Heidi Shadid of the Eller & Detrich Law Firm and I sat down for an interview that covered several aspects of Cybersecurity Law. We discussed how to engage her firm, what to do after a hack or breach, and what your responsibilities are for reporting a breach. Ms. Shadid is an Attorney with the Eller & Detrich Law Firm in Tulsa, Oklahoma and includes Cybersecurity Law in her practice.
Her practice encompasses the following specialties:
Preston and I had the opportunity to speak with Proofpoint‘s Vice President of Digital Risk on the hot topic of social media security. I say it’s a hot topic because it’s a hot topic for me because I’m not really a fan of most social media sites. I generally only use LinkedIn and Twitter. But there’s more to social media than Facebook, Twitter, and LinkedIn. There’s Instagram, Snapchat, and others. And security for all them is a big concern–or should be. In this podcast, we discuss the problems with social media security and some possible solutions.
Listen in and tell us what you think.
Length: 19:59 minutes. Format: MP3. Rating: G for all audiences.
Preston and I took a few minutes to recap the year so far in cybersecurity and to catch you up on what’s going on with breaches, security tips, and ransomware. We have a lengthy (for us) conversation that covers all things cybersecurity for the first half of 2017 and all that it had to offer. I want you to pay particular attention to my five rules concerning ransomware. Please take this advice as wisdom from not only Preston and myself but from other cybersecurity professionals as well.
Length: 33:56 minutes. Format: MP3. Rating: G for all audiences.
Preston and I interviewed Ryan Benson, Senior Threat Researcher at Exabeam about Security Information and Event Management (SIEM) software. We discussed what SIEM software is, what it does for a company, how it protects your network, and how to evaluate a SIEM suite.
Preston and I also agree that a SIEM suite should offer more than simple log aggregation and log scraping. There are less expensive and less cumbersome tools that can handle that functionality if that’s all you need. We also agree that SIEM companies need to bake some intelligence into their products that allow them to be automated, to respond automatically to threats, and to include advanced analytics so that you can optionally find out what’s going on and going wrong on your network.
Ryan gives us some insight into what’s going on in SIEM software and why you should care. Before you purchase a SIEM solution, take his advice offered in the podcast.
Length: 22:35 minutes. Format: MP3. Rating: G for all audiences.
Preston and I interviewed Senior Fellow, James Scott from the Institute for Critical Infrastructure Technology about the serious threat to individuals from their webcams. You might think that because your camera is in your house and turned off that your safe from prying eyes, but you’re not. James gives us some insight as to what the problem is and how to solve it.
The unsecured cameras on PCs and mobile devices pose a serious threat to the private sector, to individual users, and to national security. No other exploit is as vicious or expedient with its results as camera activation malware which can be used by malicious threat actors to surveil and spy on unsuspecting users.
In our most recent publication, entitled “America Exposed: Who’s Watching You Through Your Computer’s Camera?”, ICIT provides an in-depth analysis of this underreported threat by discussing:
The evolution of surveillance capabilities in computing devices
Examples of malware used by malicious actors to gain access to cameras and microphones
“Webcam Gate” and creepy gaming surveillance technology
Strategies on how to mitigate mass camera-based surveillance
Length: 26:59 minutes. Format: MP3. Rating: G for all audiences.
The old saying goes, “Give a man a fish and he feasts for a day; teach him to phish and he becomes a rich cybercriminal who retires at 30.” OK, so maybe it doesn’t go exactly like that, but I think you get the idea that phishing is bad for the majority of us who aren’t making a profit from other people’s pains. Phishing is the act of sending out email messages that look legitimate but whose only purpose is to get your banking, credit card, social media, or other online credentials in order to steal money from you.
Markus Jakobssen, a researcher at Agari, gives us his perspective on this trend that can cost larger companies millions of dollars. Markus tells us why phishing scams are so successful and what we can do to protect ourselves from this criminal trespass into our personal accounts and online identities. If you’ve been the victim of a phishing attack, you know how expensive it can be in trying to repair the damage that a single email message can have. Listen carefully to the podcast to find out what you can do to fight against this growing threat.
Length: 17:54 minutes. Format: MP3. Rating: G for all audiences.
If you have an idea for a podcast or someone who’d like to be on the show, use the Contact Form and we’ll be glad to discuss.
Preston and I visited our favorite Tuesday landing for this May overview where we briefly discuss what to do after you discover a breach, a compromise, a hack, or a ransomware infection on your network. My advice is “Don’t Panic.” Preston has more, and probably better, advice. One of the things you need to do is know what’s on your network, know what’s supposed to be on your network, and to establish a security baseline.
A security baseline is a starting point from which you will judge your systems from now on. Scan everything with anti-malware scanners. Clean up any infections. Plug security holes. Update your systems. And that is your baseline–a clean, uninfected, uncompromised network. It will be easier in the future to discover breaches if you know what’s going on now and keep track along the way. This short podcast is a topic of a longer, more in-depth future podcast.
Length: 6:42. Format: MP3. Rating: G for all audiences.
All podcasts are Safe for Work and school and are licensed CC BY.