Who's In Your Cloud?-logo

Who's In Your Cloud?

Technology Podcasts

Welcome to "Who's In Your Cloud?" – 23 vlog & podcast episodes created to simplify complex conversations about cybersecurity. Join us on the road to secure, reliable, trusted technology through a comprehensive look at the #TOPcyber21. (21) vital...

Location:

United States

Description:

Welcome to "Who's In Your Cloud?" – 23 vlog & podcast episodes created to simplify complex conversations about cybersecurity. Join us on the road to secure, reliable, trusted technology through a comprehensive look at the #TOPcyber21. (21) vital tools, best security practices, and products purpose-built to help organizations of any size establish end-to-end cybersecurity from the office to the cloud and beyond.

Language:

English


Episodes
Ask host to enable sharing for playback control

Episode 21: Cyber Risk Insurance

7/19/2022
Welcome back to “Who’s In Your Cloud?” – 21 steps to secure, reliable, trusted technology. Brought to you by TechOnPurpose, this is Episode 21: Cyber Risk Insurance. Last week, we discussed TOPcyber21 best practice number 20, Compliance Management and Reporting. Catch up on episode 20 to learn how this cyber element will help simplify the task of tracking and reporting variances or shortcomings in internal or third-party vendor compliance requirements so that you can focus on doing what you do best! In today’s episode, join us for our final TOPcyber21 best security practice, Cyber Risk Insurance. We’ll be rounding out our 21 best practices by sharing how cyber risk insurance minimizes the cost of breach recovery and helps defend your organization from damages/legal liability associated with a data breach, giving your organization added peace of mind. Stick around to learn from our cast of cyber experts about the “do’s, don’ts, and gotchas” of cyber risk insurance and the available solutions these organizations recommend to make sure your cybersecurity is secure, reliable, trusted, and INSURED. We’re very thankful to our cyber expert cast joining us today from ConnectWise, RCS Secure, and RT Specialty as they help us educate our clients and prospects on the road to #secure, reliable, trusted technology. Join us next time on “Who’s In Your Cloud?” for our finale episode, where we will be joined by fan-favorite expert cast members, to recap the entire WIYC journey and even share some behind-the-scenes bloopers you won’t want to miss. To our clients and audience, we hope you have found this an immersive, hopefully simple, educational, and enjoyable experience! To catch up on our “Who’s In Your Cloud?” series, we’ve diversified your access options to all (23) episodes. You can revisit any episode here on our blog or connect with us by any of the following methods: Email Newsletter:techonpurpose.net/blogherehereherehere Buckle up – it’s time to hit the road to #secure, reliable, trusted technology! Lauren Lev What’s up you guys, I’m Lauren Lev, Marketing Manager for TechOnPurpose and the very entertaining, very witty and very humble host of this vlog series, “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. As a reminder, visit WhosInYour.Cloud to sign up for our free cybersecurity risk assessment, because you can’t know where you’re going on your cybersecurity journey unless you know where you’re at. As we round out this 22 episode vlog series, make sure to binge watch all of our episodes on LinkedIn, Facebook, YouTube, and Spotify, and make sure to subscribe and hit that like button down below. Alright, we’ve made it to the final step on the road to secure, reliable, trusted technology and while things like complex passwords, dark web monitoring and backups significantly fortify your business against cyber attacks, cyber risk insurance picks up the slack. Today we’re discussing TOP’s cyber best security practice number 21, cyber risk insurance, for added peace of mind to minimize the cost of breach recovery and help defend your organization from damages and even legal liability associated with a data breach. In today’s episode, our cast will break down the “do’s, don’ts and gotchas” of cyber risk insurance and will share solutions these organizations recommend to make sure your cybersecurity is secure, reliable, trusted and insured. First up, we have Whitney Tabash, Assistant VP at RT Specialty. Whitney, introduce yourself and tell us a little bit more about your background. Whitney Tabash As Lauren said, I’m Whitney Tabash with RT Specialty, which is the largest wholesale insurance brokerage in the United States. I’ve spent the last 10 years focused on cyber liability insurance, the ins and outs, and I couldn’t be more enthusiastic about the product and how it can help better protect businesses like yours. Lauren Lev We are always happy to have another girl on the blog, so glad you could help us...

