The Wyant Cybersecurity Brief with Tom Wyant

The Wyant Cybersecurity Brief with Tom Wyant

In the ever-changing world of cybersecurity, staying stuck in your ways can end your career and cost your employer millions in the blink of an eye. For entrepreneurs, this can mean your dream business comes to a sudden, screeching, shuddering halt. Tom Wyant, a Managed Service Provider with over 30 years’ experience, takes you on an exciting (yes, exciting) journey into various aspects of cybersecurity, breaking down complex concepts into plain, everyday language that listeners from all walks of life can easily understand. From tech-savvy individuals wanting to enhance their existing knowledge to beginners seeking to increase their cybersecurity literacy, The Wyant Cybersecurity Brief is your #1 go-to that shows you how to quickly take meaningful action to safeguard your digital presence.

Episodes

  1. 06/19/2024

    Security Operations Centers (SOCs): Saving You Big Bucks and Lots of Sleep

    A few episodes back, we talked about Security Incident Event Managers (SIEMs) and how they watch for things like employees logging into Microsoft 360 through the wrong network or the sudden deletion of a lot of files from OneDrive. Security Operations Centers, or SOCs, work hand-in-hand with SIEMs to enhance your cybersecurity. Basically, the SIEM creates the log of potentially suspicious activity, and the SOC reviews the logs and sends out alerts if it sees anything that might be suspicious – even if it’s a false positive. If you are a solopreneur or own a small company, chances are you don’t have IT on call 24/7, so the SOC works while you sleep (and can even wake you up if something’s amiss). If this doesn’t have your attention, do you have business insurance? You might be paying more because you don’t have a SOC. In this episode, Tom Wyant shows you how a SOC not only gives you peace of mind, but basically functions as a member of your cybersecurity superhero squad while saving you money – and sleep – across the board. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity Needs How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Security Operations Centers (SOCs): Saving You Big Bucks and Lots of Sleep first appeared on The Wyant Cybersecurity Brief.

    5 min
  2. 06/12/2024

    Third-Party Spam Filtering: A Rarely-Discussed Reason Why You Need It

    Almost all e-mail providers come with some sort of spam filtering, and while it’s usually halfway decent at telling the difference, yes it can be annoying when it send legitimate e-mail to spam. But have you considered that you might WANT your legitimate e-mail to go to spam? Microsoft 365 is a very reliable platform that rarely goes down, but like any cloud-based or remote service, there are occasional glitches, network issues, downtimes, and the like. With a third-party spam filter, you’ll still be able to retrieve that urgent e-mail you’ve been waiting for even while your e-mail itself is down. In this episode, Tom Wyant reveals how this works and why this could be the “aha moment” that spares you a lot of grief and silly office-politics nonsense – not to mention adding extra layers of cybersecurity, of course. We told you cybersecurity could be fun, and what’s more enjoyable than avoiding the stress of missing out because your e-mail is down? Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity Needs How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Third-Party Spam Filtering: A Rarely-Discussed Reason Why You Need It first appeared on The Wyant Cybersecurity Brief.

    5 min
  3. 06/05/2024

    Encryption Strategies: Keeping Hackers In The Dark (And Your Lights On)

    Whether you’re an established expert at cybersecurity, an up-and-coming dynamo, or a layperson who’s here educating yourself, you have probably at least heard the word “encryption”. We use several types of encryption. One goes on laptop hard drives so if the employee or user gets separated from their laptop (lost or stolen or whatever), nobody can just pop out the hard drive and learn your secrets. Another is e-mail encryption, which is especially important if you work in a regulated industry where standards like HIPAA apply, or even if you just want an extra layer of protection from competitor spies. Did you know that Microsoft 365 email can be encrypted so that by simply adding a particular word to the subject line, you can immediately enforce end-to-end encryption? In this episode, Tom Wyant takes you through the ins and outs of encryption and how to put it to work for you. If someone can steal a whole antenna from a radio station, they can read your e-mail. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity Needs How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Encryption Strategies: Keeping Hackers In The Dark (And Your Lights On) first appeared on The Wyant Cybersecurity Brief.

    6 min
  4. 05/29/2024

    Security Incident Event Managers (SIEMs): Protecting the Seams in Your Proverbial Pants

    Security Incident Event Managers (SIEMs) are not the seams in your pants or the seams in your shirts – but they will protect the seams in your proverbial pants from getting ripped open by hackers, malware, and bad actors. In many cases, potential threats to your users’ security look innocuous enough, such as the case when an employee who uses a VPN forgot to shut it off before accessing his Microsoft 365 inbox from his laptop. When your SIEM picks up a ton of files getting deleted all at once from OneDrive, is that an employee just doing a little spring cleaning of old rough drafts and documents they no longer need, or is a hacker in your system stealing your company secrets? In this episode, Tom Wyant gives a detailed layout of how SIEMs work to continuously monitor your network and your users’ machines. You’ll hear about Syslogs and SOCs (the latter of which we’ll cover in an upcoming episode), but you’ll pick it up quickly – and if you already know, it makes a handy checklist for review. You know what they say – better safe than sorry, yes? Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity Needs How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Security Incident Event Managers (SIEMs): Protecting the Seams in Your Proverbial Pants first appeared on The Wyant Cybersecurity Brief.

    6 min
  5. 05/22/2024

    Security Awareness Training: Yes, Cybersecurity CAN Be Fun!

    Here at the Wyant Cybersecurity Brief, our mission is to take cybersecurity – which many people dread as an expense, a chore, or just an annoyance – and makes it easy and fun (yes, fun) for everyone. You can do this through how you design your Security Awareness Training. Basically, this involves teaching our users how to recognize and avoid phishing scams, occasionally testing them to see if they fall for it, and testing them weekly to see where they are on their skills. In this episode, Tom Wyant reveals how his process for Security Awareness Training involves tapping into a very common human emotion that can excite your users and make them look forward to their weekly quizzes – you have to check this out! Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity Needs How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Security Awareness Training: Yes, Cybersecurity CAN Be Fun! first appeared on The Wyant Cybersecurity Brief.

