Logo

    The Cyber Savvy Cafe

    A visit to the Cyber Savvy Cafe is like a really great coffee break discussing topics relevant to cybersecurity and technology: Business tech, cyber training, remote workstations, IoT, and more. Join us every week.
    en39 Episodes

    People also ask

    What is the main theme of the podcast?
    Who are some of the popular guests the podcast?
    Were there any controversial topics discussed in the podcast?
    Were any current trending topics addressed in the podcast?
    What popular books were mentioned in the podcast?

    Episodes (39)

    Ssn 1 Ep 19: The Easiest Way to Get Hacked

    Ssn 1 Ep 19: The Easiest Way to Get Hacked

    Ssn 1 Ep 19

    The Easiest Way to Get Hacked

    How social engineering puts you at risk for one of the easiest ways to breach your network.

     

    SHOW NOTES

    :15: An example of how a hacker uses social engineering to trick the help desk into helping them breach a corporate network.

     

    1:20: One of the easiest ways to gain access to a corporate executive’s email password.

     

    2:30: The social dynamics that make people more susceptible to falling prey to this kind of trick.

     

    3:03: What a hacker does after they gain access to the executive’s email password.

     

    4:15: How multifactor authentication can protect you.

     

    6:20: How an executive might get targeted to begin with.

     

    7:15: What kind of protocols need to be established for the help desk to authenticate personnel when they call in.

     

    8:23: Other ways of getting hacked, most common phishing attacks.

     

    8:40: Installing malware through phishing attacks and what happens afterwards.

     

    10:05: Other type of common phishing email, bogus alert for a problem with your account at a financial institution.

     

    12:05: How creating a sense of urgency in a phishing email can make you more prone to click their link.

     

    12:27: Phony pages that are created to look exactly like your PayPal or bank page.

     

    12:50: Substituting characters or misspellings in a legitimate URL to make a bogus page look legit.

     

    13:35: When a hacker targets a company, they’re typically after your Office365 or G Suite credentials, and what they do with those credentials afterwards.

     

    14:30: Chase Cunningham and ethical hackings, and how social engineering increases his chances of hacking into a company to 100%.

     

    15:47: Why human nature makes us prone to falling victim to cyber breaches.

     

    16:30: How one hacker’s attempts were foiled by sitting at the wrong desk and how a nosy co-worker saved her company from a breach.

     

    17:49: A situation that happened at a Black Hat conference in Las Vegas and how a reporter locked an inquirer out of their phone account as a demonstration.

     

     If you’d like to hear us cover a topic you’re interested in, contact us! Leave a message on our website, or on our podcast page at Spotify, iTunes, or Google Podcasts.

     

    Cybersecurity Stats:

     

     

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

     

    You’ll find the downloadable version of these show notes at: https://eastatlanticsecurity.com/cyber-savvy-cafe/

     

    Ssn 1 Ep 18: Detecting an Imposter

    Ssn 1 Ep 18: Detecting an Imposter

    Ssn 1 Ep 18

    Detecting an Imposter

    How to know if an online company is legit and safety protocols for purchases.

     

    SHOW NOTES

    1:10: How do you know if an online company is reputable to buy from?

     

    1:36: Search engine ranking, ads and organic results

     

    2:06: Are the ads that appear at the top of the SERPs (Search Engine Results Pages) reputable companies?

     

    2:15: How Google treats outrageous claims.

     

    2:59: Google’s attempts to screen out questionable websites on the SERPs

     

    3:28: How to pre-screen ads that pop up on your FB newsfeed

     

    4:00: Check their website and look for the following items to make sure the website looks legit.

     

    4:48: Search for a company with the help of the search engine

     

    5:27: Google My Business’ verification process

     

    5:53: Check their FB page for an authentic page, good engagement rates, good feedback and reviews

     

    7:45: Check Google reviews

     

    8:11: Check Reddit conversations to search for comments about a company, service, or product

     

    8:56: Analyze ads and check against reviews about the product itself

     

    10:06: If you have any doubts about an unfamiliar company, check Amazon and see if it’s available for purchase there

     

    11:00: You’ve checked their website, fb page, and online reviews and you still have qualms about the company, you can research their IP address and look for discrepancies in the owner of the domain name and their geographic location.

     

    11:38: Reasons why a company may choose to hide information about their domain, spam controls

     

    12:30: Check the IP address. You’re looking for a discrepancy in the shop’s location.

     

    Go to nslookup.io and get the IP address, and go to arin.net and see where they’re registered.