Duration:00:47:26

Ask host to enable sharing for playback control

Episode 20: Compliance Management & Reporting

7/6/2022
Welcome back to “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. Brought to you by TechOnPurpose, this is Episode 20: Compliance Management & Reporting. Last week, we discussed TOPcyber21 best practice number 19, Compliance Discovery and Documentation. Catch up on episode 19 to find out how to maintain essential certifications and respond to normal and unplanned cycles of compliance reporting and potential litigation matters through the use of compliance discovery and documentation. In today’s episode, we will be discussing last week’s not so distant relative, Compliance Management and Reporting. Here in episode 20, learn how how this cyber element will help simplify the task of tracking and reporting variances or shortcomings in internal or third-party vendor compliance requirements, so that you can focus on doing what you do best. Stick around to learn from our cast of cyber experts about the crucial need for compliance management and reporting as well as their available solutions that ensure your business remains compliant and secure. We’re very thankful to our cyber expert cast joining us today from ConnectWise, JumpCloud, Keeper, and Stellar Cyber as they help us educate our clients and prospects on the road to #secure, reliable, trusted technology! As a reminder, we began releasing a new episode every Tuesday, starting 10/20/21, and will continue to do so through early summer of 2022, with brief time off for holidays with family and friends. We’ll also follow each Tuesday episode release with subsequent Wednesday, Thursday, and Friday posts highlighting our (3) contributing solution partners from that week’s episode. We hope you’ll find this an immersive, hopefully simple, educational, and enjoyable experience. So how do you tune in? To easily follow the journey ahead, we’ve diversified your access options to all (23) of our coming episodes. You can follow along here on our blog or by any of the following methods: Email Newsletter:techonpurpose.net/blogherehereherehere Buckle up – it’s time to hit the road to #secure, reliable, trusted technology! Lauren Lev Welcome back, you guys. I’m Lauren Lev, Marketing Manager for TechOnPurpose and the host of this soon to be critically acclaimed vlog series, “Who’s in Your Cloud?” 21 steps to secure, reliable, trusted technology. Before we go any further, hit that like and subscribe button down below. It really helps us out. And we’ll help you out by giving you a free cybersecurity risk assessment, which you can sign up for at whosinyour.cloud, because you can’t know where you’re going on your cybersecurity journey if you don’t know where you’re at. Okay, so pause right here. No really, like pause the video, press the down below and go sign up, whosinyour.cloud. Super simple. We’ll wait for you. We’ll be right here. Alright guys, welcome back again. Today we’re moving on to top cybersecurity best practice number 20, compliance management and reporting. The not so distant cousin of last week’s topic, compliance discovery and documentation. So now that you’ve done your research and documented all the things, now you have to track and report your data while ensuring you’re following your industry’s compliance requirements. Well, what I don’t know is the answer to that question. What I do know is that I’ve brought along this team of sassy and savvy cyber experts to answer that question for me. So joining us back on the vlog, we have Frank DePrisco, Director and Head of Cybersecurity Task Force at ConnectWise. Frank, that is a mouthful, but congratulations on your new title. I feel like we’re below your pay grade now, so thanks for coming back. Frank DePrisco No, so I was part of the IT Nation Team, and we created the secure group last year. We’re made up of cybersecurity experts and every one of us has over 20 years of experience. And our goal was to put together training and education for our partners around cybersecurity, because we saw there is a lack...

