Artwork

Content provided by Mike Dorman. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mike Dorman or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cybersecurity: Are you protected from the next big attack?

21:58
 
Share
 

Manage episode 425748367 series 3575759
Content provided by Mike Dorman. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mike Dorman or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

On today's episode of Real World Business English, I want to talk about security. But rather than go through the history of the Internet, which personally I find a little dry and boring, I want to look at some specific real world examples of cyber attacks. Now, I don't know about you, but usually some. When we think of hackers, we often imagine people in hoodies sitting in dark rooms causing trouble. We see them as either bad guys or sometimes even heroes, and they break into systems to do harm or to reveal government secrets. But what if I told you the biggest cyber attack in history wasn't done by rogue hackers acting alone, but by a country? Well, this is the story of Stuxnet, a powerful piece of code that changed the world of cybersecurity and even international conflicts.
So we're going to look at how the cyber weapon made us rethink what we know about hackers and modern warfare.I want to talk about cybersecurity challenges and the strategies businesses have for dealing with these challenges. Cybersecurity, if you didn't already know, is the practice of protecting computers, networks and data from theft, damage and unauthorized access. As businesses rely more on technology. Cybersecurity has become crucial or very important to protect sensitive information.

  continue reading

4 episodes

Artwork
iconShare
 
Manage episode 425748367 series 3575759
Content provided by Mike Dorman. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mike Dorman or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

On today's episode of Real World Business English, I want to talk about security. But rather than go through the history of the Internet, which personally I find a little dry and boring, I want to look at some specific real world examples of cyber attacks. Now, I don't know about you, but usually some. When we think of hackers, we often imagine people in hoodies sitting in dark rooms causing trouble. We see them as either bad guys or sometimes even heroes, and they break into systems to do harm or to reveal government secrets. But what if I told you the biggest cyber attack in history wasn't done by rogue hackers acting alone, but by a country? Well, this is the story of Stuxnet, a powerful piece of code that changed the world of cybersecurity and even international conflicts.
So we're going to look at how the cyber weapon made us rethink what we know about hackers and modern warfare.I want to talk about cybersecurity challenges and the strategies businesses have for dealing with these challenges. Cybersecurity, if you didn't already know, is the practice of protecting computers, networks and data from theft, damage and unauthorized access. As businesses rely more on technology. Cybersecurity has become crucial or very important to protect sensitive information.

  continue reading

4 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide