Discover
Security Views Radio

Security Views Radio
Author: JSCM Group
Subscribed: 9Played: 75Subscribe
Share
Description
Security Views Radio is an executive level Cyber Security podcast that provides information for managers and executives on how to mitigate risks every organization faces. We have been doing cyber security for nearly 20 years and have developed unique insider knowledge. We aren’t afraid to ask the hard questions if it means we get to the truth. Join hosts Adam Slater, John Stengel and a rotating seat filled with security experts and industry veterans as we discuss the security concepts, threats, and attacks that surround all industries. Tune in as we uncover the good, bad and the ugly when it comes to the cyber security world.
46 Episodes
Reverse
Kik is a private messenger app that enables its users to remain totally anonymous. This makes it appealing to teenagers and easy for predators to send pornography. This week we discuss the dangers associated with an app that only requires a username and email. In this episode we cover:• Kik App• Online PrivacyDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Hackers exploited a vulnerability in Kaseya’s software on July 3, 2021 and deployed ransomware to 1,500 organizations. To make matters worse, it was revealed that Kaseya was made aware of the security flaw six years earlier in 2015. When a service provider ignores recommendations to fix a known weakness in it's software, the consequences are costly. In this episode we cover:• Kaseya Ransomware Attack• Company Integrity• Security AssessmentsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Weak or stolen credentials are hackers go-to method in most attacks. This week we discuss Multi-Factor Authentication and why every organization should implement MFA to improve their security posture.In this episode we cover:• Multi-Factor Authentication• Email Security• The difference between MFA and 2-Factor AuthenticationDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
On June 8, 2021 Amazon quietly launched its shared network called Sidewalk. This service creates a WiFi network using existing Ring and Echo devices that will share a portion of your internet bandwidth. The most frustrating part, unless users opt out their devices will automatically share internet with strangers. Shouldn’t Amazon ask for users permission first?In this episode we cover:• Amazon Sidewalk Network• Digital Identification• WiFi SecurityDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
One of the primary security measures to protect your organization from cyber security attacks is software patching. This week we discuss best practices for patch management and some of the challenges companies face when it comes to protecting their network.In this episode we cover:• Patch Management• Data Protection• Security UpdatesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Instagram for Kids isn’t just a bad idea, it’s an awful idea. It’s also an easy target for online predators to create fictional profiles and socialize with kids. This week we discuss the difficulty with securing a platform that specifically targets children.In this episode we cover:• Instagram for Kids• Social Media• Data Protection• Online PredatorsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
They say nothing in life is free. This week Adam gives a detailed breakdown of of his frustrating experience with Alexa while playing a free trivia game. We also discuss the frustration with microtransactions and the endless ways we are peppered with ads to buy more time or more fictional coins. In this episode we cover:• Amazon Alexa• Microtransactions• Data ProtectionDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This week we discuss “tattleware” and how some employers are forcing their workers to download apps onto their phone to track their productivity. One of the biggest concerns is the employer rarely knows where this information is stored and how it will be used by a third party. With more companies using tattleware apps the question becomes what is, and isn’t, personal information. In this episode we cover:• Blip app• tattlware• Data Protection• Personal InformationDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
Facebook recently announced a data leak which resulted in the exposure of 533 MILLION users mobile numbers. These users accounts were first put up for sale back in June of 2020. This week we discuss why it’s important to protect your phone number from companies who request it for causal transactions. In this episode we cover:• Facebook Data Leak• Data Protection• Password ManagersDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This episode we discuss wearable tech devices like the Me.Ring that claim to protect users from private companies who steal our personal data. While these devices have good intentions the reality is the best device to protect us from data mining is the actual user.In this episode we cover:• Data Protection• Me.Ring• Data MiningDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This week we discuss the lack of moderation in chat rooms with popular games like Among Us. The chat function is an open invitation for predators and unfortunately a lot of parents are unaware of what their kids are reading. In this episode we cover:• Among Us• Chat Rooms• Moderation FeaturesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This week we discuss which device scares us the most if hacked by bad actors. From smart cars to smart speakers, manufacturer’s want connected devices to become an essential to our daily lives. Are the constraints presented to us by life in the non-connected world really so onerous?In this episode we cover:• Smart Speakers• Internet of Things• Hacking DevicesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
When you sign up for a social media account, you agree to terms and conditions and if you violate those stipulations you can be suspended or even permanently removed from the sites altogether. This week we discuss if an entity like Facebook or Twitter engaging in censorship infringes on our rights to freedom of speech.In this episode we cover:• Censorship• Social Media• Florida Water Supply Hacking AttemptDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
To pay or not to pay. Ransomware has grown into a billion dollar business and your company could be next. This week Adam and John dive into ransomware attacks and the dilemma with paying cyber criminals.In this episode we cover:• Ransomware• Kia Motors• Security AssessmentsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This week we deep dive into Internet-enabled crimes and scams. According to the FBI’s Internet Crime Complaint Center (IC3), last year had the highest dollar loss reported since the center was established. Individuals and organizations must remain vigilant and report scams immediately to help create a safer cybersecurity landscape. In this episode we cover:• Online Scams• Phishing• Cryptocurrency theftDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
This week we discuss screen time and internet addiction. The internet has some incredibly high utility and nutritious stuff on it. Unfortunately, there’s also a lot of zero-calorie garbage online and things that are really bad for you. In this episode we cover:• Screen Limit• Digital Addiction• Reducing Cell Phone UsageDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
As we adopt more IoT devices, attach them to critical infrastructures and store sensitive data in them, we also have to wrestle with the problem of securing them.In this episode we cover:• IoT Devices• Internet Security• Hacks and VulnerabilitiesDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
On this weeks show we discuss the recent petition filed by the American Civil Liberties Union and the Electronic Frontier Foundation with the Supreme Court over digital-privacy. In this episode we cover:• Cell Phone Privacy• Facial and Fingertip recognition• BiometricsDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
John and Adam discuss the best hacker movies. Is Office Space actually a great hacker movie? Tune in to see which movie wins the top spot. In this episode we cover:• Hacker Movies• John doesn't like the Matrix• Felton likes the movie SwordFish for all the right reasons. Do you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com
In 1996, cyber-activism gained a reputation and was given a new name: hacktivism. Many innocent people get caught in the crossfire when tech-savvy vigilantes wage a war on information. In this episode we discuss if tactics such as doxxing, defacement, and denial-of-service to break into government or private organization systems should be praised or scrutinized. In this episode we cover: • Hacktivism• Digital Activism• DDoS AttacksDo you have a question on Cyber Security you want answered? Email podcast@jscmgroup.com with any questions for the host.Have you experienced a data breach? Contact: info@jscmgroup.com



