26 min

Addressing the Insecure Elements of Your Securit‪y‬ NanoSessions

    • Technology

The concept of security is a well-worn trope in all industries. However, the weakest link of any system is fairly easy to determine.

On this episode of the NanoSessions podcast, NanoLumens IT Director Tony Tran sat down with Sean Heath to discuss surprising facts regarding most security vulnerabilities.

Quite often, the simplest explanation is the most accurate, according to Tran.

“Your weakest link is always going to be the end user and awareness," he said. "An untrained user is always the weakest link to any security system.”

Another challenge that content managers face is the somewhat unavoidable vulnerability inherent with cloud-based access, Tran explained.

“Basically, you have to operate under these pretenses that it’s not a matter of if it happens, but rather when,” he said.

Taking time to plan for those possibilities during the development stage definitely makes for a better end product, detailed Tran.

“We typically take a little bit longer to deploy our products, because we have to think about all of these scenarios,” he said.

The concept of security is a well-worn trope in all industries. However, the weakest link of any system is fairly easy to determine.

On this episode of the NanoSessions podcast, NanoLumens IT Director Tony Tran sat down with Sean Heath to discuss surprising facts regarding most security vulnerabilities.

Quite often, the simplest explanation is the most accurate, according to Tran.

“Your weakest link is always going to be the end user and awareness," he said. "An untrained user is always the weakest link to any security system.”

Another challenge that content managers face is the somewhat unavoidable vulnerability inherent with cloud-based access, Tran explained.

“Basically, you have to operate under these pretenses that it’s not a matter of if it happens, but rather when,” he said.

Taking time to plan for those possibilities during the development stage definitely makes for a better end product, detailed Tran.

“We typically take a little bit longer to deploy our products, because we have to think about all of these scenarios,” he said.

26 min

Top Podcasts In Technology