     

    nslookup.io--enter the URL address and copy the IPv4 adress

    Then go to arin.net and enter the IPv4 address

     

    This will give you information about the domain.

     

    13:00: How to interpret those results

     

    14:18: Shopify and godaddy sites, payment gateways, and how to look for discrepancies of what you would expect to find.

     

    16:16: Payment options for purchases: debit vs. credit cards and paypal payments, risks and caveats for use

     

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at voices.com

     

     

    You’ll find the downloadable version of these show notes at: https://eastatlanticsecurity.com/cyber-savvy-cafe/

     

     

    Ssn 1 Ep 17: Who Has the Remote?

    Ssn 1 Ep 17: Who Has the Remote?

    Strategies for Cutting Costs Series

     

    Ssn 1 Ep 17

    Who Has the Remote?

    How to leverage remote workstations, build a competitive edge, and make your company one of the most sought-after places to work.

    SHOW NOTES

    1:10: Let’s start with overall ways people can save money and reduce expenses through the use of technology.

     

    2:54: Let’s talk about VoIP in relation to remote workstations, how does VoIP support remote working, conference calls, zoom-type meetings, chat bots, etc.?

     

    4:55: For companies who are planning to retain remote work options for their employees, how can they reduce their physical office space and restructure the office for a more progressive work environment?

     

    6:31: Work bars, in-office coffee bars, meeting spaces, and shared workstations.

     

    7:12: How to use virtual desktop technology for remote working.

     

    7:49: What other ways might there be to reduce overhead expenses?

     

    8:30: Work-from-anywhere options and what that means for employee retention, job satisfaction, and the employees’ work-home life balance. Discussing instances where employees are able to sell their house in the city and relocate into a more rural area and stay with the company, working remotely.

     

    9:18: Ways employees who are working remotely can collaborate and have meetings or get-togethers in person or have a shared workspace where they can work occasionally.

     

    10:35: Creative new work environments, work bars, in-office coffee shop for employees to meet co-workers over coffee and work on a project together.

     

    11:48: Improve morale and have a more collaborative environment; the things employees are looking for in job satisfaction have changed.

     

    12:10: Small work rooms with white boards for breakout sessions are a creative use of floor space.

     

    12:52: Remote working’s rise in popularity over the past few years and especially since the pandemic. Companies are weighing out the option to continue to offer remote work options to those employees who want it, while reducing expenses and creating unique workspaces for in-office work.

     

    14:10: Remote working moving into the future, growing number of communities with a large population of remote workers, and the need for companies to embrace this direction or risk getting left behind.

     

     

     

    At the end of the Strategies for Cuttings Costs series, we’ll be putting all the highlights together into a mini eBook that you can download. We’ll make it available in the show notes for each of the episodes in the series, so check back on that!

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

     

    You’ll find the downloadable version of these show notes at: https://eastatlanticsecurity.com/cyber-savvy-cafe/

     

    Ssn 1 Ep 16: The New Kid in Town Pt 3

    Ssn 1 Ep 16: The New Kid in Town Pt 3

    Ssn 1 Ep 16: The New Kid in Town Pt 3

    Today·s episode concludes the discussion about co-managed IT and compares a Co-MIT approach with traditional Managed IT services.

     

    Strategies for Cutting Costs Series

     Ssn 1 Ep 16

    The New Kid in Town, Part 3

    Today’s episode concludes the discussion about co-managed IT and compares a Co-MIT approach with traditional Managed IT services.

     

    SHOW NOTES

    01:07: How many companies are typically running with an in-house IT department only

     

    2:02 Some of the problems that arise when a tech-savvy employee without IT training is serving as your in-house IT person

     

    3:28: A recap of some of the challenges facing an in-house IT department and how your security might suffer

     

    5:12: Is cost the main reason why companies are hesitant to hire professional IT support?

     

    6:00: How technology can be used to push your business forward, vs. focusing tech support on network security only.

     

    6:40: How specifically you can leverage technology and be more competitive in your industry.

     

    7:50: Cost comparison of co-managed IT vs. fully managed IT services

     

    12:10: East Atlantic Security’s approach to co-managed IT, for example.

     

    13:15: How, specifically, does co-managed IT support an in-house IT department?

     

     

    At the end of the Strategies for Cuttings Costs series, we’ll be putting all the highlights together into a mini eBook that you can download. We’ll make it available in the show notes for each of the episodes in the series, so check back on that!

