6 episodes

Data Defender is a video podcast series hosted by Renee Jones, owner and operator of Defense N Depth.
Data Defender is a series where our mission is to drive growth and revenue by reducing vulnerabilities and integrating cyber security best practices into business.

Renee Jones Podcast Renee Jones

    • News

Data Defender is a video podcast series hosted by Renee Jones, owner and operator of Defense N Depth.
Data Defender is a series where our mission is to drive growth and revenue by reducing vulnerabilities and integrating cyber security best practices into business.

    Payment Preferences | Data Defender

    Payment Preferences | Data Defender

    Payment Preferences | Data Defender

    On this Episode of Data Defender, we talk with Eric Morgan owner of Majestic Auto Detail and how to protect customer data. Hi my name is Renee Jones owner of Defense-n-Depth. Welcome to Data Defender where our mission is to drive growth and revenue by reducing risks and vulnerabilities and implementing cybersecurity best practices. Today we welcome Eric Morgan owner of Majestic Auto Detail welcome Eric to Data Defender. - Thank you for having me. - Tell us a little bit about Majestic Auto Detail. Well Majestic Auto Detail what we do is we specialize in paint correction and ceramic coating. So what separates us from normal detailing services is we focus more on the actual perfection of the paint and the paint quality and the protection of paint less about cleaning interiors or cleaning wheels and things of that nature. While we also do that our main focus is taking a good product and making it grea.t How long have you been involved in auto detail and tell us how you got started. Alright so how I got started in detailing was in college, my sophomore year I needed a little more money a little better job. So I went on Monster.com and they were hiring at Lexus around here in Smyrna Georgia and they were looking for a detailer and somebody who constantly washed my car I thought that was all there was to it. So I applied they're like oh do you know how to buff can I do this I was like yes should I not do all that because the price was right.   #ReneeJones #DataDefender #Payments

    • 8 min
    Everyday Data Defenders | Data Defender

    Everyday Data Defenders | Data Defender

     Everyday Data Defenders | Data Defender 

    You get an idea of a society by how that society treats its elderly and its children. On this episode of Data Defender I will show you how to make a difference in protecting yourself and those that are the most vulnerable. Hello my name is Renee Jones owner of Defense-n-Depth. Welcome to Data Defender, where our mission is to drive growth and revenue by reducing risks and vulnerabilities in your environment and implementing cybersecurity best practices. The first thing I'd like to talk to you about today is physical security and how physical security is a part of cyber security best practices. Let's think about everyday data defenders who are business owners in a plaza or a small mall. Those data defenders, those everyday data defenders are the people in the community who can spot patterns. They know their customers, they know their environment and it is up to those everyday data defenders to alert law enforcement, to alert other business owners in the community of a breach. Now, I know it's probably not the best thing that a business owner wants to do is to let people know that their information and data has been breached but remember bad actors test a company first. They may test a small business and if you don't say anything they're going to continue with their attacks. So small business owners who are in a small mall or who are together in some way need to communicate when they see something that's just a little bit off so they can alert other business owners about a potential breach.  #ReneeJones #DataDefender #CyberSecurity

    • 19 min
    The End User: Awareness | The Data Defender

    The End User: Awareness | The Data Defender

    The End User: Awareness | The Data Defender

    Today on this episode of Data Defender I tell you the most common way an unauthorized user can gain access to your business. Hi my name is Renee Jones owner of DefenseNDepth. Welcome to Data Defender where our mission is to drive revenue and growth by reducing your vulnerabilities and risk and applying cybersecurity best practices. What I'd like to talk to you about today is the importance of awareness and training of your end-users. The end-user creates, modifies, deletes data many many times during the day. Since organizations are connected pretty much like spider webs and even within your organization one department depends on another. An end-user that is not trained in cyber security best practices could introduce vulnerabilities into your system. The best patching upgrades, new hardware, new software won't matter if an end-user is not trained in awareness of cyber security best practices and clicks on a malicious email. All of your efforts are done because they have introduced malware into your organization. Data is the prize for an unauthorized user. They don't need your servers. They don't need your firewalls. They can purchase those online. It's your data. It is the information about your business, your intellectual property, your users or employees mother's maiden name, social security number, date of birth that is what they are after. So awareness and training for the end-user is important so that the end-user can recognize when a business process is normal or when something just doesn't feel right. There's something out of the ordinary with awareness and training you empower your users to understand what a normal business processes and what is something that just doesn't look right and they may need to notify you or the IT department another component of awareness and training is getting your users to

    • 9 min
    How important is cyber liability insurance and why you need it | Data Defender

    How important is cyber liability insurance and why you need it | Data Defender

    How important is cyber liability insurance and why you need it

    On this episode of Data Defender, we talk about cyber liability insurance and how it will become the standard for the coming year. Hello my name is Renee Jones owner of Defense N Depth welcome to Data Defender where we discuss how to implement cybersecurity best practices to reduce risk and vulnerabilities in your organization. Today we will discuss cyber liability insurance. Cyber liability insurance in the coming years will become as standard as auto insurance because all businesses connect like a spider web, whether internal or external. Internally businesses have separate departments that speak to each other. So to speak during daily business processes. Whether they're sending emails or sending information businesses interconnect internally. Businesses also interconnect externally through vendors, through other companies that they do business with to suppliers. So businesses any business is connected like a spider web and because of that every business is vulnerable and pretty soon cyber liability insurance will be as common as auto insurance. You may ask why cyber liability insurance will be as common as auto insurance. Well just like we are sitting here today and you're working from 8 to 5 or 8 to 8 as most people do and then you go home and you play with your children or attend to your family or work some more, bad actors use the same amount of hours to breach our systems and they look for information such as publicly available information that we so willingly use in social media or they are working with teams to get information or they're using the web to find information in order to breach systems.

    • 16 min
    Protecting Customer Data | Data Defender

    Protecting Customer Data | Data Defender

    Protecting Customer Data | Data Defender 



    Today on Data Defender we discuss protecting customer data. As an enterprise or an organization how do you protect your customer data? Today we have a business that will talk about protecting customer data. Hi my name is Renee Jones owner of defense-n-depth. Welcome to Data Defender where we talk about implementing cyber security best practices in your organization to reduce risks and vulnerabilities. Today we have with us Ariel Hodge owner of Golden Goddess. Ariel welcome to Data Defender - thank you, thank you for having me. - Please tell us a little bit about yourself and the product. - okay well first I want to say thank you so much for having me my name is Ariel Hodge. I am a hairstylist. I've been a hairstylist for about seven years now and I work on all types of hair, so ethnic hair, coarse hair, straight hair, men, women you name it, I do it. So in the industry I've realized that a lot of products have a lot of chemicals so I don't primarily work with natural hair but I like natural hair care so I'd rather us not put so many chemicals so I decided to create my own hair line. So my hair line is a 100% plant-based and organic. - Wonderful, wonderful tell us a little bit about each of the products, I'm curious. - Okay so first we have nature's cleanse which is my shampoo. It has African blacks taupe which is rich in vitamin A and E. It's going too deeply cleanse the hair without stripping the moisture. It's going to put moisture in as well as cleanse. In the coconut milk that's in it also it's very moisturizing and high of course very moisturizing and hydrating.

    • 16 min
    Cyber Security Best Practices, What are they? | Data Defender

    Cyber Security Best Practices, What are they? | Data Defender

    Cyber Security Best Practices, What are they? | Data Defender

    On this episode of Data Defender we discuss identifying the top five critical processes for your business. Hi my name is Renee Jones, owner of Defense-In-Depth. Welcome to Data Defender where our mission is to drive growth and revenue by reducing your vulnerabilities and risk and implement cybersecurity best practices. These best practices can also be used with the CMMC certification. Today we will identify the top five critical processes for your business. In 2018 I worked with an agency to identify those processes that if compromised would bring their revenue down 70%. In 2019 I worked with an organization that identified processes that would affect their revenue. The CMMC also identifies tasks that businesses should implement to identify those top critical processes. In order to identify your top five critical processes. The first and most important thing is to work with your team those end-users who are on the frontlines working with those applications processes and systems to determine what they do, how they drive revenue and from that information your team will be able to identify which of the processes are actually the most critical. Second, you would want to understand your user roles in those processes. Separation of duties is extremely important in this case. You want to make sure that your end-users are performing their duties and responsibilities in order to get the best out of your application systems and processes. Third, the value that comes out of identifying your top five critical processes is to give the information to your disaster recovery team or a third party were you are backing up your data. Your third party or the entity that is responsible for recovery of your data in the event of a breach or a compromise can now use this information to prioritize which processes will come online 1st, 2nd, 3rd, 4th and 5th.

    • 11 min

Top Podcasts In News

The Rest Is Politics
Goalhanger Podcasts
The Indo Daily
Irish Independent
The David McWilliams Podcast
David McWilliams & John Davis
The News Agents
Global
Path to Power
Matt Cooper & Ivan Yates
The Stardust Tragedy
The Irish Sun