Artwork

Content provided by Object First. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Object First or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Unveiling Zero-Click Dangers, 2024's Riskiest Devices, and Mastering Backup Strategies

38:00
 
Share
 

Manage episode 424293344 series 3556341
Content provided by Object First. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Object First or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

How safe is your email? This week on Zero Gravity Live, we explore the hidden threats lurking in your inbox, starting with a zero-click vulnerability in Microsoft Outlook that can activate malicious code just by viewing an email. We dive into the critical importance of zero trust and data resilience, drawing parallels to past cybersecurity challenges and emphasizing the need for robust security practices in an ever-evolving digital landscape. You'll also hear our thoughts on why unique passwords are still one of your best defenses against these sophisticated attacks.
Next, we shift gears to discuss the most perilous connected devices of 2024. From unpatched hypervisors to vulnerable IP cameras and NAS devices, we explore how these technologies, while integral to modern operations, pose significant risks if left unsecured. We share a real-world example of an insider threat where a former IT employee wreaked havoc by wiping out 180 virtual servers, illustrating the devastating potential of both external and internal security breaches. Learn why zero trust, immutability, and resilience are non-negotiable in today's cybersecurity strategies.
Finally, we underscore the indispensable role of backups and recovery plans in safeguarding business continuity. Discover why simply having backups isn't enough without ensuring their recoverability through techniques like verification and the 3-2-1-1-0 rule. We'll discuss how a comprehensive strategy can protect your operations and reputation from all types of threats, including rogue administrators and ransomware. Stay tuned for our next episode, where we'll reveal the surprising dangers posed by emojis in your digital communications. Until then, stay weightless, stay frictionless, stay zero gravity.

Watch us live every Tuesday at 11 am EST

Need the best storage for Veeam? Check out Ootbi by Object First

  continue reading

Chapters

1. Tech Talk (00:00:00)

2. Email Security and Zero Click Vulnerability (00:10:00)

3. Connected Device Security Risks (00:16:39)

4. Insider Threats and Data Resilience (00:25:30)

5. Backup and Recovery Importance (00:35:33)

16 episodes

Artwork
iconShare
 
Manage episode 424293344 series 3556341
Content provided by Object First. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Object First or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

How safe is your email? This week on Zero Gravity Live, we explore the hidden threats lurking in your inbox, starting with a zero-click vulnerability in Microsoft Outlook that can activate malicious code just by viewing an email. We dive into the critical importance of zero trust and data resilience, drawing parallels to past cybersecurity challenges and emphasizing the need for robust security practices in an ever-evolving digital landscape. You'll also hear our thoughts on why unique passwords are still one of your best defenses against these sophisticated attacks.
Next, we shift gears to discuss the most perilous connected devices of 2024. From unpatched hypervisors to vulnerable IP cameras and NAS devices, we explore how these technologies, while integral to modern operations, pose significant risks if left unsecured. We share a real-world example of an insider threat where a former IT employee wreaked havoc by wiping out 180 virtual servers, illustrating the devastating potential of both external and internal security breaches. Learn why zero trust, immutability, and resilience are non-negotiable in today's cybersecurity strategies.
Finally, we underscore the indispensable role of backups and recovery plans in safeguarding business continuity. Discover why simply having backups isn't enough without ensuring their recoverability through techniques like verification and the 3-2-1-1-0 rule. We'll discuss how a comprehensive strategy can protect your operations and reputation from all types of threats, including rogue administrators and ransomware. Stay tuned for our next episode, where we'll reveal the surprising dangers posed by emojis in your digital communications. Until then, stay weightless, stay frictionless, stay zero gravity.

Watch us live every Tuesday at 11 am EST

Need the best storage for Veeam? Check out Ootbi by Object First

  continue reading

Chapters

1. Tech Talk (00:00:00)

2. Email Security and Zero Click Vulnerability (00:10:00)

3. Connected Device Security Risks (00:16:39)

4. Insider Threats and Data Resilience (00:25:30)

5. Backup and Recovery Importance (00:35:33)

16 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide