Artwork

Contenuto fornito da Jason Clause. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Jason Clause o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !

Cyber Security Training for your team in less than 10 minutes

 
Condividi
 

Serie archiviate ("Feed non attivo" status)

When? This feed was archived on August 21, 2023 05:24 (8M ago). Last successful fetch was on July 20, 2020 08:04 (4y ago)

Why? Feed non attivo status. I nostri server non sono riusciti a recuperare un feed valido per un periodo prolungato.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 219507642 series 1021863
Contenuto fornito da Jason Clause. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Jason Clause o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

Cyber security training can get a little redundant and a little boring, but it’s also absolutely vital.


It think it’s understandable to be a little weary of cyber security training. But repetition and constant vigilance are some of the best tools to use if we want to help our team side step the plethora of attacks and scams that they encounter every day. To stay cyber safe, our team needs to get it right every time. An attacker only needs to get lucky once. Fortunately for some, a quick refresh is all that’s required to keep the bad guys at bay.

Need to do more in depth cyber security training with your team? I’d be happy to deliver if for free!

Learn More

In this episode we quickly cover the broad cyber security training buckets including:

  • Passwords
  • 2 Factor Authentication
  • Mobile safety and hygiene
  • Phishing awareness
  • Physical safety awareness like shoulder surfing

Jason Clause:

Welcome to the Jason Clause Show. I’m Jason Clause, your host, and today, we’re talking about cybersecurity. All right, all right. Welcome, everybody. My name’s Jason Clause. This is the Jason Clause Show. This is a podcast dedicated to busy Bay Area managers and leaders. My experience is that people that I’ve come in contact with in my years of doing business here is that the best leaders out there, the best managers that I run into, they’re idea collectors. They are always on the lookout for great ways to build culture, to lead their team, to leverage technology in interesting ways to compete or get more accomplished. That’s what this show’s dedicated to. It’s about trying to find those ideas and share those ideas with a growing community of like-minded leaders here in the Bay Area.

Jason Clause:

Got a great show for us today. It’s not really a re-tread. I mean, we talk about cybersecurity a lot, and that’s kind of the point. It’s one of those points that we just need to keep going over and over again. This episode is really something that I hope you can share with your team members. It’s just a refresher. What are some of the best things to be doing to keep yourself cyber safe and raise that IQ or that cybersecurity acumen for our teams so that we’re just doing the right things day in and day out. We’ll get into it right after this.

Jason Clause:

The Jason Clause Show is brought to you by Endsight. I’m going to take a minute and read a five-star review that we recently got from Caroline, and I quote. “The Endsight team is always prompt, courteous, and patient, and always gets to the root of the problem. I never feel rushed or foolish and always have confidence that the problem will be solved.” Caroline, thanks for sharing that. It makes me feel real good, and I know it makes the team feel good, too. But you know, it begs the question, if you’re not one of Endsight’s clients and you can’t say something like that about your current provider, we should talk. I encourage you to head over to www.endsight.net. Look around. See why more than 250 companies in the Bay Area trust us to deliver a phenomenal experience as it relates to their computer systems.

Jason Clause:

All right, welcome back from the break. Like I said, this is a cybersecurity 101 end user training in tight packet form. We’re going to try to just power through this. The idea is to put together a few ideas that you can very quickly share with your team and just say, “Hey, this is a great kind of reminder. Just give it a listen and move on.” I’m going to start with just why. We all know that there’s tons of threats out there, and I’m just going to start through the bullet points. There’s malware, spyware, adware. There’s phishing schemes, data theft, trojan viruses, password hacking, vulnerability scanners, packet sniffers, and that’s not even the worst one. The one that has zapped so many companies I’ve talked to has been the ransomware and the ransomware variations. These are all almost entirely avoidable with good end user cybersecurity hygiene.

Jason Clause:

I know that seems like an oversimplification, and it really is, because we’re human beings and we all make mistakes. All the technology in the world … And if you’re working with a provider or you have a team that’s looking after this, they’re doing things like patch management, policy enforcement, DNS filtering, encryption, antivirus, spam filtering, doing your backups. They’re providing reactive support with a security posture in mind. They’re doing long-term planning and strategy, all aimed at trying to move you to an architecture and a policy and process that is cyber safe. All of that isn’t enough. The biggest threat is the people that are using our machines, the team members. It’s completely understandable, and it kind of comes down to this really simple idea.

