Artwork

Content provided by SiteLock, Jessica Ortega, Ram Gall, Topher Tebow, Jessica Ortega, Ram Gall, and Topher Tebow. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SiteLock, Jessica Ortega, Ram Gall, Topher Tebow, Jessica Ortega, Ram Gall, and Topher Tebow or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Endpoint Security Basics

15:53
 
Share
 

Archived series ("Inactive feed" status)

When? This feed was archived on March 18, 2021 00:10 (3+ y ago). Last successful fetch was on February 01, 2020 16:48 (5y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 190709098 series 1591306
Content provided by SiteLock, Jessica Ortega, Ram Gall, Topher Tebow, Jessica Ortega, Ram Gall, and Topher Tebow. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SiteLock, Jessica Ortega, Ram Gall, Topher Tebow, Jessica Ortega, Ram Gall, and Topher Tebow or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
The Local Piece of Your Security Puzzle

Endpoint Security Basics

October 31, 2017 | Episode 104

Endpoint security is an important piece of your overall security puzzle. Along with some of the website security tactics we've discussed previously, a strong endpoint security strategy is important for protecting your systems and your users.

Recent News

BadRabbit

BadRabbit is similar to Petya, and has targeted Russian and Ukranian infrastructure. It uses DiskCryptor delivered through a fake Adobe Flash update to encrypt all files on a system.

WordCamp Phoenix

This weekend was WordCamp Phoenix, where the open-source community came together to discuss WordPress, along with how the open-source community can come together to stay strong, and even the benefits of side projects. Endpoint Security Endpoint security is one of the common threads among recent attacks, including Petya and BadRabbit. Endpoint covers the system and network you are physically using, and can include IOT devices.

There are steps you can take to avoid making mistakes, and be a secure user. When you are working in a public location, like a coffee shop, lock your computer if you step away for a moment, take your phone or tablet with you, and don’t let your devices out of your site. Be aware of phishing, and take steps like not opening suspicious emails and type URLs instead of clicking links.

If you are providing IT security for a company, set up filters, and use the available lists of known malicious URLs and IP addresses to keep those filters up to date.

Don’t believe popups that say you have malware. The popup is trying to get you to click it, which will then install malware. Don’t trust a popup that isn’t part of software you or your IT team have installed. This is essentially a modern form of social engineering.

Along the lines of social engineering, be aware of social engineering tactics. If you receive a call, never give information on that call. It is better to hang up and call the company back at a number you know is legitimate, and anyone who is from a legitimate company should not have a problem with you doing this. Even calls from management in the company you work for should be handled this way. If you don’t recognize the voice on the other end, offer to call their extension to verify that they are who they claim to be. Chances are, they will appreciate that you are helping to keep the company secure.

Related Articles:

Tip of the Day - 2FA

Two-Factor Authentication is a process where you are sent a code via email, text, or an app, so that you have to not just use your username and password, which can be compromised, you also have to prove you have your device with you. This provides an extra layer of security that will keep your accounts significantly more secure than a username and password alone.

  continue reading

29 episodes

Artwork
iconShare
 

Archived series ("Inactive feed" status)

When? This feed was archived on March 18, 2021 00:10 (3+ y ago). Last successful fetch was on February 01, 2020 16:48 (5y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 190709098 series 1591306
Content provided by SiteLock, Jessica Ortega, Ram Gall, Topher Tebow, Jessica Ortega, Ram Gall, and Topher Tebow. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SiteLock, Jessica Ortega, Ram Gall, Topher Tebow, Jessica Ortega, Ram Gall, and Topher Tebow or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
The Local Piece of Your Security Puzzle

Endpoint Security Basics

October 31, 2017 | Episode 104

Endpoint security is an important piece of your overall security puzzle. Along with some of the website security tactics we've discussed previously, a strong endpoint security strategy is important for protecting your systems and your users.

Recent News

BadRabbit

BadRabbit is similar to Petya, and has targeted Russian and Ukranian infrastructure. It uses DiskCryptor delivered through a fake Adobe Flash update to encrypt all files on a system.

WordCamp Phoenix

This weekend was WordCamp Phoenix, where the open-source community came together to discuss WordPress, along with how the open-source community can come together to stay strong, and even the benefits of side projects. Endpoint Security Endpoint security is one of the common threads among recent attacks, including Petya and BadRabbit. Endpoint covers the system and network you are physically using, and can include IOT devices.

There are steps you can take to avoid making mistakes, and be a secure user. When you are working in a public location, like a coffee shop, lock your computer if you step away for a moment, take your phone or tablet with you, and don’t let your devices out of your site. Be aware of phishing, and take steps like not opening suspicious emails and type URLs instead of clicking links.

If you are providing IT security for a company, set up filters, and use the available lists of known malicious URLs and IP addresses to keep those filters up to date.

Don’t believe popups that say you have malware. The popup is trying to get you to click it, which will then install malware. Don’t trust a popup that isn’t part of software you or your IT team have installed. This is essentially a modern form of social engineering.

Along the lines of social engineering, be aware of social engineering tactics. If you receive a call, never give information on that call. It is better to hang up and call the company back at a number you know is legitimate, and anyone who is from a legitimate company should not have a problem with you doing this. Even calls from management in the company you work for should be handled this way. If you don’t recognize the voice on the other end, offer to call their extension to verify that they are who they claim to be. Chances are, they will appreciate that you are helping to keep the company secure.

Related Articles:

Tip of the Day - 2FA

Two-Factor Authentication is a process where you are sent a code via email, text, or an app, so that you have to not just use your username and password, which can be compromised, you also have to prove you have your device with you. This provides an extra layer of security that will keep your accounts significantly more secure than a username and password alone.

  continue reading

29 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide