23 min

Episode 12 - S2 - Cybersecurity Best Practices Part 1 The Quality Hub

    • Management

In this episode of the Quality Hub podcast, host Xavier Francis discusses Cybersecurity Best Practices with Reagan Jorgensen, Security Solutions technician, and Robert Hoffman, Windows System Administrator, both from CORE. The episode discusses a case study involving the 2011 breach of Sony's PlayStation Network and its impact on cybersecurity practices. Reagan highlights the evolution of cyber threats, emphasizing social engineering, zero-day exploits, and ransomware attacks as ongoing challenges. Rob emphasizes the importance of policies in managing access and authentication, particularly in cloud environments and mobile devices. The discussion covers preventive measures such as robust network security, and network access control, among others, and recommends seeking expertise when needed.
Here is the link to our free download of the Cybersecurity Self-Assessment Glossary:  https://getcertified.thecoresolution.com/cyber-glossary
Helpful Resources:
For All Things ISO 9001:2015: https://www.thecoresolution.com/iso-9001-2015
Cybersecurity:  https://www.thecoresolution.com/cybersecurity
CMMC:  https://www.thecoresolution.com/cmmc-compliance-checklist
ISO 27001:  https://www.thecoresolution.com/iso-27001-certification
Contact us at 866.354.0300 or email us at info@thecoresolution.com
ISO 9001 Standards: https://www.thecoresolution.com/iso-90012015-standard-1
Articles: https://www.thecoresolution.com/free-learning-resources
ISO 9001 Consulting: https://www.thecoresolution.com/iso-consulting
 

In this episode of the Quality Hub podcast, host Xavier Francis discusses Cybersecurity Best Practices with Reagan Jorgensen, Security Solutions technician, and Robert Hoffman, Windows System Administrator, both from CORE. The episode discusses a case study involving the 2011 breach of Sony's PlayStation Network and its impact on cybersecurity practices. Reagan highlights the evolution of cyber threats, emphasizing social engineering, zero-day exploits, and ransomware attacks as ongoing challenges. Rob emphasizes the importance of policies in managing access and authentication, particularly in cloud environments and mobile devices. The discussion covers preventive measures such as robust network security, and network access control, among others, and recommends seeking expertise when needed.
Here is the link to our free download of the Cybersecurity Self-Assessment Glossary:  https://getcertified.thecoresolution.com/cyber-glossary
Helpful Resources:
For All Things ISO 9001:2015: https://www.thecoresolution.com/iso-9001-2015
Cybersecurity:  https://www.thecoresolution.com/cybersecurity
CMMC:  https://www.thecoresolution.com/cmmc-compliance-checklist
ISO 27001:  https://www.thecoresolution.com/iso-27001-certification
Contact us at 866.354.0300 or email us at info@thecoresolution.com
ISO 9001 Standards: https://www.thecoresolution.com/iso-90012015-standard-1
Articles: https://www.thecoresolution.com/free-learning-resources
ISO 9001 Consulting: https://www.thecoresolution.com/iso-consulting
 

23 min