Duration:00:46:14

Ask host to enable sharing for playback control

Episode 19: Compliance Discovery & Documentation

6/13/2022
Welcome back to “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. Brought to you by TechOnPurpose, this is Episode 19: Compliance Discovery & Documentation. Last week, we discussed TOPcyber21 best practice number 18, Network Vulnerability and Pen Testing. Catch up on episode 18 to learn how to quickly discover your network’s weak spots, allowing your IT team (like TechOnPurpose) the opportunity to fortify your cybersecurity and mitigate costly and destructive cyber risks. In today’s episode, we will be breaking down our TOP cybersecurity best practice number 19, Compliance Discovery and Documentation. Here in episode 19, we’ll share how this cyber element is mission-critical for ensuring you have needed backing to maintain essential certifications and respond to normal and unplanned cycles of compliance reporting and potential litigation matters. Stick around to learn from our cast of cyber experts about the crucial need for compliance, discovery, and documentation, as well as their available solutions that ensure your business remains compliant and secure. We’re very thankful to our cyber expert cast joining us today from Cyber Trust Alliance and Intelisys as they help us educate our clients and prospects on the road to #secure, reliable, trusted technology! As a reminder, we began releasing a new episode every Tuesday, starting 10/20/21, and will continue to do so through early summer of 2022, with brief time off for holidays with family and friends. We’ll also follow each Tuesday episode release with subsequent Wednesday, Thursday, and Friday posts highlighting our (3) contributing solution partners from that week’s episode. We hope you’ll find this an immersive, hopefully simple, educational, and enjoyable experience. So how do you tune in? To easily follow the journey ahead, we’ve diversified your access options to all (23) of our coming episodes. You can follow along here on our blog or by any of the following methods: Email Newsletter:techonpurpose.net/blogherehereherehere Buckle up – it’s time to hit the road to #secure, reliable, trusted technology! Lauren Lev Welcome back to “Who’s In Your Cloud?” TechOnPurpose’s vlog series where we explore the 21 steps to secure, reliable, trusted technology. I’m Lauren Lev, Marketing Manager for TechOnPurpose and if you’ve been keeping up with the series, you should know that I am the host of this vlog series and that you can check out every episode on LinkedIn, Facebook, YouTube, and Spotify. Visit WhosInYour.Cloud to sign up for our free cybersecurity risk assessment, and make sure to subscribe and hit that like button down below. In today’s episode, we’ll be breaking down our TOP cybersecurity best practice number 19: Compliance Discovery and Documentation. We’ll be discussing what exactly this entails, and our cast of cyber experts will be telling you what services their companies provide to make sure your cybersecurity is secure, reliable, trusted and compliant. We have a familiar face back on the vlog today. We have from CyberTrust Alliance, Senior Information Security Officer, Jeremy Sadler. Jeremy, it’s been a while since we’ve seen that beautiful face of yours, so remind the audience who you are and what you do. Jeremy Sadler Thanks a lot, Lauren. Great to be back. Again, really appreciate everything you guys do. CyberTrust Alliance specializes in health care, but several other industries as well assisting in enterprise risk management and risk assessments, including various compliance industries. An Information Security Officer role just means I’m the auditor and the guy that you see on a regular basis helping your business stay in compliance. Lauren Lev All right, and new to the vlog we have James Morrison, the National Security Specialist and Cyber Evangelist at Intelisys. Fun fact is that James is former FBI, so I’m hoping that he’ll spill a little top secret information somewhere along the vlog. James, give a little bit more about your...

Duration:00:41:54

Ask host to enable sharing for playback control

Episode 18: Network Vulnerability & Pen Testing

6/7/2022
Welcome back to “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. Brought to you by TechOnPurpose, this is Episode 18: Network Vulnerability & Penetration Testing. In our last episode, we broke down Managed Detection and Response (MDR), explaining the important role it plays in rapidly identifying and limiting the impact of cyber threats on your business. Look back at Episode 17 to find out how this cybersecurity service does the threat hunting, monitoring, and responding to malicious activity in your business, so that you can focus on what’s important! Now, today’s episode is all about network vulnerability and pen testing. How do you know where you’re going if you don’t know where you are? Exploring vulnerabilities and simulating attacks in your networks through pen testing can help you answer these very important questions. Here in episode 18, learn how pen testing allows you to quickly discover your network’s weak spots, allowing your IT team (like TechOnPurpose) the opportunity to fortify your cybersecurity and mitigate costly and destructive cyber risks. Also, hear from our cyber expert cast about their available solutions and the benefits of evaluating your network security with pen testing. We’re very thankful to our partners joining us today from Cobalt, Netrix, and RCS Secure, as they help us educate our clients and prospects on the road to #secure, reliable, trusted technology! As a reminder, we began releasing a new episode every Tuesday, starting 10/20/21, and will continue to do so through late spring of 2022, with brief time off for holidays with family and friends. We’ll also follow each Tuesday episode release with subsequent Wednesday, Thursday, and Friday posts highlighting our (3) contributing solution partners from that week’s episode. We hope you’ll find this an immersive, hopefully simple, educational, and enjoyable experience. So how do you tune in? To easily follow the journey ahead, we’ve diversified your access options to all (23) of our coming episodes. You can follow along here on our blog or by any of the following methods: Email Newsletter:techonpurpose.net/blogherehereherehere Buckle up – it’s time to hit the road to #secure, reliable, trusted technology! Lauren Lev Welcome back to “Who’s In Your Cloud?” TechOnPurpose’s vlog series where we explore the 21 steps to secure, reliable and trusted technology. I’m Lauren Lev, Marketing Manager for TechOnPurpose, but becoming increasingly more well known for my role as the host of this vlog series and well on my way to my Emmy nomination, if I do say so myself. If you’re joining us for the first time, we’re glad to have you back, but what have you been doing? You need to go check out our other episodes, and we’ve made it incredibly easy for you. You can view them on LinkedIn, Facebook, YouTube, or Spotify. And we are so generous, that we will deliver them straight to your inbox if you sign up at TechOnPurpose.net/blog. The most important thing you could do for your company right now is sign up for our free cybersecurity risk assessment at WhosInYour.Cloud. All right, we’ve got the housekeeping out of the way. Today’s episode is all about network vulnerability and pen testing, which involves exploring vulnerabilities and simulating attacks in your networks, but why? This tool helps to rapidly identify your weak spots, affording your IT team like us here at TechOnPurpose, the opportunity to fortify your cybersecurity and mitigate costly and destructive cyber risk. The rest is above my pay-grade, so let’s introduce these folks who will be able to help us out a little bit more. First up is fan favorite, Ivan Paynter, who is now the CTO of RCS Secure. After a very long hiatus, we’re so happy to have you back. Ivan Paynter You know, it’s weird. I’ve never done a job shift in between a podcast, totally new ground. Man, great to be back really. I almost had to beg to be back like, “Have me back on the vlog, please!” Lauren Lev...

