Logo

    Episode 17: Microsoft Takes Action against Consent Grant Attacks

    enJuly 23, 2020
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    About this Episode

    Learn how criminals are using illicit Consent Gran Attacks to gain access to your email and data and what to do to spot it.

    https://blogs.microsoft.com/on-the-issues/2020/07/07/digital-crimes-unit-covid-19-cybercrime/

    Connect with us:

    https://www.linkedin.com/company/envisionitllc

    marketing@envisionitllc.com

     

    Recent Episodes from Geek Speak - Tech Talks with Envision IT

    Episode 51: Top Ten Cybersecurity Misconfigurations: Lack of Network Segmentation

    Episode 51: Top Ten Cybersecurity Misconfigurations: Lack of Network Segmentation
    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Lack of Network Segmentation. Having proper security boundaries within a network is a vital step to keeping your information safe from bad actors. 

    Connect with us:
    https://www.linkedin.com/company/envisionitllc
    marketing@envisionitllc.com

    Episode 50: Top Ten Cybersecurity Misconfigurations: Insufficient Internal Network Monitoring

    Episode 50: Top Ten Cybersecurity Misconfigurations:  Insufficient Internal Network Monitoring
    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Insufficient Internal Network Monitoring. Insufficient internal network monitoring plays an important role to detecting threats in order to help keep you and your employees safe from cyber-attacks. 

    Episode 49: Top Ten Cybersecurity Misconfigurations: Improper Separation of User and Administrator Privilege

    Episode 49: Top Ten Cybersecurity Misconfigurations: Improper Separation of User and Administrator Privilege
    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Improper Separation of User and Administrator Privilege. Separating your accounts is an important way to help keep your information safe.
     
    Connect with us:
    https://www.linkedin.com/company/envisionitllc
    marketing@envisionitllc.com  

    Episode 48: Top Ten Cybersecurity Misconfigurations: Default Configurations of Software and Applications.

    Episode 48: Top Ten Cybersecurity Misconfigurations: Default Configurations of Software and Applications.

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Default Configurations of Software and Applications. 

    Connect with us:

    Episode 46: 15 Ways to Protect your Business from a Cyber Attack: SIEM/Log Management

    Episode 46: 15 Ways to Protect your Business from a Cyber Attack: SIEM/Log Management
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #15: SIEM/Log Management. Security information and event management, also known as SIEM plays an important role in detecting security threats and keeping your and your employees safe.

    Episode 45: 15 Ways to Protect your Business from a Cyber Attack: Cyber Insurance

    Episode 45: 15 Ways to Protect your Business from a Cyber Attack: Cyber Insurance
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #14: Cyber Insurance. In the event of a cyber-attack, cyber insurance can help cover losses that may occur.
     

    Episode 44: 15 Ways to Protect your Business from a Cyber Attack: Web Gateway Security

    Episode 44: 15 Ways to Protect your Business from a Cyber Attack: Web Gateway Security
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #13: Web Gateway Security. Web Gateway Security takes a layered approach to protect you and your employees from harmful malware.
     

    Episode 43: 15 Ways to Protect your Business from a Cyber Attack: Mobile Device Security

    Episode 43: 15 Ways to Protect your Business from a Cyber Attack: Mobile Device Security
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #12: Mobile Device Security. With the high usage of mobile devices in work environments it is important for you and your employees to understand the importance that mobile security plays in protecting you from compromise.