CompassCyberGuide public
[search 0]
Download the App!
show episodes
 
Loading …
show series
 
The WannaCry Ransomware attack that began May 12, 2017 is one of the largest ransomware attacks in history. This attack used a computer worm, borrowed from leaked NSA exploits, to target Microsoft Windows operating systems at an unprecedented scale. To date, over 300,000 machines in 150 countries have been affected. This podcast offers an in-depth …
  continue reading
 
President Trump recently signed legislation that blocked the implementation of the Federal Communications Commission’s Online Privacy Rule that was to take effect at the end of this year. This rule was intended to prevent Internet Service Providers (ISPs) from capturing and selling user data. Learn best practice tips to secure your sensitive inform…
  continue reading
 
This episode of The CyberGuide discusses the CIA Vault 7 Release on WikiLeaks. This exposed the CIA’s ability to manipulate and exploit software without consumer knowledge. For example, the documents introduced a new series of threat actors of which demonstrate the CIA’s capability to hack smart TVs and smartphones. Tune in for more information abo…
  continue reading
 
This episode of The CyberGuide reviews the landscape of cyber security in 2016 and offers predictions for 2017. Organizations are in the early stages of understanding the importance of cyber security and investing in it. However, threats, including ransomware and spear phishing, are becoming more sophisticated. These facts make way for an interesti…
  continue reading
 
The Internet of Things (IoT) is the interconnectedness of devices that have an IP address, that are embedded in everyday objects, and have the ability to send and receive data. Examples of IoT devices include mobile devices, fitness trackers, and smart speakers, among many others. These devices have endless potential but users must be aware of the …
  continue reading
 
It is impossible to protect your organization from a threat you don’t know exists. As a result, it is imperative your organization goes through the threat identification and analysis process at least once a year. This episode of The CyberGuide explains this procedure and how it is applicable and it begins by broadly examining potential threat sourc…
  continue reading
 
It is difficult for organizations to make informed decisions on cyber security risk management without understanding the unique threats they may face. As a result, the 5 Steps to Develop a Security Program helps businesses determine where their vulnerabilities exist and offer suggestions on remediation. To allocate your resources effectively, it is…
  continue reading
 
Regardless of an organization’s size and industry, the Top 10 Most Common Findings in Security Assessments are applicable and help organizations understand their unique cyber security threats. The commonalities in these assessments allow organizations to better allocate their resources. The top 10 findings are broken out across the Three Pillars of…
  continue reading
 
Negligent and malicious insiders are major threats to organizations as they are responsible for a large percentage of data breaches. Insiders pose a unique threat to your organization because they know your network the best and typically have access that an outsider does not. Businesses must find a balance between security and functionality because…
  continue reading
 
Cyber security is a foreign language to most executives. This episode offers suggestions when speaking with executives about cyber security and enterprise risk management in your organization. Cyber security is a broad topic that addresses a range of topics from risk management to regulatory compliance. Executives need to think of cyber security as…
  continue reading
 
Loading …

Quick Reference Guide