Duration:00:43:32

Ask host to enable sharing for playback control

Episode 16: Server Backups & BCDR

5/12/2022
Welcome back to “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. Brought to you by TechOnPurpose, this is Episode 16: Server Backups & BCDR. In our last episode, we focused on the importance of Remote Access Security in today’s growing remote-workforce world. With the help of our cast of cyber experts, we discussed how to safely work from anywhere – from any device. View Episode 15 to learn how to achieve secure remote access for your company without the burden of complexity. Now today’s episode is all about Server Backups and BCDR (Business Continuity & Disaster Recovery). Did you know, businesses lose around $8,500 per hour due to ransomware-induced downtime? (Palo Alto). Employing the right Business Continuity & Disaster Recovery strategy and tools will help to speed up the recovery time from days or weeks to just minutes or hours in the event of data loss or system outages. Stick around to learn from our cast of cyber experts about the critical need for Servers Backups and BCDR and their available solutions that ensure your business remains operational and secure. We’re very thankful to our cyber expert cast joining us today from Datto, Intelisys, and Opti9, as they help us educate our clients and prospects on the road to #secure, reliable, trusted technology! As a reminder, we began releasing a new episode every Tuesday, starting 10/20/21, and will continue to do so through late spring of 2022, with brief time off for holidays with family and friends. We’ll also follow each Tuesday episode release with subsequent Wednesday, Thursday, and Friday posts highlighting our (3) contributing solution partners from that week’s episode. We hope you’ll find this an immersive, hopefully simple, educational, and enjoyable experience. So how do you tune in? To easily follow the journey ahead, we’ve diversified your access options to all (23) of our coming episodes. You can follow along here on our blog or by any of the following methods: Email Newsletter:techonpurpose.net/blogherehereherehere Buckle up – it’s time to hit the road to #secure, reliable, trusted technology! Lauren Lev Hi, I’m Lauren Lev, Marketing Manager for TechOnPurpose and the host of this series: “Who’s In Your Cloud?” 21 steps to secure reliable, trusted technology, and this is Episode 16: Server Backups and BCDR. To see more of me and my cybercrime fighting partner, Matt Tankersley, check out all of our previous episodes on LinkedIn, Facebook, YouTube, or Spotify. And if you’re not already getting episodes delivered straight to your inbox, what are you waiting for? Sign up at TechOnPurpose.net/blog and sign up for our free cybersecurity risk assessment at WhosInYour.Cloud. Server backups and BCDR, let’s get into it. If you’re no cyber expert like me, the first question you’re probably asking yourself is what the heck is BCDR and why does this girl keep saying it like she knows what we’re talking about? Well, BCDR stands for business continuity and disaster recovery. See Matt, I’m capable of learning a thing or two around here. So it turns out server backups and BCDR tools and processes are operational imperatives to ensure simple, rapid, secure data and system restorations. There are countless ways to approach and discuss these topics. Starting with questions like, how long could your company afford to operate without access to critical data or systems should set the appropriate foundation for all that follows. Selecting and employing the right BCDR strategy, tools and processes are core to operational recovery in the event of data loss or system outages, and will help to speed up recovery time for days or weeks to even just minutes or hours. In today’s episode, our cast of cyber experts will shed a light on a thing or two about server backups and BCDR and what solutions are out there in the marketplace. So let’s meet our cast of sassy and savvy characters for today. Back with us again is VIP cast member Patrick Chen, Solutions...

