TOSS C3 Podcast

TOSS C3

Cybersecurity is the most important aspect of any organization's technology system and is also the most difficult to understand and stay on top of. Greg Hanna, also known as America's Top Cyber Expert, discusses the technical and security challenges facing all organizations in both the public and private sector. Each week, he pulls back the curtain to discuss key information, presented in plain-English, that you need to know in order to make informed decisions at your organization.

  1. RMM Abuse: What You Don’t Know Can Hurt You

    29 DE MAI.

    RMM Abuse: What You Don’t Know Can Hurt You

    In this eye-opening episode of the TOSS C3 Podcast, Greg Hanna, cybersecurity expert and CEO of TOSS C3, pulls back the curtain on one of the most dangerous — yet least talked about — threats in the IT space: RMM Abuse. RMM (Remote Monitoring and Management) tools are designed to help IT teams manage systems efficiently — but in the wrong hands, they become a hacker’s best friend. Greg explains how threat actors and even insiders can exploit RMM software to infiltrate, surveil, and control networks without detection. Whether you're a CEO, CIO, IT professional, or a business owner who relies on managed service providers, this episode will help you understand the risks, identify vulnerabilities, and take proactive steps to protect your organization. What is RMM and why it's a double-edged sword Real-life examples of RMM abuse and how companies were compromised How cybercriminals weaponize RMM tools like AnyDesk, TeamViewer, and ConnectWise Red flags to watch for in your IT environment Why MSPs (Managed Service Providers) are frequent targets — or even unknowing accomplices Steps to audit and harden your RMM setup Greg’s expert advice on zero-trust strategies and insider threat mitigation The importance of continuous threat detection and monitoring your own IT team "RMM tools are like skeleton keys — if you don’t control who’s holding them, you’re inviting the enemy into your digital fortress." Audit your existing RMM tools – Know what’s installed, who has access, and how it’s being used. Ask your MSP the hard questions – What safeguards are in place to prevent unauthorized use? Implement multi-factor authentication on all RMM-related access points. Educate your executive team about the potential risks tied to RMM misuse. Book a cybersecurity assessment with TOSS C3 to evaluate your RMM and endpoint security posture. Greg Hanna is the CEO of TOSS C3, a leading authority in Cybersecurity, Compliance, and Cloud solutions for high-stakes industries. With decades of experience in protecting sensitive data and securing digital infrastructures, Greg brings expert insights, real-world stories, and actionable strategies to help organizations stay ahead of the cyber curve. Website: https://www.tossc3.com LinkedIn: Greg Hanna Twitter: @TOSS_C3 Podcast Episodes: Listen to more If this episode helped you better understand RMM abuse and how to stop it, share it with your IT team, C-Suite, or business network. And don’t forget to subscribe, rate, and review the TOSS C3 Podcast! 🔍 Key Topics Covered:🛡️ Greg’s Quote of the Episode:✅ Action Steps for Listeners:🧠 About the Host:📲 Stay Connected:🔁 Don’t Forget:

    9min

Sobre

Cybersecurity is the most important aspect of any organization's technology system and is also the most difficult to understand and stay on top of. Greg Hanna, also known as America's Top Cyber Expert, discusses the technical and security challenges facing all organizations in both the public and private sector. Each week, he pulls back the curtain to discuss key information, presented in plain-English, that you need to know in order to make informed decisions at your organization.