AI Unveiled: From Basics to Business and Beyond
Navigating the intricate landscape of Artificial Intelligence (AI) can be daunting– but it doesn’t have to be. On this episode of CyberSound, the team provides valuable insights into generative AI, explores its strengths, weaknesses, and how it has garnered widespread attention in the professional services landscape, and discusses practical business applications across various industries.
Connecticut Senators on the Cutting Edge: AI & Data Privacy in Focus
Connecticut has been a leader in addressing data privacy issues and Artificial Intelligence (AI) regulation through policies that protect residents and foster innovation.
In this episode of CyberSound, Jason and Michael have a thoughtful conversation with Senator Tony Hwang and Senator James Maroney of the State of Connecticut on the complexities of AI, data privacy, and the state’s approach to transparency and accountability in AI usage. The Senators address social equity concerns and emphasize the importance of a balanced and informed approach to these issues.
The CIO’s Dilemma: Proving Value and Driving Strategic Change with CEOs
Often, CIOs and CISOs are faced with the challenge of needing to prove the value of implementing cybersecurity controls to secure an organization. Today, we discuss the tools available for both IT strategy and cybersecurity risk management that enable executives to drive strategic change for their business.
Presenting: Vantage Managed Detection & Response (MDR)
Endpoint protection is a popular space in the market for businesses right now, whether it be to meet cyber liability insurance requirements or to boost an organization’s comprehensive approach against threats.
Today, Jason Pufahl, Michael Grande, Matt Fusaro, and Mike Lang, all of the Vancord team, are proud to present Vantage MDR: a cutting-edge managed endpoint detection and response solution powered by industry-leader Microsoft, fully delivered by Vancord's security experts.
Recent Cyber Attacks in CT: Protecting Your Business from Financial Fraud
This summer, numerous businesses around Connecticut have fallen victim to cyber-attacks. These sophisticated and often expensive incidents remind organizations that they need good processes and controls in place to stay protected.
On this topical segment of CyberSound, Jason sits down with the President & CEO of Vancord, Michael Grande, to put a financial perspective on the implications of these attacks. Jason and Michael discuss common threat actor motives and methods, the importance of vendor management, cyber liability insurance, and best practices that organizations can employ.
The Human Element of Security Awareness Training
Technology plays a role in improving security posture, but a well-informed and educated workforce is superior to keeping an organization protected. Security awareness training is crucial to ensuring your team is empowered, productive, and safe – and it doesn’t have to be boring!
On this episode of CyberSound, Jason and Steve welcome Joel Cahill to the podcast. Joel is the CEO and Co-Founder of Vancord’s partner company, Infima Cybersecurity, a modern-day security awareness training platform designed to provide seamless, brief, and innovative training for everyone. Tune in today as the team explores behaviors and the human element of security.
Demystifying Threat Hunting vs. Incident Response
Threat Hunting and Incident Response are two tactful measures that help an organization’s cybersecurity journey. But what is the difference between them?
Join us today as Jason, Matt, and Steve dive into the separate services, and discuss the proactiveness of Threat Hunting and the neutralization of breaches through Incident Response. The team also explores where forensics comes into play and how the maturity of an organization can determine what toolsets are appropriate to implement.
Fraud in Higher Education
Higher education institutions have become top targets for student fraudulent activity and scamming. As these threat actors continue to advance, it is more important than ever for universities to have the right tool sets in place to detect and filter out fake student applications.
In this episode, Jason and Steve welcome Maurice Simpkins, President of A.M. Simpkins and Associates, to discuss the interconnection of higher education fraud and cybersecurity. Both parties have the common goal of keeping institutions protected and maintaining the highest standards of academic integrity.
MOVEit Vulnerability Exploitation: June, 2023
Progress Software’s file-transfer tool MOVEit recently experienced a massive exploitation. What does this mean for the users of the software and the service providers with clientele under this tool?
Today, Jason, Matt, and Steve walk through the incident and notification processes while advising of basic steps to be proactive against these types of attacks. The team emphasizes that these basic recommendations apply to those involved with the MOVEit vulnerability and those dealing with sensitive data transfers.
Vancord Security Constitution: The Digital Citizen’s Guide
We, as digital citizens of the United States, have cyber duties to fulfill to ensure the protection of our data and devices.
In celebration of the 4th of July, Jason reads the Vancord Security Constitution that recognizes the importance of remaining vigilant and practicing safe habits online, especially during the holiday season.
How is AI Transforming Cybersecurity?
Artificial Intelligence (AI) advancements are shaping the digital world at a revolutionary pace. From ChatGPT and image generators to solving ransomware attacks and providing curated learning, AI has demonstrated many positive usages. However, there are motivators to slow this process down, with concerns surrounding the potential threats artificial intelligence may pose.