Duration:00:43:03

Ask host to enable sharing for playback control

Episode 17: Managed Detection and Response

5/12/2022
Welcome back to “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. Brought to you by TechOnPurpose, this is Episode 17: Managed Detection and Response (MDR). In our last episode, we focused on the importance Server Backups and BCDR play in protecting and preserving your organization in the event of ransomware, downtime, data loss, or system outages. Catch up on Episode 16 to learn how to employ the right BCDR strategies for your specific business security and recovery needs! In today’s episode, we’re joined by our cast of cyber experts to discuss how the use of Managed Detection and Response (MDR) helps rapidly identify and limit the impact of threats WITHOUT the need for additional staffing. Stick around to find out how this cybersecurity service combines technology with human expertise to do the threat hunting, monitoring, and responding to malicious activity in your business, so that you can focus on what’s actually important. Also, hear from our cyber expert cast about their available MDR solutions and the vital necessity for these technologies in the risk detection and mitigation response. We’re very thankful to our partners joining us today from Intelisys, Privafy and Stellar Cyber, as they help us educate our clients and prospects on the road to #secure, reliable, trusted technology! As a reminder, we began releasing a new episode every Tuesday, starting 10/20/21, and will continue to do so through late spring of 2022, with brief time off for holidays with family and friends. We’ll also follow each Tuesday episode release with subsequent Wednesday, Thursday, and Friday posts highlighting our (3) contributing solution partners from that week’s episode. We hope you’ll find this an immersive, hopefully simple, educational, and enjoyable experience. So how do you tune in? To easily follow the journey ahead, we’ve diversified your access options to all (23) of our coming episodes. You can follow along here on our blog or by any of the following methods: Email Newsletter:techonpurpose.net/blogherehereherehere Buckle up – it’s time to hit the road to #secure, reliable, trusted technology! Lauren Lev Welcome back to TechOnPurposes, “Who’s In Your Cloud?” vlog series, where we cover the 21 steps to secure, reliable and trusted technology. Thanks for joining us for Episode 17, Managed Detection and Response or MDR. I’m Lauren Lev, Marketing Manager for TechOnPurpose and the always sassy and sometimes savvy host of this blog series. Catch up on all of our previous episodes on LinkedIn, Facebook, YouTube, or Spotify. And you can sign up for our free cybersecurity risk assessment at WhosInYour.Cloud. MDR- Let’s dive into it. So like I said, MDR stands for managed detection and response. It is a cybersecurity service that combines technology with human expertise to do the threat hunting, monitoring and responding to malicious activity in your business, so that you can focus on what’s actually important. So another great benefit of MDR is that it helps rapidly identify and limit the impact of threats without the need for additional staffing. Clearly, you shouldn’t just take my word for it, so that’s why I brought in this good looking cast of savvy cybersecurity specialists. So let’s meet my experts. Joining us for the first time on the vlog is Jamal Purvis, Solutions Engineer from Intelisys. We’ve had Intelisys on the vlog a couple of times, but Jamal is new to us. So introduce yourself and tell us a little bit more about what you do at Intelisys. Jamal Purvis Absolutely. Thank you, Lauren. So my name is Jamal Purvis and I am a Solutions Engineer for Intelisys. And to just kind of give you a little background about me, I started in kind of the physical security and networking environment. And one of the things that I was able to do was learn a lot about security. And it led me from the physical side over into the cyber side. So for the last year and a half or so I’ve actually been really studying up on...