Jason Clause:

Think of somebody that you admire. Nelson Mandela is a wonderful example of this. If Nelson Mandela walked into your office with a glass of water, you’d probably drink it. Now, have some guy that looks like he’s a potential stalker walking into your office. You’re probably not going to accept the water. My point here is that we use context. In neither example did either … It’s highly unlikely that any of us gave any thought to the glass of water. We used context to try to decide whether that was something that we should partake of. A lot of the socially engineered attacks take advantage of this principle, and it’s just something to think about. This fundamentally is why it’s important to continually do cybersecurity training.

Jason Clause:

So we’re going to go into it, the usual suspects, things to pay attention to. Password security. Use strong passwords. I’m including a link in this episode. It links to a video that Endsight did a long time ago about creating strong passwords. When possible, use a second factor. We use a second factor at Endsight. It is a pain, but it’s also vital to securing the network. So passwords, number one. Email security. Don’t respond to emails from strangers. It doesn’t make good sense. When in doubt, pick up the phone. Only open attachments that you know are safe and that you’ve scanned first. Don’t click on links that you shouldn’t click on. This is the number one way that these ransomware attacks get launched. They’re socially engineered attacks. I do an episode on CEO fraud. I’ll include a link to that, as well. I’d encourage you to listen to that. Then, make sure you’re doing good backups on your email.

Jason Clause:

Your smartphone. Use a lock screen, right? Most of us are going to have that anyway. If you’re accessing corporate email on your smartphone, it requires it, but make sure that the system’s locked. Don’t ever let anybody borrow your smartphone. Don’t respond to texts from strangers or texts that you don’t recognize. Don’t answer calls. That’s the beauty of voicemail. Make sure you’re backing everything up. Google, Apple, Windows, they do a great job of making that easy. It’s just about configuring things.

Jason Clause:

On your workstations, on your laptops and on your desktops, make sure you’ve got an active antivirus suite. Now, if you’ve got a good provider, like Endsight’s clients, for example, this is something they don’t need to worry about. We’re doing that for them. Make sure that you’re updating your software and keeping those systems operating properly. When you get up and walk away, lock your machine. It’s really easy to do. Don’t share your system with anybody else. The recurring theme, let’s make sure we back up our data. Make sure that we’re saving our files on file shares that we know are being backed up at a corporate level.

Jason Clause:

On the security side, if you’re out and about, don’t connect to Wi-Fi environments that you don’t own. If you’re doing that, you’re putting yourself at risk. When you’re browsing on the Internet, make sure that you’re using SSL. That stands for Secure Socket Layer. In fact, most browsers now will make sure they’re giving you all kinds of warnings if you’re not. We’ve written a great article and given some good guidance on that on the Endsight blog. I’ll make sure to include a link to that for you. Make sure you’re always turning your firewall on. A lot of people don’t know that their individual devices have firewalls. Make sure that that’s configured and set up. Another thing that you can do is make sure that you’re encrypting data on the hard drives. Those are all things to be aware of, and you can either be doing that yourself, or you can be working with your provider to do that.

Jason Clause:

Unwise to be talking to strange people online. That’s just good advice that your mama should have been giving you. My mama gave it to me. I do my best to try to put it into practice. Don’t give out data on phone calls to people that you don’t know. Again, that’s a key way that CEO fraud is committed. Watch your back, literally. There’s such a thing as should surfing if you’re in a coffee shop or in the library or something like that. Just be aware of what’s going on. Kind of going back to the context example that I gave, too, at the beginning. Everyone you meet is a stranger until they prove themselves otherwise, and you should be examining and be skeptical of the things that you receive.

Jason Clause:

All right, just some real, quick, rapid-fire examples. I’ve got a slide deck. I’m going to include that in the show notes, as well. We’ll include a link to it up on LinkedIn, and you can get that there. Also, if you’re listening to this and you’re thinking, you know, what I could really benefit from is having somebody kind of do a deeper dive training with my team, I am happy to deliver that type of training for you. I’d be happy to do it free of charge. It’s important, to me, that over time, I contribute to raising the cybersecurity sort of fluency of this community here in the Bay Area. If you’re like me and feel like training is a great way to contribute to that, I am happy to deliver that for you in a half hour or 45 minute format for you.

Jason Clause:

All right, we’ve gotten to the end, so thank you for listening. Next episode, I don’t know what it’s going to be about just yet. I’ve got a handful of topics that I’m working on, but I’m not ready to telegraph what it’s going to be, but I hope you’ll listen. I hope you’ll tune in and listen. Until next time, I hope my good friend Jesus blesses you with peace in your heart, wisdom in your spirit, and more than your fair share of laughter in your belly, because we all need that. You take care now.