In this episode, the CyberSound team addresses incoming AI tools, reviews how the population will likely navigate them, and have an open dialogue on their feelings towards this actively developing software.
Mandated Cybersecurity Education in K-12 Schools
Just this year, North Dakota passed House Bill No.1398, becoming the first state in the country to require cybersecurity education in K-12 schools.
Today, Jason, Matt, and Steve discuss the specific curricula put in place, explain how programs can be tailored to younger audiences, and stress that this kind of education is just as important as other core subjects. Tune in to explore this new law that is leading change in cybersecurity.
Privacy Concerns with TikTok
Numerous states have placed a formal ban on the use of the popular social media platform TikTok, leaving users to question its safety surrounding data and asset privacy.
Today, Jason, Steve, and Matt discuss the restrictions, current threat model, and perceived threats in hopes of easing some concerns. The team encourages being proactive and protecting your data before worrying about platforms accessing it.
NERCOMP 2023 Annual Conference Recap
Last month, the Vancord team attended the NorthEast Regional Computing Program (NERCOMP) Conference, which annually brings together individuals in IT and higher education. From ransomware concerns to heightening security awareness and meeting compliance deadlines, many productive conversations took place.
Understanding Data Breach Notification Laws
A data breach has occurred in your organization– what now? Who do I legally have to notify? What types of data require notification? There are many influencing factors in state data breach laws that organizations must consider regarding discloser requirements.
Today on Cybersound, Jason, Steve, and Matt are joined by Vancord’s Data Privacy Consultant, Rob McWilliams, to discuss the overall message: If you are equipped to respond properly to incidents, you should seek guidance to meet your regulatory obligations.
Security Challenges Facing Operational Technology
As cyber threats increase, so does the importance of keeping your critical infrastructure systems secure. Inventorying your operational technology (OT), being aware of the risk, and implementing cybersecurity best practices are ways to maintain and assess these devices.
Today, Jason, Matt, and Steve address these fundamental issues and guide you on where your organization needs to be when protecting your infrastructure.
Connecticut Data Privacy Act: Be Prepared
The Connecticut Data Privacy Act (or “CTDPA”) is going into effect on July 1, 2023, making Connecticut the fifth state to pass a comprehensive data privacy law that protects consumers. How will this new law impact your organization, and are there any obligations you should know?
The Impact of Supply Chain Issues in IT
Over the past few years, supply chain issues have significantly impacted the IT industry. From extensive lead times to unfulfillable hardware needs, it is more important than ever to understand the risk, ensure you have a supply chain strategy in place and plan early and often.
Introducing Vantage Protect
Microsoft is continuously developing its stack of security capabilities and staying innovative in the cloud space.
Today, the team at Vancord is proud to announce a proactive approach they have adopted, utilizing Microsoft Azure Cloud to better manage clients' data. Vantage Protect is a suite of services provided by Vancord's expert engineers that maximizes the performance and reliability of security systems in an automated fashion. Learn more about Vantage Protect today.
How will ChatGPT Affect Cybersecurity?
OpenAI’s ChatGPT is an emerging phenomenon in the cybersecurity space. However, as Artificial Intelligence technology advances, so does the potential for misuse. From generating phishing emails to disrupting the academic environment for youth, ChatGPT can have different impacts, and it is critical to practice appropriate usage.
Growing Up Online Part 2: Exploring Technology
The ever-changing cyber world poses risks for children. It is critical to ensure they are using technology appropriately. As a parent, how do I address these concerns with my child, and are there any preventative measures I can take?
Threat Hunting with Binary Defense
With the emerging cybersecurity threat landscape, it’s increasingly important to have a Security Operations Center (SOC) that can recognize and respond to attacks in an efficient manner. Understanding what attackers are thinking and how they plan to use malware ensures that as these new threats emerge, a defense against them is also being built.
On this episode of CyberSound, Jason and Matt sit down with the Vice President of Threat Hunting and Counterintelligence at Binary Defense, Randy Pargman, to break down how his company prepares their SOC analysts for threat hunting.
E-Rate & School Reimbursement Funding
Managing and funding the operations of internet infrastructure in schools can be a difficult task. The Universal Service Program for Schools and Libraries, better known as E-Rate, exists to help make it easier for these entities to get the equipment and services they need at an affordable price.
2022 Security Year in Review
As we near the end of 2022, the team at Vancord looks back on their security predictions, shares optimism about the future of the cybersecurity and information technology industries, and encourages you to focus on the fundamentals for the upcoming year.
Today, Jason, Steve, and Matt are joined by the President & CEO of Vancord, Michael Grande, as they dive into hot trends they've witnessed in 2022. Tune in for a recap on 5G, issues with Twitter, the evolving financial landscape, and the increased usage of smart home devices.
eWallets: Approaching a Contactless Future
In recent years, purchasing methods of consumers have drastically changed. Relative to the security space, the introduction of Electronic Wallets (eWallets) and the need for convenience and safety has become crucial.