Duration:00:41:19

Ask host to enable sharing for playback control

Russia’s Impact on Global Cybersecurity

3/16/2022
Welcome back to “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. I’m Lauren Lev, Marketing Manager for TechOnPurpose, and today we have a special episode for our viewers: Russia’s Impact on Global Cybersecurity. Looking back at our previous episode, we considered how the rise of BYOD in the workplace has created new opportunities for malicious actors to exploit your devices- and explained how to keep your environment safe with the use of Mobile Device Management. We were lucky to be joined by a cyber expert cast from Cisco, JumpCloud, and TBI as they provided us with their mobile device management and protection solutions. For today’s episode, we’ll be discussing the cybersecurity implications of the ongoing Russia/Ukraine conflict. Russia’s involvement in malicious cybersecurity events has been a hot and debated topic for many years, but how should we adjust our attention and priority to these nation-states’ cyber risk given the recent Russian invasion of Ukraine? Our cast of cyber experts from ConnectWise and Independent Cybersecurity Consultant, Jim Bowers are here to break down what we do and don’t know about the bad and the ugly of Russia’s growing impact on global cybersecurity and how to keep yourself cyber-safe. We’re thankful to our partners for joining the “Who’s In Your Cloud?” series as they help us educate our clients and prospects on the road to #secure, reliable, trusted technology As a reminder, we began releasing a new episode every Tuesday, starting 10/20/21, and will continue to do so through late spring of 2022, with brief time off for holidays with family and friends. We’ll also follow each Tuesday episode release with subsequent Wednesday, Thursday, and Friday posts highlighting our (3) contributing solution partners from that week’s episode. We hope you’ll find this an immersive, hopefully simple, educational and enjoyable experience. So how do you tune in? To easily follow the journey ahead, we’ve diversified your access options to all (23) of our coming episodes. You can follow along here on our blog or by any of the following methods: Email Newsletter:techonpurpose.net/blogherehereherehere Buckle up – it’s time to hit the road to #secure, reliable, trusted technology! Lauren Lev Welcome back to “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. I’m Lauren Lev, Marketing Manager for TechOnPurpose and I’m very excited for this “Who’s In Your Cloud?” special episode today to discuss the cybersecurity implications of the ongoing Russia/Ukraine conflict. Before we get into it, make sure to like and subscribe to our YouTube channel down below. It really helps us out. And while you’re here, check out our entire “Who’s In Your Cloud?” vlog series in our playlist above. We post episodes of this series every Tuesday on LinkedIn, Facebook, Spotify, and of course here on YouTube. And you can get episodes delivered straight to your inbox by signing up at TechOnPurpose.net/blog. From the boardroom to the water cooler, Russia’s involvement in malicious cybersecurity events has been a hot and debated topic for many years. But how should we adjust our attention and priority to these nation states cyber risk given the recent Russia invasion of Ukraine? The Russian government seems no stranger to malicious cyber activities with allegations including suppression of social and political activity to stealing intellectual property and harming regional and international adversaries. Today, our passionate, sassy and savvy cast of cyber experts are here to break down what we do and don’t know about the bad and the ugly of Russia’s growing impact on global cybersecurity. Alright, so first up, I will introduce author and independent cybersecurity contractor, Jim Bowers. Jim, give us the rundown. Why do you care about cybersecurity? Jim Bowers Hey, Lauren, first of all, thank you very much for being back. I love being on TechOnPurpose’s TOP21. It’s awesome to be here. So what...