The post Cyber Security Training for your team in less than 10 minutes appeared first on Jason Clause | Microsoft 365 Consultant.

  continue reading

29 episodi

Artwork
iconCondividi
 

Serie archiviate ("Feed non attivo" status)

When? This feed was archived on August 21, 2023 05:24 (8M ago). Last successful fetch was on July 20, 2020 08:04 (4y ago)

Why? Feed non attivo status. I nostri server non sono riusciti a recuperare un feed valido per un periodo prolungato.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 219507642 series 1021863
Contenuto fornito da Jason Clause. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Jason Clause o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

Cyber security training can get a little redundant and a little boring, but it’s also absolutely vital.


It think it’s understandable to be a little weary of cyber security training. But repetition and constant vigilance are some of the best tools to use if we want to help our team side step the plethora of attacks and scams that they encounter every day. To stay cyber safe, our team needs to get it right every time. An attacker only needs to get lucky once. Fortunately for some, a quick refresh is all that’s required to keep the bad guys at bay.

Need to do more in depth cyber security training with your team? I’d be happy to deliver if for free!

Learn More

In this episode we quickly cover the broad cyber security training buckets including:

  • Passwords
  • 2 Factor Authentication
  • Mobile safety and hygiene
  • Phishing awareness
  • Physical safety awareness like shoulder surfing

Jason Clause:

Welcome to the Jason Clause Show. I’m Jason Clause, your host, and today, we’re talking about cybersecurity. All right, all right. Welcome, everybody. My name’s Jason Clause. This is the Jason Clause Show. This is a podcast dedicated to busy Bay Area managers and leaders. My experience is that people that I’ve come in contact with in my years of doing business here is that the best leaders out there, the best managers that I run into, they’re idea collectors. They are always on the lookout for great ways to build culture, to lead their team, to leverage technology in interesting ways to compete or get more accomplished. That’s what this show’s dedicated to. It’s about trying to find those ideas and share those ideas with a growing community of like-minded leaders here in the Bay Area.

Jason Clause:

Got a great show for us today. It’s not really a re-tread. I mean, we talk about cybersecurity a lot, and that’s kind of the point. It’s one of those points that we just need to keep going over and over again. This episode is really something that I hope you can share with your team members. It’s just a refresher. What are some of the best things to be doing to keep yourself cyber safe and raise that IQ or that cybersecurity acumen for our teams so that we’re just doing the right things day in and day out. We’ll get into it right after this.

Jason Clause:

The Jason Clause Show is brought to you by Endsight. I’m going to take a minute and read a five-star review that we recently got from Caroline, and I quote. “The Endsight team is always prompt, courteous, and patient, and always gets to the root of the problem. I never feel rushed or foolish and always have confidence that the problem will be solved.” Caroline, thanks for sharing that. It makes me feel real good, and I know it makes the team feel good, too. But you know, it begs the question, if you’re not one of Endsight’s clients and you can’t say something like that about your current provider, we should talk. I encourage you to head over to www.endsight.net. Look around. See why more than 250 companies in the Bay Area trust us to deliver a phenomenal experience as it relates to their computer systems.

Jason Clause:

All right, welcome back from the break. Like I said, this is a cybersecurity 101 end user training in tight packet form. We’re going to try to just power through this. The idea is to put together a few ideas that you can very quickly share with your team and just say, “Hey, this is a great kind of reminder. Just give it a listen and move on.” I’m going to start with just why. We all know that there’s tons of threats out there, and I’m just going to start through the bullet points. There’s malware, spyware, adware. There’s phishing schemes, data theft, trojan viruses, password hacking, vulnerability scanners, packet sniffers, and that’s not even the worst one. The one that has zapped so many companies I’ve talked to has been the ransomware and the ransomware variations. These are all almost entirely avoidable with good end user cybersecurity hygiene.

Jason Clause:

I know that seems like an oversimplification, and it really is, because we’re human beings and we all make mistakes. All the technology in the world … And if you’re working with a provider or you have a team that’s looking after this, they’re doing things like patch management, policy enforcement, DNS filtering, encryption, antivirus, spam filtering, doing your backups. They’re providing reactive support with a security posture in mind. They’re doing long-term planning and strategy, all aimed at trying to move you to an architecture and a policy and process that is cyber safe. All of that isn’t enough. The biggest threat is the people that are using our machines, the team members. It’s completely understandable, and it kind of comes down to this really simple idea.

Jason Clause:

Think of somebody that you admire. Nelson Mandela is a wonderful example of this. If Nelson Mandela walked into your office with a glass of water, you’d probably drink it. Now, have some guy that looks like he’s a potential stalker walking into your office. You’re probably not going to accept the water. My point here is that we use context. In neither example did either … It’s highly unlikely that any of us gave any thought to the glass of water. We used context to try to decide whether that was something that we should partake of. A lot of the socially engineered attacks take advantage of this principle, and it’s just something to think about. This fundamentally is why it’s important to continually do cybersecurity training.