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

     

     

    You’ll find the downloadable version of these show notes at: https://EastAtlanticSecurity.com/Cyber-Savvy-Cafe

     

    Ssn 1 Ep 15: The New Kid in Town, Part 2

    Ssn 1 Ep 15: The New Kid in Town, Part 2

    Some of the signs your internal IT department is overworked, the fallout you could face, and how co-managed IT can support your team in a cost-effective way.

     

    Strategies for Cutting Costs Series

     Ssn 1 Ep 15

    The New Kid in Town, Part 2

    Some of the signs your internal IT department may be overworked, and how co-managed IT can assist.

     

    SHOW NOTES

    Today’s episode continues on with the discussion about a new approach to IT support, co-managed IT.

     

    00:50: Some of the signs that your IT department is overwhelmed

     

    2:32: Multiple locations, remote working, and the effects on an IT team

     

    4:15: Financial and security fallout from an over-stretched IT team

     

    5:50: Missed patches and falling behind on routine maintenance, and the extensive damage and downtime that can cost a company.

     

    6:15: The average amount of time a threat actor is living on your network before you find out they’re there, and what they’re doing during that time.

     

    6:58: How much does your cyber-insurance protect you? How much do they pay out if you suffer a breach?

     

    8:40: Reputational damage if you suffer a breach, and other effects on your company.

     

    9:15: Lawsuit of a company in the UK that sued an American company

     

    9:38: Are government fines, fees, and lawsuits covered by your insurance company if you weren’t at fault in a breach?

     

    10:35: Average cost of a data breach

     

    11:03: The HIPAA Wall of Shame

     

    12:10: The goal is to make your network so difficult to break into, that a threat actor will give up and go somewhere else.

     

    12:56: Further fallout: Supply Chain Attack, what is it and how can if affect you?

     

    13:55: The new compliance, CMMC, what it is and how it protects the supply chain and what it means for smaller companies

     

    14:55: When is co-managed IT NOT a good solution for a company?

     

     

    At the end of the Strategies for Cuttings Costs series, we’ll be putting all the highlights together into a mini eBook that you can download. We’ll make it available in the show notes for each of the episodes in the series, so check back on that!

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

     

     

    You’ll find the downloadable version of these show notes at: https://EastAtlanticSecurity.com/Cyber-Savvy-Cafe

    Ssn 1 Ep 14: The New Kid in Town, Part 1

    Ssn 1 Ep 14: The New Kid in Town, Part 1

    Strategies for Cutting Costs Series

    Ssn 1 Ep 14: The New Kid in Town, Part 1

    There's a new kid in town, Co-Managed IT, and it's changing the face--and the cost--of IT security.

     

    In this first episode of the Strategies for Cutting Costs series, Rex and Penny discuss why Co-Managed IT is an advantageous solution for many of the IT problems facing today's companies.


    SHOW NOTES

     

    Ssn 1 Ep 14

    The New Kid in Town, Part 1

    How Co-Managed-IT is changing the face—and the costs—of IT security.

     

    Intro: If you’re like a lot of the companies we work with, your IT department is significantly understaffed and overwhelmed and has a hard time keeping up with the constant demands placed upon it.

     

    Today’s episode is about a new approach to IT support and kicks off the “Strategies for Cutting Costs” series.

     

    00:46: What exactly is Co-Managed IT and how does this differ from managed IT services?

     

    3:15: Benefits of access to a shared tool suite that most companies cannot afford to implement on their own.

     

    4:42: How automated tools assist with regular patching.

     

    6:56: Customizing and blending Co-MIT with an IT department’s regular day-to-day tasks.

     

    7:45: What are some of the reasons CEO’s are moving towards a Co-MIT approach?

     

    9:15: Reduce expenses and free training: How Co-MITs can be customized for each company’s needs so a company is only paying for what they need, and how an MSP works side-by-side with an IT department.

     

    10:49: The benefits of having access to an MSP who is keeping abreast of the latest cyber threats and innovative IT solutions.

     

    11:10: The freedom for IT professionals to have time off and take vacations without worrying about their network.

     

    11:30: For what kinds of situations is Co-MIT an ideal solution?

     

    13:28: The benefits of Co-MIT for remote workstations.

     

    15:18: Case study of one client who has an interesting configuration of their IT services.

     

    17:03: Closing. Don’t miss next week’s episode, “The New Kid in Town, Part 2,” where we discuss telltale signs your IT department is overworked and the ramifications that can have on your company and your network security.

     

    At the end of the Strategies for Cuttings Costs series, we’ll be putting all the highlights together into a mini eBook that you can download. We’ll make it available in the show notes for each of the episodes in the series, so check back on that!

