In this episode, the whole team delves into common phishing and manipulation tactics, with current statistics on how it is affecting our world today. We then outline effective training programs and offer thoughts and ideas in fostering a security-aware culture.To get in touch with us, please email: info@sher-technologies.com and follow the LinkTree to access our Website and Social Media: https://linktr.ee/shertechllc
Josh and Sid discuss the latest breach of personal data affecting 2.9 billion records, what you should know and what you can do to protect yourself. To get in touch with us, please email: info@sher-technologies.com and follow the LinkTree to access our Website and Social Media: https://linktr.ee/shertechllc
On this episode of the SherTech Podcast, Sid, Josh, and Jose address and talk about recent Cyber headlines including the Change Healthcare Ransomware Attack, and Microsoft. To get in touch with us, please email: info@sher-technologies.com and follow the LinkTree to access our Website and Social Media: https://linktr.ee/shertechllc
On this episode of the SherTech Podcast, Sid, Josh, and Jose address and talk about recent Cyber headlines including the Change Healthcare Ransomware Attack, and Microsoft. To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
On this episode, Sid, Josh, Crane, and Jose discuss the benefits of having a vCISO in your organization. To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
On this episode, Josh, Jose, and Sid review 2023 in the Cybersecurity space from a big picture perspective. To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
On this episode, Jose, Josh and Sid delve into and react to the Aliquippa Water Authority Cyber attack, what it means for you, and all devices that we connect to our home or business networks. To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
On this episode, Sid, Josh, and Jose discuss the Importance of Change Management and how it will reduce incidents, confusion, costs and heartache for companies that adhere to and correctly manage the changes they make to their systems. To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
On this episode, Sid, Josh, and Ryan discuss the conundrum that many companies face: That Compliance to a cybersecurity standard does not mean that their company is fully secure. To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
On this episode, Josh and Sid delve into Risk Management and the various controls this hits in NIST 800-171
On this episode, Sid and Josh performing a Security Assessment and the various controls this hits. This is the first episode where we delve into actual NIST 800-171 controls
On this episode, Sid and Josh delve into the Asset inventory - Knowing an documenting ALL assets/software/and more. Every company needs to perform this so they correctly apply NIST 800-171 without missing any assets that are unaccounted for.
On this episode, Sid and Josh delve into Scoping - figuring out what is in scope, and what is not in scope. Every company needs to perform this, so they correctly apply the NIST 800-171 without including unnecessary elements, or worse, missing key elements of their organization.
In this episode, we delve into building a CUI enclave - Why would we need one? How do we build one? Third Party Assessment To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
We at Shertech wanted to put out a new series of content all around NIST 800-171. This series will go through all of the controls in the order a company would ACTUALLY implement in. Please give this episode a listen to learn all about what we are doing, and who this is for. Please follow us as we will be dropping content weekly. To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
On this episode, we delve into Vulnerability Scanning and why every business needs it: What is Vulnerability Scanning EXACTLY? How is it different from Anti-Virus? Firewalls? To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
On this episode, Sid and Josh delve what the possibilities are, and what anyone should be considering and thinking about before implementing AI into a business. To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
On this episode of the SherTech Podcast, we delve into Software Whitelisting or Blacklisting inside your organization. What is Software Whitelisting or Blacklisting? Pros and Cons to both Which one should you choose? How to choose it If you'd like to learn more about how to implement Software Whitelisting or Blacklisting into your organization, please reach out. To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
In today's episode, we delve into the basics of Pentration Testing. What is Penetration Testing The different types Why we use different types Non Technical Penetration Testing How, and why it is beneficial to your company to perform Penetration Testing If you'd like to learn more about Penetration Testing, please reach out. To get in touch with us, please email: info@sher-technologies.com Links to our website and socials
On this episode, Sid, Josh, and Crane delve into 3rd Party Contracts and everything you need to be aware of and look for when engaging with 3rd parties and their contracts or SLAs. To get in touch with us, please email: info@sher-technologies.com Links to our website and socials