    5 min
  6. 05/15/2024

    Secure Access Service Edge (SASE): Not Sassy, But Smart for Your Cybersecurity

    Secure Access Service Edge, known as SASE, is pronounced “sassy” but it doesn’t have to do with smart-mouth teenagers. It DOES have to do with protecting you from the “brats”, also known as hackers and other bad actors, who are trying to get into your network through your employees’ laptops and devices. In this episode, Managed Service Provider Tom Wyant lays out how SASE enables companies to give their employees access to the network while outside the office in a way that protects their bottom line as well as their cybersecurity. Especially now that remote work has become a permanent part of the environment of business and companies need to make sure remote employees have full access to everything they need to do their jobs, this is important even if you only have a couple people outside the office. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity Needs How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Secure Access Service Edge (SASE): Not Sassy, But Smart for Your Cybersecurity first appeared on The Wyant Cybersecurity Brief.

    4 min
  7. 05/08/2024

    Shadow IT: A Subtle, Stealth Way to Protect Your Network (And Your Budget)

    Shadow IT refers to a process where you install an agent that studies your users’ computers to determine what applications they’re running both locally and over the web. Chances are, you know they’re using Office 365, Adobe, whatever proprietary database software you use for record-keeping, and everything else you decided should be part of their software suite. But are they using Canva or something similar? And if they are, do you have several employees or users all separately using the same thing? In this episode, Tom Wyant reveals how having this intelligence reveals not only potential security risks, but also how knowing that five of your employees are separately using the same web-based app could potentially save you a lot of money. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity Needs How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Shadow IT: A Subtle, Stealth Way to Protect Your Network (And Your Budget) first appeared on The Wyant Cybersecurity Brief.

    5 min
  8. 05/01/2024

    IT Policies: Protect Your Time and Money (and Time is Money)

    IT Policies tell your employees what is expected of them when it comes to your network, your equipment, and what is expected and acceptable procedure and behavior. We think of policies like: whether you can bring your own device to work, where you can access the company network from, storage and equipment destruction policies, and more. But what about the relationship between your cybersecurity and your finance policy? One company lost $280,000 because there was no written policy explaining how to verify requests to change account numbers. Another company has their soft phones hacked becquse an engineer left their personal laptop open to company software. In this episode, Tom Wyant shares these stories and outlines steps these companies – and yours – should take to protect your time and money, not to mention the amount of money your time costs. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity Needs How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post IT Policies: Protect Your Time and Money (and Time is Money) first appeared on The Wyant Cybersecurity Brief.

    7 min
  9. 04/25/2024

    Zero Trust: Yes, You Can Have The Software You Need Without Hassle

    “Zero Trust” is a terminology we have in the information technology field that means what it says – you don’t trust anything. Do you know what applications are really on your device, what processes are running, and how they could be exposing you to danger without you seeing or noticing anything? Individual users and companies can get frustrated by Zero Trust policies that make it impossible to install legitimate softwares and, in an era where most softwares are installed and updated from the cloud, block users from getting the most recent versions. How irritating is it to go through IT or tech support just to get what you’re SUPPOSED to have? In this episode, Tom Wyant explains a process Managed Service Providers can use that creates a happy medium ensuring you can easily and without frustration use all the softwares you need, while protecting you from malware, hackers, and trojan horses. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity Needs How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Zero Trust: Yes, You Can Have The Software You Need Without Hassle first appeared on The Wyant Cybersecurity Brief.

    5 min
  10. 04/18/2024

    Password Managers: How They Protect You and Your Business

    You’ve probably saved passwords in your browsers. That’s bad – really bad. REALLY bad. When managed service providers perform cybersecurity assessments, they scan clients’ hard drives for sensitive information and can pull all your passwords without having administrative access to your browser. In this episode, Tom Wyant goes through the features an effective password management system should have and how it saves you from identity theft, getting your accounts hacked, and worse. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity Needs How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Password Managers: How They Protect You and Your Business first appeared on The Wyant Cybersecurity Brief.

    5 min
  11. 04/10/2024

    Multi-Factor Authentication: How It Works and Protects You

    Does it feel like you have to jump through flaming hoops just to log into your online accounts for credit cards, memberships, streaming services, website hosting, and more every single time – as if the company is testing you to see how bad you want it? As the owner or manager of a technology company, a SaaS, membership portal, or website, are you finding it increasingly necessary to protect yourself from hackers and trying to balance your security needs against giving your team members the ability to do their jobs without getting codes from you every single time? In this episode, Tom Wyant explains how multi-factor authentication (MFA) works so you can intelligently implement it and use it in a way that protects your data while not making it annoying. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity Needs How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Multi-Factor Authentication: How It Works and Protects You first appeared on The Wyant Cybersecurity Brief.

    4 min

About

In the ever-changing world of cybersecurity, staying stuck in your ways can end your career and cost your employer millions in the blink of an eye. For entrepreneurs, this can mean your dream business comes to a sudden, screeching, shuddering halt. Tom Wyant, a Managed Service Provider with over 30 years’ experience, takes you on an exciting (yes, exciting) journey into various aspects of cybersecurity, breaking down complex concepts into plain, everyday language that listeners from all walks of life can easily understand. From tech-savvy individuals wanting to enhance their existing knowledge to beginners seeking to increase their cybersecurity literacy, The Wyant Cybersecurity Brief is your #1 go-to that shows you how to quickly take meaningful action to safeguard your digital presence.