№ 372

BYOD

Think twice before bringing your own device (BYOD) to work! While it may be convenient, using personal devices for work-related tasks can pose security risks.

APR 17 · 1 MIN INFOSEC TIPS
№ 371

Hardware Security

When disposing of old electronic devices, remember to securely wipe any data stored on them and physically destroy the hard drives or storage media to prevent potential data…

APR 17 · 1 MIN INFOSEC TIPS
№ 370

Browser Extensions

Be mindful of the browser extensions you install, as they can pose potential security risks.

APR 17 · 1 MIN INFOSEC TIPS
№ 369

Ephemeral Messaging

Consider using ephemeral messaging apps that automatically delete messages after a short period of time.

APR 17 · 1 MIN INFOSEC TIPS
№ 368

This month we have Macy Dennis joining us for a conversation.

Co-hosts: Katie Hanahan, Lisa Beth Lentini Walker, Russell Eubanks, Vijay Bala, David Cass, Hussein Syed, Anil Varghese, Stephen Garcia, and Tomás Maldonado Prior shows:…

APR 12 · 1 MIN CYBERSECURITY
№ 367

Beware of ‘tailgating’. (Not the kind done at Football games, those are fun!)

When entering a secure facility, don't hold the door open for someone who isn't authorized to enter.

APR 5 · 1 MIN INFOSEC TIPS
№ 366

File Extensions & security

Did you know that changing the file extension of a file can make it appear as a different file type? For example, you can change a .txt file to a .

MAR 30 · 1 MIN INFOSEC TIPS
№ 365

Data hygiene

Keep your device clean, just like your teeth! Regularly delete unnecessary files, temporary files, and cached data. It's like brushing away the digital plaque

MAR 26 · 1 MIN INFOSEC TIPS
№ 364

Account Security

Did you know that one of the easiest ways to protect your online accounts is by using a unique and obscure username? Most people use common usernames that can be easily guessed or…

MAR 26 · 1 MIN INFOSEC TIPS
№ 363

Wifi Security

Have you heard of the "Evil Twin" attack? It's a type of wireless attack where cybercriminals create a fake Wi-Fi access point with a name similar to a legitimate one in order to…

MAR 26 · 1 MIN INFOSEC TIPS