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

     

    You’ll find the downloadable version of these show notes at: https://EastAtlanticSecurity.com/Cyber-Savvy-Cafe

    Ssn 1 Ep 13: Virtual Desktop: Take it on the Road

    Ssn 1 Ep 13: Virtual Desktop: Take it on the Road

    Rex and Penny talk about Windows Virtual Desktop: utilizing latest technologies to turn your team into a dynamic mobilized workforce.

     

    The Cyber Savvy Café: Ssn 1 Ep 13

    Virtual Desktop: Take it on the Road

    Utilizing latest technologies to turn your team into a dynamic mobilized work force.

     

    SHOW NOTES

    Why and how a virtual desktop environment can take your business to the next level--especially if you have people working from home.

    0:56: What is Windows Virtual Desktop? (WVD)

     

    1:35: How does this differ from working locally, on a desktop or laptop and how does it increase work performance for employees working remotely?

     

    4:23: Discussion of some of the risks that remote working poses to corporate networks, and the solutions WVD offers.

     

    5:55: Pay for what you use: the cost-savings of WVD.

     

    8:25: Solution for older computers with poor performance; aging hardware can still access the virtual desktop and perform well.

     

    9:30: Using Microsoft’s internet connection, as opposed to your home network’s connection.

     

    10:16: Discussion of how to migrate to WVD

     

    11:20: How popular is the WVD environment?

     

    12:07: We have a testimonial from a client on our Business Restructuring page on the website, who switched to WVD during Covid 2020.

     

    For more information about the process of switching over to WVD, visit the link and scroll down to Barry E's video: https://eastatlanticsecurity.com/business-restructuring/ 

     

    12:51: Why some companies use WVD exclusively.

     

    14:00: Info on the internet you can peruse, and Microsoft has a “Get Started Today” button on their website that you can look into.

     

    14:26: Great solution for some of the issues companies are facing right now, discussion of further benefits of WVD.

     

    14:42: Additional benefit: Good exit strategy for employees who leave the company, helps ensure that your data stays secure.

     

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

     

     

    You’ll find the downloadable version of these show notes at: https://EastAtlanticSecurity.com/Cyber-Savvy-Cafe

    Ssn 1 Ep 12: The Life or Death of an Android

    Ssn 1 Ep 12: The Life or Death of an Android

    What if your phone got infected with malware or hit with a ransomware attack? What is the immediate fallout? In this episode we talk about some of the best steps to take NOW to secure your device so hopefully you won’t ever have to answer those questions.

     

    The Cyber Savvy Café: Ssn 1 Ep 12

    Life or Death of an Android

    9 Easy Ways to Safeguard Your Android Device

     

    SHOW NOTES

    Unexplained data usage, crashing apps, popups, battery drain, or any other unexplained changes, these are some of the symptoms that your phone is infected with malware. What are some of the steps you can take now, to safeguard your phone before it’s too late?

     

    0:45 Discussion of viruses and malware on mobile, increasing ransomware attacks, and the need to bring this to the forefront of people’s attention.

     

    1:31 Best steps to take now to secure your device.

     

    2:40 Be sure to get a good phone and from a reputable vendor and keep it updated.

     

    3:10 Be sure to keep apps updated.

     

    5:12 Don’t leave your device unattended—even around your co-workers, and keep your phone locked.

     

    5:52 Download apps from Google Play and Apple Stores only.

     

    7:33 Use Google Play Protect, a malware scanner.

     

    8:30 Use anti-virus and anti-malware apps for android and iphone.

     

    9:30 Encrypt your data, be sure to turn on encryption for added protection in case your phone is lost or stolen.

     

    10:46 Use a VPN (Virtual Private Network).

     

    13:05 Protect your accounts (Google, Apple, etc.) with multi-factor authentication.

     

    For more information on this topic, check out our blog, “9 Ways to Safeguard Your Android Device,” at: https://eastatlanticsecurity.com/2021/03/20/9-ways-to-safeguard-your-android-device/

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

     

    You’ll find the downloadable version of these show notes at: https://EastAtlanticSecurity.com/Cyber-Savvy-Cafe

    Ssn 1 Ep 11: The Little's

    Ssn 1 Ep 11: The Little's

    The Cyber Savvy Café: Ssn 1 Ep 11

    The Little’s

    Kids Online and Network Security: A Cyber-Breach Waiting to Happen

     

    How much does your kids' online usage impact the security of your home network? Find out how and why you may be at risk of a cyberbreach when children are using the network--and what you can do about it.

