Ssn 2 Ep 14: Zero Trust, Pt 2 The Cyber Savvy Cafe
-
- Technology
Ssn 2 Ep 14: Zero Trust, Pt 2
Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a layered approach to cybersecurity that structures your network so you can do just that.
Today's episode looks at foundational elements you better already have in place.
Show Notes:
:37: The big business of hacking
1:13: Why and how cybercrime has accelerated since the pandemic
1:42: Some of the reasons home workstations are vulnerable to cyber attacks
2:00: DNS filtering
4:07: The business cost of a cyber breach and some of the recent stats
4:20: Threat actors live on your network for 280 days before they’re identified
4:55: What happens when you’ve been hacked and held for ransom
5:55: EDR—Endpoint Detection Response
7:15: Some indicators of threat actors can have other causes
8:23: Cloud configuration—and how it can pose a risk
Business Cost of Cybercrime
https://cobalt.io/blog/business-cost-of-cybercrime
9:47: Cyber awareness training
11:05: What happens to the stolen data from random individuals on home networks
12:09: What happens to a company’s data
12:30: Encryption
14:25: Backups—a two-fold process for backing up to the cloud
16:07: Zero Trust is a much deeper dive than the foundational things we’ve talked about today.
Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/
Voiceover Artist: Paul Kadach at www.voices.com
Ssn 2 Ep 14: Zero Trust, Pt 2
Cybercrime is projected to cost the world 10.5 trillion annually by 2025. Hackers are looking for the easiest targets, make sure you’re not one of them. Zero Trust is a layered approach to cybersecurity that structures your network so you can do just that.
Today's episode looks at foundational elements you better already have in place.
Show Notes:
:37: The big business of hacking
1:13: Why and how cybercrime has accelerated since the pandemic
1:42: Some of the reasons home workstations are vulnerable to cyber attacks
2:00: DNS filtering
4:07: The business cost of a cyber breach and some of the recent stats
4:20: Threat actors live on your network for 280 days before they’re identified
4:55: What happens when you’ve been hacked and held for ransom
5:55: EDR—Endpoint Detection Response
7:15: Some indicators of threat actors can have other causes
8:23: Cloud configuration—and how it can pose a risk
Business Cost of Cybercrime
https://cobalt.io/blog/business-cost-of-cybercrime
9:47: Cyber awareness training
11:05: What happens to the stolen data from random individuals on home networks
12:09: What happens to a company’s data
12:30: Encryption
14:25: Backups—a two-fold process for backing up to the cloud
16:07: Zero Trust is a much deeper dive than the foundational things we’ve talked about today.
Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/
Voiceover Artist: Paul Kadach at www.voices.com
17 min