Duration:00:45:57

Ask host to enable sharing for playback control

Episode 13: Network Security

3/16/2022
Welcome back to “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. I’m Lauren Lev, Marketing Manager for TechOnPurpose, and this is Episode 13: Network Security (Advanced Threat Protection) Last week, our viewers were treated to a special episode to discuss the cybersecurity implications of the ongoing Russia/Ukraine conflict. We were joined by an awesome cast of cyber experts who broke down what we do and don’t know about the bad and the ugly of Russia’s growing impact on global cybersecurity- and how to keep yourself cyber-safe amid these ongoing cyber threats. Today, as we take a greater look at TOPcyber21 best security practice number 13, we will be discussing all things Network Security. Here in Episode 13, find out why just a few minutes of downtime can cause widespread disruption and massive damage to an organization’s bottom line and reputation without the defense of advanced threat protection. We’ll also hear from our partners as they provide our audience with their available solutions to ensure protection against this ever-increasing threat. We’re very thankful to our cyber expert cast joining us today from Fortinet and Privafy, as well as Jim Bowers, Independent Cybersecurity Consultant, as they help us educate our clients and prospects on the road to #secure, reliable, trusted technology! As a reminder, we began releasing a new episode every Tuesday, starting 10/20/21 and will continue to do so through late spring of 2022, with brief time off for holidays with family and friends. We’ll also follow each Tuesday episode release with subsequent Wednesday, Thursday, and Friday posts highlighting our (3) contributing solution partners from that week’s episode. We hope you’ll find this an immersive, hopefully simple, educational, and enjoyable experience. So how do you tune in? To easily follow the journey ahead, we’ve diversified your access options to all (23) of our coming episodes. You can follow along here on our blog or by any of the following methods: Email Newsletter:techonpurpose.net/blogherehereherehere Buckle up – it’s time to hit the road to #secure, reliable, trusted technology! Lauren LevWelcome back to “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. I’m Lauren Lev, Marketing Manager for TechOnPurpose and thanks for coming back for Episode 13 on Network Security. Before we get into it, make sure to listen to all of our podcast episodes on Spotify and for our YouTubers out there, like and subscribe to our YouTube channel down below, it really helps us out. And while you’re here, check out our “Who’s In Your Cloud?” vlog series in our playlist above. We post episodes of this “Who’s In Your Cloud?” series every Tuesday on LinkedIn, Facebook, Spotify, and of course YouTube. And you can get episodes delivered straight to your inbox by signing up at TechOnPurpose.net/blog. Today’s network architecture is complex, every day we’re faced with a threat environment that is always changing and attackers that are always trying to find and exploit your vulnerabilities. These vulnerabilities are present across a broad number of areas including devices, data, applications, users and locations. When just a few minutes of downtime can cause widespread disruption and massive damage to an organization’s bottom line and reputation, it is essential that these protection measures are in place. Today we’ll be breaking it down for you and discussing solutions to this ever increasing threat. But without further ado, let me introduce our cyber experts for today. Back again, we have a very familiar face VIP All Star Jim Bowers, author and cyber enthusiast. Jim, give us a rundown. Who is Jim Bowers and why does he care about cybersecurity? Jim BowersOh, thank you, Lauren very much. I’m so glad to be back. I can’t tell you how much I love being on TechOnPurpose’s video blog here today. So I think security really drives me for where we are today. So I’m an Independent Security...

Duration:00:38:44

Ask host to enable sharing for playback control

Episode 15: Remote Access Security

2/21/2022
Welcome back to “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. I’m Lauren Lev, Marketing Manager for TechOnPurpose, and this is Episode 15: Remote Access Security Last week, we discussed Wireless Security, a core component of our remote workforce’s journey to connect and conduct business safely and securely. Our cast of cyber experts joined us to help our viewers learn about the need for protection from the growing threat of unauthorized users and malicious actors who seek to access and steal your sensitive data through your WiFi network connections. In today’s episode, we’re moving to the next link in the chain and diving deep into the topic of remote access security. We all want the simplicity of working anywhere – from any device, anytime. Few would argue that the pandemic has done a lot to rapidly push this desire to reality for industries and workforces globally. BUT, the big question on any security-conscious IT practitioner’s mind should be, “How do we secure access for our growing and diverse remote workforce – without the burden of complexity?” Stay tuned to hear from our partners about the “Do’s, Don’ts, and Gotchas” of secure remote access and their available solutions to ensure protection. We’re very thankful to our cyber expert cast joining us today from Cisco and ConnectWise, as well as Jim Bowers, Independent Cybersecurity Consultant, as they help us educate our clients and prospects on the road to #secure, reliable, trusted technology! As a reminder, we began releasing a new episode every Tuesday, starting 10/20/21 and will continue to do so through late spring of 2022, with brief time off for holidays with family and friends. We’ll also follow each Tuesday episode release with subsequent Wednesday, Thursday, and Friday posts highlighting our (3) contributing solution partners from that week’s episode. We hope you’ll find this an immersive, hopefully simple, educational, and enjoyable experience. So how do you tune in? To easily follow the journey ahead, we’ve diversified your access options to all (23) of our coming episodes. You can follow along here on our blog or by any of the following methods: Email Newsletter:techonpurpose.net/blogherehereherehere Buckle up – it’s time to hit the road to #secure, reliable, trusted technology! Lauren Lev I’m Lauren Lev, Marketing Manager for TechOnPurpose and host of this vlog series, “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology, and this is Episode 15: Secure Remote Access. To see more of me and my cyber-crime fighting partner, Matt Tankersley. Check out our previous 14 episodes on LinkedIn, Facebook, YouTube, or Spotify. And if you’re not already getting episodes delivered straight to your inbox, what are you waiting for? Sign up at TechOnPurpose.net/blog. So today’s episode, secure remote access- We all want the simplicity of working anywhere from any device at any time, and few would argue that the pandemic has done a lot to push this desire to a rapid reality for industries and workforces globally. I know getting productive out of the office on the couch has been a blessing and curse for all of us. But I must say I’m still a fan. So the big question on the security conscious IT practitioner mindset needs to be how do we secure access for our growing and diverse remote workforce without the burden of complexity? Because if you’re anything like me, if it ain’t easy, I ain’t doing it. So our cyber expert cast today is here to talk turkey about the “Do’s, Don’ts and Gotchas” of secure remote access. Okay, let’s meet the guys. Back on the vlog again, ladies and gentlemen, we have Independent Cybersecurity Consultant, Jim Bowers. Jim. You’re famous now? Jim Bowers Yeah. I probably won’t talk about the magazine because I don’t think many people crochet. I do extreme crocheting, and it’s very interesting. But no, I’m really excited to be here. Lauren, I’ve said it 100 times, I’m a big fan of the TOP21. I think it...

Duration:00:47:28

Ask host to enable sharing for playback control

Episode 14: Wireless Security

2/9/2022
Welcome back to “Who’s In Your Cloud?” 21 Steps to Secure, Reliable, Trusted Technology. I’m Lauren Lev, Marketing Manager for TechOnPurpose, and this is Episode 14: Wireless Security Looking back at last week’s episode, we discussed network security and the critical need for advanced threat protection. With the help of our cyber expert cast, we shared how to avoid widespread disruption and damage to an organization’s bottom line and reputation with the use of their solutions. In today’s episode, we’re taking a deeper dive into TOPcyber21 best security practice number 14 – wireless security. We’ve all connected to a store, hotel, or coffee shop WiFi. It’s easy, free to use, and the driving force behind the work-from-anywhere culture. More often than not, wireless apps obtain our location data, usage, and personal information, which we are too easily and unknowingly authorizing at the expense of our need to “connect now.” So are we truly aware of the risk of using these WiFi connections? In reality, unauthorized users and malicious actors’ ability to easily intercept and access your sensitive information has never been greater. Join us as we hear from our partners about their available solutions and best practices to ensure the security of your data and devices. We’re very thankful to our cyber expert cast joining us today from Cisco, Fortinet and Intelisys, as they help us educate our clients and prospects on the road to #secure, reliable, trusted technology! As a reminder, we began releasing a new episode every Tuesday, starting 10/20/21 and will continue to do so through late spring of 2022, with brief time off for holidays with family and friends. We’ll also follow each Tuesday episode release with subsequent Wednesday, Thursday, and Friday posts highlighting our (3) contributing solution partners from that week’s episode. We hope you’ll find this an immersive, hopefully simple, educational, and enjoyable experience. So how do you tune in? To easily follow the journey ahead, we’ve diversified your access options to all (23) of our coming episodes. You can follow along here on our blog or by any of the following methods: Email Newsletter:techonpurpose.net/blogherehereherehere Buckle up – it’s time to hit the road to #secure, reliable, trusted technology! Lauren Lev I’m Lauren Lev, Marketing Manager for TechOnPurpose. And this is Episode 14: Wireless Security. Welcome back to our “Who’s in Your Cloud?” series. Say it with me now, 21 Steps to Secure, Reliable, Trusted Technology. Should all have that by now. All right, so if this is your first time joining us, thank you. If you’ve missed any of our previous episodes, check those out on LinkedIn, Facebook, YouTube, or Spotify, or sign up at TechOnPurpose.net/blog to get those episodes delivered straight to your inbox. Alright, today’s episode- Wireless Security. While I’m clearly no cyber expert like the rest of our cast, this is actually a topic I’m a little bit familiar with. We’ve all connected to a work, store, hotel or coffee shop WiFi. It’s easy, free, and the driving force behind the “work from anywhere” culture. My favorite part is being the envy of all of my work from the office friends as I sip daiquiris on a beach or drink some lattes from my French balcony, all while still bringing you guys this very entertaining vlog series. But do we honestly know how risky these WiFi connections can be? Do you know how easy it is for people to intercept and read your passwords and data? Did you know that when you hit that accept button to connect to these WiFi networks, your connections, browsing history and personal data are most likely logged and potentially sold to third-parties. More often than not, the wireless apps we all use provide location data, usage, and personal information that we are too easily and unknowingly authorizing at the expense of our need to connect right now. Well, I don’t know about you guys, but I want to be getting free daiquiris from the...

Duration:00:56:31