cybersecurity field is ever changing, there is a great need for these experts and their unique skill set. The industry is booming with no end in sight. And new opportunities are arising every day.
-
Cybersecurity Weekly - Season 1, Episode 17
27/04/2020 Duración: 15minIn this episode, Fred and Rob discuss controlling the use of administrative privileges, the process of managing privileges on computers, networks, and applications. The controlled use of administrative privileges is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, and practices Continuous Vulnerability Management (following the CIS Top 20 Cybersecurity Controls).
-
Cybersecurity Weekly - Season 1, Episode 16
15/04/2020 Duración: 21minSetting up a remote workforce is frustrating when there are no policies or plans in place to help. In addition, without the proper security measures, a remote workforce is vulnerable to cyber-attack. In this episode, Fred and Josh discuss how to respond to the demand of a remote workforce with proactive policies, plans, and security controls. This episode is not meant to be a quick fix or legal advice, but tried and true advice from InfoSystems' lead Cybersecurity expert, Fred Cobb. First, all business leaders should take a look at the administrative controls that are in place to cover remote workers and their technology.
-
Cybersecurity Weekly - Season 1, Episode 15
23/03/2020 Duración: 12minIn this episode, Fred and Chad discuss continuous vulnerability management, the practice of regularly scanning and cleaning devices and the applications being used on those devices. Vulnerability Management is most impactful when a company first has an inventory of Hardware Assets and Software Assets (following the CIS Top 20 Cybersecurity Controls).
-
Cybersecurity Weekly - Season 1, Episode 14
16/03/2020 Duración: 14minIn this episode, Fred and Chad discuss Software Assets, or in other words, the software your company uses. Learn why your company needs to keep an inventory of software assets, how to get control of software assets, and tools that can help you do both of the above.
-
Cybersecurity Weekly - Season 1, Episode 13
09/03/2020 Duración: 10minIn this episode, Fred and Chad discuss Hardware Assets, or in other words, the technology devices your company owns. Learn why your company needs to keep an inventory of hardware assets, how to get control of hardware assets, and tools that can help you do both of the above.
-
Cybersecurity Weekly - Season 1, Episode 12
02/03/2020 Duración: 15minIn this episode, Fred and Chad discuss how an organization can create a Culture of Security, a holistic mindset of being more secure. A culture of security isn't just another initiative an organization should consider. With the growing rate and cost of cyber-attacks, it's pertinent for organizations and employees to understand what it takes to be secure and prepared.
-
Cybersecurity Weekly - Season 1, Episode 11
24/02/2020 Duración: 11minIn this episode, Fred and Chad discuss a topic that has been all over the news. It has created fear and has made quarantines and evacuations necessary in certain parts of the world. This discussion is all about the Coronavirus and the scams being spread amidst a time of global uncertainty.
-
Cybersecurity Weekly - Season 1, Episode 10
17/02/2020 Duración: 16minIn this episode, Fred and Chad discuss Firewalls, the perimeter that stands between the outside (online) world and your company's internal networks. Firewalls add a higher level of security to your company.
-
Cybersecurity Weekly - Season 1, Episode 9
10/02/2020 Duración: 14minIn this episode, Fred and Chad discuss End-of-Life (EOL), when your systems, devices, or firmware are no longer supported by their developers. You'll learn how to prepare for the End-of-Life dates for your technology and how to decide whether you need to upgrade, retire, or completely replace these tools.
-
Cybersecurity Weekly - Season 1, Episode 8
03/02/2020 Duración: 14minIn this episode, Chad and Fred discuss patching, the act of updating your system and applications to fix vulnerabilities. Hardware and software manufacturers are consistently scanning their systems and applications for vulnerabilities. When vulnerabilities are found, patches - or rather, updates - are released by these manufacturers to fix those vulnerabilities. Patching not only rids systems of vulnerabilities; patching blocks the ability for cyber criminals to exploit them.
-
Cybersecurity Weekly - Season 1, Episode 7
27/01/2020 Duración: 17minIn this episode, Fred and Josh discuss simulated cyber-attacks, which is when companies act out real world situations and test their ability to respond. There are 16 scenarios with countless variables that a cybersecurity services company can use to help businesses test their plans and discover where they may fall short. Cyber-attacks are happening every day and becoming more sophisticated. Experts agree that these types of simulations are one of the best ways to prepare for them.
-
Cybersecurity Weekly - Season 1, Episode 6
20/01/2020 Duración: 16minIn this episode, Fred Cobb explains Whitelisting and Blacklisting, the process used to control what applications and websites employees can connect to. Companies that don't place limitations on employee access have a greater risk of experiencing a breach and are more likely to have a widespread outbreak. Some business leaders may feel placing limitations on employees will dampen morale. Fred explains why these limitations are important and can minimize the impact of cyber-attacks.
-
Cybersecurity Weekly - Season 1, Episode 5
13/01/2020 Duración: 15minIn this episode, Fred and Josh discuss the important things you need to consider for your employees who work remotely. It's estimated that over 4 Million Americans are working remotely. Many of these individuals are connecting to wi-fi on home networks or public networks in coffee shops or hotel lobbies, often to do confidential work. Without the right security policies and procedures, your employees are vulnerable to cyber attacks; which makes your business vulnerable to cyber attacks. For this reason (and many more) it is crucial for employers to create policies and procedures to protect employees and their devices. Listen to the full episode for information that can better secure your remote employees, their devices, and your business.