Jason Clause:

So we’re going to go into it, the usual suspects, things to pay attention to. Password security. Use strong passwords. I’m including a link in this episode. It links to a video that Endsight did a long time ago about creating strong passwords. When possible, use a second factor. We use a second factor at Endsight. It is a pain, but it’s also vital to securing the network. So passwords, number one. Email security. Don’t respond to emails from strangers. It doesn’t make good sense. When in doubt, pick up the phone. Only open attachments that you know are safe and that you’ve scanned first. Don’t click on links that you shouldn’t click on. This is the number one way that these ransomware attacks get launched. They’re socially engineered attacks. I do an episode on CEO fraud. I’ll include a link to that, as well. I’d encourage you to listen to that. Then, make sure you’re doing good backups on your email.

Jason Clause:

Your smartphone. Use a lock screen, right? Most of us are going to have that anyway. If you’re accessing corporate email on your smartphone, it requires it, but make sure that the system’s locked. Don’t ever let anybody borrow your smartphone. Don’t respond to texts from strangers or texts that you don’t recognize. Don’t answer calls. That’s the beauty of voicemail. Make sure you’re backing everything up. Google, Apple, Windows, they do a great job of making that easy. It’s just about configuring things.

Jason Clause:

On your workstations, on your laptops and on your desktops, make sure you’ve got an active antivirus suite. Now, if you’ve got a good provider, like Endsight’s clients, for example, this is something they don’t need to worry about. We’re doing that for them. Make sure that you’re updating your software and keeping those systems operating properly. When you get up and walk away, lock your machine. It’s really easy to do. Don’t share your system with anybody else. The recurring theme, let’s make sure we back up our data. Make sure that we’re saving our files on file shares that we know are being backed up at a corporate level.

Jason Clause:

On the security side, if you’re out and about, don’t connect to Wi-Fi environments that you don’t own. If you’re doing that, you’re putting yourself at risk. When you’re browsing on the Internet, make sure that you’re using SSL. That stands for Secure Socket Layer. In fact, most browsers now will make sure they’re giving you all kinds of warnings if you’re not. We’ve written a great article and given some good guidance on that on the Endsight blog. I’ll make sure to include a link to that for you. Make sure you’re always turning your firewall on. A lot of people don’t know that their individual devices have firewalls. Make sure that that’s configured and set up. Another thing that you can do is make sure that you’re encrypting data on the hard drives. Those are all things to be aware of, and you can either be doing that yourself, or you can be working with your provider to do that.

Jason Clause:

Unwise to be talking to strange people online. That’s just good advice that your mama should have been giving you. My mama gave it to me. I do my best to try to put it into practice. Don’t give out data on phone calls to people that you don’t know. Again, that’s a key way that CEO fraud is committed. Watch your back, literally. There’s such a thing as should surfing if you’re in a coffee shop or in the library or something like that. Just be aware of what’s going on. Kind of going back to the context example that I gave, too, at the beginning. Everyone you meet is a stranger until they prove themselves otherwise, and you should be examining and be skeptical of the things that you receive.

Jason Clause:

All right, just some real, quick, rapid-fire examples. I’ve got a slide deck. I’m going to include that in the show notes, as well. We’ll include a link to it up on LinkedIn, and you can get that there. Also, if you’re listening to this and you’re thinking, you know, what I could really benefit from is having somebody kind of do a deeper dive training with my team, I am happy to deliver that type of training for you. I’d be happy to do it free of charge. It’s important, to me, that over time, I contribute to raising the cybersecurity sort of fluency of this community here in the Bay Area. If you’re like me and feel like training is a great way to contribute to that, I am happy to deliver that for you in a half hour or 45 minute format for you.

Jason Clause:

All right, we’ve gotten to the end, so thank you for listening. Next episode, I don’t know what it’s going to be about just yet. I’ve got a handful of topics that I’m working on, but I’m not ready to telegraph what it’s going to be, but I hope you’ll listen. I hope you’ll tune in and listen. Until next time, I hope my good friend Jesus blesses you with peace in your heart, wisdom in your spirit, and more than your fair share of laughter in your belly, because we all need that. You take care now.

The post Cyber Security Training for your team in less than 10 minutes appeared first on Jason Clause | Microsoft 365 Consultant.

  continue reading

29 episodi

ทุกตอน

×
 
Loading …

Benvenuto su Player FM!

Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.

 

Guida rapida