4 episodes

The complex world of protecting your organisation from the internet-based cybercriminal can be daunting for most.As a C-level executive, manager, owner or board member of a not-for-profit organisation, a charity or a small or medium enterprise you are faced with a number of issues related to data.This podcast is here to help you, from simple solutions to complex strategies. It will address as many as possible.Business is all about risk, revenue, brand and productivity.A cyber event can impact all of them.

Need help - Ask Roger Director

    • Arts

The complex world of protecting your organisation from the internet-based cybercriminal can be daunting for most.As a C-level executive, manager, owner or board member of a not-for-profit organisation, a charity or a small or medium enterprise you are faced with a number of issues related to data.This podcast is here to help you, from simple solutions to complex strategies. It will address as many as possible.Business is all about risk, revenue, brand and productivity.A cyber event can impact all of them.

    Why we need to understand the vulnerability process

    Why we need to understand the vulnerability process

    Introduction to the episodeThis episode we are going to focus on vulnerabilities and how they are managedThreat actors use vulnerabilities to target us.By exploiting vulnerabilities they can gain access to systems, networks and devices.Vulnerabilities allow the criminals to gain a foot hold on a system.Vulnerabilities can be bugs, malicious changes to code (solarwinds), accidents or default configurations.Vulnerability managementWhat is a vulnerabilityHow much exposureHow can we measure it al...

    • 15 min
    Why do we need to patch?

    Why do we need to patch?

    In the last 2 episodes, we have focused on passwords - unique, complex and more than 12 characters.We also know that account credentials can be stolen and we needed additional securityEnter 2FA or multi FAUsername = who you arePassword = what you know2FA / Multi FA = what you have If we need access to data then we need these systems. But the bad guys often do not need an account to get in. There are other ways One is to target vulnerabilities. To target vulnerab...

    • 27 min
    Why we need to embrace 2FA/Multi Factor Authentication

    Why we need to embrace 2FA/Multi Factor Authentication

    Last episode we focused on the dreaded password Where did they come fromWhy do we use them,Why they are important for protecting your stuffWhat they are made up of and what not to use. This episode of the Just the basics - Ask Roger we will focus on the addition of a third level of protection around your internet based sites and services Access to every account has a username and password - who you are and what you know The third layer is what you have and that is called m...

    • 15 min
    Why the hell do we need exotic passwords

    Why the hell do we need exotic passwords

    Passwords, our passport to the cyber and digital realmFor a business, password management is a major headache.As a business you have to get people to understand that passwords are essential and good passwords are critical to protecting data, systems and people.Ensuring that they are This episode we are going to focus on ………..Let's start with passwords. History of passwords (open sesame)Since the late 90'sStarted basic and got more and more complex.Why do we have passwordsProtect our...

    • 21 min

Top Podcasts In Arts

The Bookshelf with Ryan Tubridy
Ryan Tubridy
Glad We Had This Chat with Caroline Hirons
Wall to Wall Media
Dish
S:E Creative Studio
Table Manners with Jessie and Lennie Ware
Jessie Ware
99% Invisible
Roman Mars
Sara & Cariad's Weirdos Book Club
Plosive