TOSS C3 Podcast

TOSS C3

Cybersecurity is the most important aspect of any organization's technology system and is also the most difficult to understand and stay on top of. Greg Hanna, also known as America's Top Cyber Expert, discusses the technical and security challenges facing all organizations in both the public and private sector. Each week, he pulls back the curtain to discuss key information, presented in plain-English, that you need to know in order to make informed decisions at your organization.

  1. Inside the Mind of a White Hat: Why Ethical Hackers Are Your Best Cybersecurity Weapon

    11/27/2025

    Inside the Mind of a White Hat: Why Ethical Hackers Are Your Best Cybersecurity Weapon

    In this insightful episode of the TOSS C3 Podcast, host and cybersecurity expert Greg Hanna pulls back the curtain on one of the most misunderstood roles in the digital world — ethical hackers, also known as white hats. As cyberattacks grow more aggressive and unpredictable, ethical hackers are now on the front lines, simulating real-world threats to expose weaknesses before the bad guys do. Greg breaks down: The key differences between white hat and black hat hackers How ethical hackers use the same tools as cybercriminals — but for good The value of penetration testing, red teaming, and vulnerability scanning How organizations can use ethical hacking to harden their security posture Why proactive threat hunting is now a non-negotiable in cybersecurity strategy 🔐 If you think your firewall is enough — think again.This episode is a wake-up call for business owners, IT leaders, and anyone responsible for protecting digital assets. Stay one step ahead of cybercriminals — by hiring someone who thinks just like them. Would you like an Instagram caption, LinkedIn carousel copy, or a 30-second video script to promote this episode next? Absolutely — here's a stronger, more compelling rewrite with a fresh, re-release-ready title: Disaster-Proof Your Data: How to Prepare, Protect, and Recover In this essential episode of the TOSS C3 Podcast, host Greg Hanna shares expert strategies to help you safeguard your data and ensure business continuity — no matter what disaster strikes. From cyberattacks and ransomware to natural disasters and system failures, Greg reveals how smart planning, secure backups, and proven recovery protocols can mean the difference between downtime and resilience. 🎯 In this episode, you’ll learn: How to build a bulletproof data backup and recovery strategy The biggest mistakes companies make when disaster hits — and how to avoid them The role of off-site storage, cloud continuity, and failover systems Why recovery speed is critical — and how to test it before it matters What every business should have in a cyber disaster response plan If your data vanished tomorrow… would you survive?Don't wait for a wake-up call — tune in now and take control before it’s too late. You said:In this episode you'll learn how to keep your data safe and recover in the event of a disaster. do the same ChatGPT said:🎙️ Episode Title:📄 Re-Release Show Description:

    10 min
  2. Booby-Trapped Tech: How Cheap Devices Are Inviting Hackers Into Your Life

    11/27/2025

    Booby-Trapped Tech: How Cheap Devices Are Inviting Hackers Into Your Life

    In this eye-opening episode of the TOSS C3 Podcast, host Neil Haley is joined by cybersecurity visionary and TOSS C3 founder Greg Hanna to uncover a chilling reality: your affordable tech could be your biggest cybersecurity threat. Together, they dissect the alarming rise of supply chain cyberattacks — including the recent discovery of guerrilla malware infecting over 9 million Android devices. This isn’t just theory — it’s happening now, and it’s hitting everyday users. From pre-installed malware on low-cost smartphones to weaponized USB drives and fake crypto wallets, Greg and Neil shine a light on how hackers are embedding malicious code directly into budget electronics — before they even leave the factory. 🔍 In this episode, you’ll discover: Why “cheap” tech could be silently spying on you How cybercriminals use global supply chains to scale attacks The hidden risks behind free gadgets, promotional USBs, and off-brand electronics What guerrilla malware is — and how it works Practical steps to safeguard your devices, data, and privacy 🎧 Who should listen:Entrepreneurs, business leaders, IT professionals, parents, and anyone who owns a smartphone or uses digital tools — this is a critical wake-up call for anyone living in today’s hyperconnected world. Don’t let a $30 gadget cost you your identity.Listen now and learn how to defend yourself before it’s too late.

    10 min
  3. Microsoft 365 Under Attack: The Shocking Truth About Evil Proxy Phishing Scams

    11/27/2025

    Microsoft 365 Under Attack: The Shocking Truth About Evil Proxy Phishing Scams

    n this must-hear re-release of the TOSS C3 Podcast, cybersecurity expert and host Greg Hanna, joined by Neil, exposes one of the most dangerous and sophisticated phishing threats facing businesses today — the Evil Proxy attack targeting Microsoft 365 users. This next-gen phishing scam uses deceptive domains and pixel-perfect replicas of Microsoft login pages to trick even the most cautious users into surrendering their credentials — including two-factor authentication codes. Once compromised, attackers gain full access to emails, files, and sensitive company data. Neil breaks down: How these attacks bypass traditional MFA defenses Why your employees may never realize they’ve been hacked The critical flaws in common cybersecurity practices But this episode doesn’t stop at exposing the threat — it delivers the solution. Neil outlines an advanced defense strategy that includes:✅ Enterprise-grade Endpoint Detection and Response (EDR)✅ 24/7 Security Operations Center (SOC) monitoring✅ A 3-tiered cybersecurity protection service trusted by Fortune 100 companies like Ford This layered approach empowers organizations to detect, block, and respond to threats before real damage is done. 🎯 Call to Action:If you're using Microsoft 365 — whether you're a startup or an enterprise — you need to hear this. Schedule a free cybersecurity consultation with expert Drake to assess your current defenses and build a roadmap to resilience. Evil Proxy is here — are you ready for it?Don’t wait until your inbox becomes ground zero.

    7 min
  4. RMM Abuse: What You Don’t Know Can Hurt You

    05/29/2025

    RMM Abuse: What You Don’t Know Can Hurt You

    In this eye-opening episode of the TOSS C3 Podcast, Greg Hanna, cybersecurity expert and CEO of TOSS C3, pulls back the curtain on one of the most dangerous — yet least talked about — threats in the IT space: RMM Abuse. RMM (Remote Monitoring and Management) tools are designed to help IT teams manage systems efficiently — but in the wrong hands, they become a hacker’s best friend. Greg explains how threat actors and even insiders can exploit RMM software to infiltrate, surveil, and control networks without detection. Whether you're a CEO, CIO, IT professional, or a business owner who relies on managed service providers, this episode will help you understand the risks, identify vulnerabilities, and take proactive steps to protect your organization. What is RMM and why it's a double-edged sword Real-life examples of RMM abuse and how companies were compromised How cybercriminals weaponize RMM tools like AnyDesk, TeamViewer, and ConnectWise Red flags to watch for in your IT environment Why MSPs (Managed Service Providers) are frequent targets — or even unknowing accomplices Steps to audit and harden your RMM setup Greg’s expert advice on zero-trust strategies and insider threat mitigation The importance of continuous threat detection and monitoring your own IT team "RMM tools are like skeleton keys — if you don’t control who’s holding them, you’re inviting the enemy into your digital fortress." Audit your existing RMM tools – Know what’s installed, who has access, and how it’s being used. Ask your MSP the hard questions – What safeguards are in place to prevent unauthorized use? Implement multi-factor authentication on all RMM-related access points. Educate your executive team about the potential risks tied to RMM misuse. Book a cybersecurity assessment with TOSS C3 to evaluate your RMM and endpoint security posture. Greg Hanna is the CEO of TOSS C3, a leading authority in Cybersecurity, Compliance, and Cloud solutions for high-stakes industries. With decades of experience in protecting sensitive data and securing digital infrastructures, Greg brings expert insights, real-world stories, and actionable strategies to help organizations stay ahead of the cyber curve. Website: https://www.tossc3.com LinkedIn: Greg Hanna Twitter: @TOSS_C3 Podcast Episodes: Listen to more If this episode helped you better understand RMM abuse and how to stop it, share it with your IT team, C-Suite, or business network. And don’t forget to subscribe, rate, and review the TOSS C3 Podcast! 🔍 Key Topics Covered:🛡️ Greg’s Quote of the Episode:✅ Action Steps for Listeners:🧠 About the Host:📲 Stay Connected:🔁 Don’t Forget:

    9 min

About

Cybersecurity is the most important aspect of any organization's technology system and is also the most difficult to understand and stay on top of. Greg Hanna, also known as America's Top Cyber Expert, discusses the technical and security challenges facing all organizations in both the public and private sector. Each week, he pulls back the curtain to discuss key information, presented in plain-English, that you need to know in order to make informed decisions at your organization.