Online Shopping Hazards with guest WWPass VP of Strategy Perry Chaffee

Perry Chaffee of WWPassPerry Chaffee, WWPass VP of Strategy, and I turn our attention toward online shopping because it is the holiday shopping season and security is a big concern, or should be, for anyone making online purchases. You don’t want your shopping experience to be tainted with unusual charges, identity theft, or account compromise of any kind. For these reasons, you need to be aware of your shopping experience and your security.

Here are a few guidelines that Perry and I talk about during the podcast:

  1. Use a strong password.
  2. Use a password manager.
  3. Use a credit card rather than a debit card for purchases.
  4. Enable two-factor authentication for better security.
  5. Before entering passwords or credit card information, look for the https in your browser’s URL.
  6. Close your browser after shopping on a site and reopen it for your next purchase.
  7. Be sure that the site you’re on is the one you want to use.
  8. Never give anyone your password over the phone.
  9. Be VERY careful of links embedded in emails as they can look very similar to real sites.
  10. Be aware of your surroundings and don’t speak your credit card information out loud in public places.

WWPassThis is not a sponsored podcast but WWPass is a commercial security solution for individuals and businesses to help keep all your online transactions and shopping experiences secure.

Length: 18:02 minutes. Format: MP3. Rating: G

Please contact us for sponsorships, sponsored posts, and videocasts.

Copyright 2017 The SecurityNOW Podcast Show. License: CC BY.

Absolute’s Global Security Strategist Richard Henderson discusses 2018’s Security Threats

Richard HendersonRecurring guest Richard Henderson (Global Security Strategist for Absolute) and I discuss what we think are the greatest threats to security in 2018. We ponder ransomware, standard threats, cryptocurrencies, and other advanced persistent threats.  Richard and I agree that 2018 will be another significant security threat year. One thing to note is that while attackers are more persistent, there are some threats that are actually waning such as certain types of ransomware, viruses, and malware that’s easily stopped by smarter browsers, host-based firewalls, and operating system security. That said, we don’t expect attacks to decrease in 2018.

As always, our podcasts are licensed CC BY and are rated G for all audiences and venues.

Length: 29:07 minutes. Format: MP3. Rating: G.

Please contact us for sponsorships, sponsored posts, and videocasts.

Cybersecurity Law with Heidi L. Shadid, Attorney at Law (Video)

Eller & DetrichHeidi Shadid of the Eller & Detrich Law Firm and I sat down for an interview that covered several aspects of Cybersecurity Law. We discussed how to engage her firm, what to do after a hack or breach, and what your responsibilities are for reporting a breach. Ms. Shadid is an Attorney with the Eller & Detrich Law Firm in Tulsa, Oklahoma and includes Cybersecurity Law in her practice.

Her practice encompasses the following specialties:

Core areas of practice and experience

  • General Civil Litigation
  • Business Litigation
  • Construction Litigation
  • Employment Disputes
  • Cybersecurity Risk Management

Bar admissions

  • Oklahoma, 2010
  • Missouri, 2009
  • Kansas, 2009
  • U.S. District Court, Northern, Eastern & Western Districts of Oklahoma
  • U.S. District Court, District of Kansas
  • U.S. District Court, Western District of Missouri
  • U.S. District Court, District of Colorado
  • U.S. Court of Appeals, Tenth Circuit

Copyright 2017 SecurityNOW – License: CC BY

Social Media Security with Proofpoint’s Dan Nadir (Podcast)

ProofpointPreston and I had the opportunity to speak with Proofpoint‘s Vice President of Digital Risk on the hot topic of social media security. I say it’s a hot topic because it’s a hot topic for me because I’m not really a fan of most social media sites. I generally only use LinkedIn and Twitter. But there’s more to social media than Facebook, Twitter, and LinkedIn. There’s Instagram, Snapchat, and others. And security for all them is a big concern–or should be. In this podcast, we discuss the problems with social media security and some possible solutions.

Listen in and tell us what you think.

Podcast details:

Length: 19:59 minutes. Format: MP3. Rating: G for all audiences.

Copyright 2017 SecurityNOW  Licensing: CCBY

SecurityNOW’s Mid-Year 2017 Cybersecurity Review

HalfPreston and I took a few minutes to recap the year so far in cybersecurity and to catch you up on what’s going on with breaches, security tips, and ransomware. We have a lengthy (for us) conversation that covers all things cybersecurity for the first half of 2017 and all that it had to offer. I want you to pay particular attention to my five rules concerning ransomware. Please take this advice as wisdom from not only Preston and myself but from other cybersecurity professionals as well.

Podcast details:

Length: 33:56 minutes. Format: MP3. Rating: G for all audiences.

True Digital SecurityThis podcast was sponsored by True Digital Security.

Ryan Benson of Exabeam discusses SIEM software

ExabeamPreston and I interviewed Ryan Benson, Senior Threat Researcher at Exabeam about Security Information and Event Management (SIEM) software. We discussed what SIEM software is, what it does for a company, how it protects your network, and how to evaluate a SIEM suite.

Preston and I also agree that a SIEM suite should offer more than simple log aggregation and log scraping. There are less expensive and less cumbersome tools that can handle that functionality if that’s all you need. We also agree that SIEM companies need to bake some intelligence into their products that allow them to be automated, to respond automatically to threats, and to include advanced analytics so that you can optionally find out what’s going on and going wrong on your network.

Ryan gives us some insight into what’s going on in SIEM software and why you should care. Before you purchase a SIEM solution, take his advice offered in the podcast.

Podcast details:

Length: 22:35 minutes. Format: MP3. Rating: G for all audiences.

Check out Exabeam’s SIEM Platform for yourself.

America Exposed – Who’s Watching You Through Your Computer’s Camera? Interview with ICIT’s James Scott (Podcast)

ICITPreston and I interviewed Senior Fellow, James Scott from the Institute for Critical Infrastructure Technology about the serious threat to individuals from their webcams. You might think that because your camera is in your house and turned off that your safe from prying eyes, but you’re not. James gives us some insight as to what the problem is and how to solve it.

The unsecured cameras on PCs and mobile devices pose a serious threat to the private sector, to individual users, and to national security.  No other exploit is as vicious or expedient with its results as camera activation malware which can be used by malicious threat actors to surveil and spy on unsuspecting users.

In our most recent publication, entitled “America Exposed:  Who’s Watching You Through Your Computer’s Camera?”, ICIT provides an in-depth analysis of this underreported threat by discussing:

  • The evolution of surveillance capabilities in computing devices
  • Examples of malware used by malicious actors to gain access to cameras and microphones
  • “Webcam Gate” and creepy gaming surveillance technology
  • Strategies on how to mitigate mass camera-based surveillance

Podcast details:

Length: 26:59 minutes. Format: MP3. Rating: G for all audiences.

You can download the paper here: http://icitech.org/icit-analysis-america-exposed-whos-watching-you-through-your-computers-camera/