     

    SHOW NOTES

    You do everything you can to keep your network secure—but when one of your kids is online and they click on click-bait…bam! You can get infected with malware just like that.

     

    1:05 Can you keep your network secure when you have limited control when your kids are online? “Secure” vs. “Trust” and a Zero Trust policy

     

    2:22 Network Segmentation; Check out Ssn 1 Ep 4: IoT Devices for a more detailed discussion on Network Segmentation

     

    3:43 What is Zero Trust Policy?

     

    5:05 How do you protect your network if you only have one computer that the whole family shares?

     

    12:50: Discussion of a company that was breached and faced a devastating ransomware attack due to the compromised home network of a remote employee.

     

    15:05: Dedicate one computer in your household for sensitive personal information and financial data, and keep it separated from every other device in the household.

     

    16:00: Four bullet items for best practices

     

    16:35: Discussion of social media pitfalls and how to use it safely if you must do so on a work device.

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

     

    You’ll find the downloadable version of these show notes at: https://EastAtlanticSecurity.com/Cyber-Savvy-Cafe

    Ssn 1 Ep 10: The Problems it Solves

    Ssn 1 Ep 10: The Problems it Solves

    Acceptable Use Policies: The Whys, Whats, and Whatnots

    Why it’s important to have an AUP in place, how it protects you, and how to make one.

     

    Ssn 1 Ep 10

    The Problems It Solves

    Acceptable Use Policy: The Whys, Whats, and Whatnots

     

    Why it’s important to have an AUP in place, how it protects you, and how to make one.

     

    SHOW NOTES:

    An Acceptable Use Policy (AUP) defines how your employees are to use the corporate network and associated technology; what they can and can’t do.

     

    00:28 Why is it important to have an AUP in place?

     

    01:19 What can potentially happen if you don’t have one?

     

    02: 04 What’s in an AUP?

     

    03:45 What kind of policies do you recommend?

     

    06:12 What fallout have you seen that came from not having an AUP in place?

     

    07:50 How Do You Make One?

    • Sample AUPs are available on the internet to use as a starting point.
    • Ask others in your industry what they use, where they got it, or how they designed it.
    • Hire a professional to assist; look for an experienced MSP who includes AUPs in their services

     

    08:32 Any other problems an AUP solves?

     

    09:52 Where do you post an AUP so it’s accessible to your employees?

     

    10:59 How imperative is it to make one now and not put it off?

     

    Additional Notes:

    General Sections in an AUP Can Include:

    • An overall purpose statement: an overview of the reason for the AUP and key takeaways.
    • Definitions: Make sure any confusing terms are clearly defined, and explain any lingo that may be unique to your industry or your company.
    • Scope: To whom and to what situations does the policy apply?
    • Policies: This covers use, access, behavior, and general company policies for each section.
      • Passwords, sharing of passwords, acceptable use of network, authorized use of voice mailbox, premises, personal devices while at work, etc.
    • Personal Use: Are employees allowed to use the network or devices for any personal use; if so, how and when
    • Enforcement: What happens if a policy is violated. Be very clear about the steps that are to be taken, including sanctions or termination of employment.

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

    Ssn 1 Ep 9: Spies at the Coffee Shop

    Ssn 1 Ep 9: Spies at the Coffee Shop

    Think you’re safe, hooking your devices up to public Wi-Fi and public charging stations? Think again. In today’s episode we talk about the sneaky cyber back doors you open every time you connect a device in a public space.

     

    Show Notes for Ssn 1 Ep 9

    Spies at the Coffee Shop:Public Wi-Fi, Charging Stations, and Other Cyber Traps

     

    SHOW NOTES

     

    1.Public Wi-Fi

     

    • All public Wi-Fi should be considered unsafe, and untrusted.
    • Solution: When at a place like Starbucks, access via your own hot spot or VPN if you have one on your company laptop.
    • DO NOT access at Starbucks or any public Wi-Fi unless you have one of these options.

     

     

    2.Charging Stations

     

    What Is Juice Jacking?

    When using a public charging station, cybercriminals can potentially access all the information on your device or initiate a full backup of your phone. Cybercriminals can also inject malware into your phone.

     

    Solution: Don’t use public charging stations.

    • Keep your battery full. 
    • Carry an external battery pack.

     

    If you absolutely must use a third-party power source, use a USB data blocker or power-only USB cables. These cables are missing the two wires necessary for data transmission, ensuring that they can only be used for charging.

     

    Blog Post: https://eastatlanticsecurity.com/2021/01/05/why-you-shouldnt-use-public-charging-kiosks/

     

     

    3.Flash Drives and Data Sharing

     

    Flashdrives can easily be infected with malware. If your flashdrive becomes infected—this can happen at any shared computer—and you insert it back into your computer, it only takes a moment to transfer that malware onto your device.

     

    Solution: Use a commercial-grade cloud-based system for transferring data.

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

    Ssn 1 Ep 8: Remote Workstations

    Ssn 1 Ep 8: Remote Workstations

    Remote workstations are here to stay, but lax home network security is putting corporate networks at risk. Here are some steps to help secure your network and close the doors to a cyber breach.

     

    You can get your copy of "8 Security Threats for Remote Workstations and How You Can Mitigate Your Risk," at:

    https://eastatlanticsecurity.com/hackers-go-phish/

     

     

    Why Remote Workstations Put You at Risk of a CyberBreach

    Show Notes for Ssn 1 Ep 8

     

    • Remote workstations pose specific risks and require additional security measures, staff training, and work-from-home protocols to keep the corporate network secure.
    • Many companies have not yet set aside time and resources to set up secure workstations, company devices, and protocols for remote employees.
    • Employees working remotely are more vulnerable to falling prey to phishing emails and other scams, potentially giving cybercriminals direct access to the corporate network.

     


    What do employers need to do to secure their employees’ remote workstations and protect company data?

     

    1. Company Device
    • When possible, a company-issued laptop is the safest workstation:
    • A foundational caveat for using a company laptop: DO NOT USE FOR ANY PERSONAL USE.
    • There are times when a personal device is being used at work, and those need special protocols.

     

    1. Public Wi-Fi
    • All public Wi-Fi should be considered unsafe, and untrusted.
    • We'll be covering this in-depth in Ssn 1 Ep 9: Spies at the Coffee Shop

     

    1. Accessing Company Resources and VPNs
    • Users will probably need to access resources that are in their corporate offices.
    • Employers have the ability to implement a sophisticated VPN from an untrusted workstation back to the corporate network, allowing that user access to specific resources from restricted channels.

     

    1. Passwords and Two-Factor Authentication
    • Turn off autocomplete, and any saved passwords.
    • Better solution: Use a password management app, like LastPass.
    • Follow current industry recommendations for secure, unique passwords. (LastPass will generate secure passwords for you!)
    • Enabling multi-factor authentication is an easy way to tighten security and should be used for all accounts.
    • Check out Ep 5, Password Secrets and the Book of Codes for a deeper discussion of this topic.

     

    1. Firewalls
    • Use firewalls for personal networks. Always have your provider firewall enabled, like Windows. Depending on how many devices you have on your home network, you should go even deeper than an anti-virus like Webroot.
    • Don’t rely on your ISP access point or anything it provides. Go out and buy your own security device or firewall and plug it into theirs--and then keep it updated. Some recommendations:
      • Sonicwall Tz105 UTM
      • Cisco RV110W
      • Ubiquity UniFi USG
    • Get a hardware firewall hooked up that allows you to create virtual networks. Put your primary computer on one, and IOT devices on a separate network with no access to the computer in case an IOT device gets compromised.
    • Listen to: Ep 4 IoT Devices and Network Security for more on this topic.

     

    1. Phishing emails
    • Phishing is the #1 way of getting inside your network.
    • Check out our back episodes on phishing, #2 and #3, and Ep 7: The Perimeter is Dead, for more information.
    • Don’t open PDFs, Word docs, images, or any attachments that come in an email without first verifying with the sender.

     

    1. Beware of Bogus Websites, Apps
    • Phishing emails and bogus websites centered around information about current events can crop up by the thousands (e.g. apps with global tracking maps during the pandemic containing spyware and malware.).
    • Do not seek information from untrusted sources. Doing so can compromise your device and the company network.

     

    1. Personal Devices
    • An employee’s personal device can be managed through a Bring Your Own Device policy
    • Use a VPN when connecting remotely, or use Microsoft’s cloud offering.
    • Best Practice: Use Microsoft Windows Virtual Desktop in the cloud. 
    • Using your personal phone or tablet to check work emails, files, etc. is a big NO when working from home.
    • In the event an employee’s device is infected with malware, spyware, etc., Mobile Device Management sets up a "business space" and will keep that area separated and protected from the rest of the items on the device.

     

    You hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @ https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io