Today, the team at Vancord discusses this topic of eWallets, mention their recommendations for use, and addresses a few of the security concerns you should consider. The team believes this up-and-coming feature will be the new reality over the coming years.
White House Announces Important Cybersecurity Measures
On October 11, 2022, the Biden-Harris Administration released a Fact Sheet revealing the increased efforts of the White House to improve the Nation’s cyber defenses. But how exactly are they promising to lead Americans toward a more cyber-safe future?
Today, Jason, Steve, and Matt divulge a few key ideas that may benefit our listeners, such as developing a new label, building up the cyber workforce, and security relative to quantum computing. Read the official document here.
LastPass: The Value of Password Vaults
Password protection management is a fundamental practice you and your organization should utilize to keep your credentials safe.
There are many password managers available, but today, Jason, Steve, and Matt dive into their preferred software, LastPass, to speak on the marriage of security and convenience this tool provides. The team stresses how incidents can prove the value of password vaults and reassures any concerns about using these platforms.
Halloween Kill Chain
Keep yourself safe from cyberattacks this Halloween season.
It’s no secret that full-size candy bars are sought after and tracked down on Halloween night. In this fun, holiday-esque episode, Jason, Steve, and Matt introduce an easy-to-follow scenario to walk you through the different stages of a cyberattack and guide your understanding of the Cyber Kill Chain.
Cybersecurity: We’re All in This Together
Information security is an intellectually stimulating and somewhat challenging industry to be in, but at the heart of it is the collectivity of the environment. When there is an emerging or urgent situation, there is a need to come together and solve the problem.
Tune in as Jason, Steve, and Matt share their thoughts and appreciation for working in a field that has such a great sense of community and share with listeners that security does not exist without community effort.
Cybersecurity Awareness Month: See Yourself in Cyber
Happy Cybersecurity Awareness Month! Each year, the Cybersecurity and Infrastructure Security Agency (CISA) announces a theme for October; this year it’s “See Yourself in Cyber”.
As we head into the month, the team at Vancord puts a twist on the theme with an informative and thought-provoking conversation on the direction they see cybersecurity heading. The overarching message is simple: cybersecurity should be at the forefront of your organization. Learn more about Cybersecurity Awareness Month here.
Zero Trust: What is it & How Can I Utilize it?
Zero trust is an important security framework that ensures users, assets, and resources are protected from all angles. The rise of remote work has made this even more prevalent. It’s the responsibility of organizations to employ a variety of these measures in a workplace and build stronger operational systems.
Join us today on CyberSound for an informative episode with the team on what zero trust is and building a strategy to fit it into your plan.
Turning the Tables on Attackers
Understanding the behavior of attackers can increase reactivity, improve your overall security stance, and give you a leg up in detecting malicious activity.
On today’s episode of CyberSound, Jason, Steve, and Matt discuss common indicators of an incident in hopes of improving your defense tactics and recommend technologies that may be useful for you to deploy.
Backdoors & Breaches
Black Hills Information Security created an incident response procedure card game titled “Backdoors & Breaches” (B&B). Today, the Vancord team takes a stab at playing it.
Join Jason, Steve, Matt, and Suzanne Pare as they play a fun round of B&B with the hope of informing listeners on different ways to familiarize themselves with processes and understand the layout of technical controls. Play the game here!
Untold Stories of a Cybersecurity Engineer
Working in the security space can come with unexpected challenges and events. The team at Vancord has learned how to properly handle incident response by understanding the high sense of urgency people feel in these situations.
Join Jason, Steve, and Matt on today’s episode of CyberSound as they recall some of the most riveting jobs they’ve encountered as cybersecurity engineers and emphasize the importance of flexibility in this industry.
Finding Privacy in Public Data
What kind of data is attainable to the general public? There is information that you may deem private, like salaries, voter affiliation, and property assessor records. Fortunately, there are options for recourse and limiting the visibility of this data.
Join us on today’s episode of CyberSound as Jason, Steve, and Matt hope to help you and your organization understand where data in the public domain is stored and encourage finding your comfort level.
Unpacking the 2022 Ponemon Cost of Insider Threats Global Report
There are valuable resources available to help protect your organization against insider threats, one of the larger ones being the annual Ponemon Cost of Insider Threats Global Report.
Today, Jason, Steve, and Matt dive into the 2022 report in hopes of helping listeners, both business owners and security practitioners, realign organizational spending and understand the costs of these threats.
Vancord and Binary Defense: Two Business Partners in The Industry
Understanding the business market is the first step in providing successful cybersecurity services to clients. Having valued partners to collaborate with amplifies this.
On this week’s episode of CyberSound, Jason sits down with Bob Meindl, CEO of Binary Defense, and Michael Grande, CEO of Vancord, to have a productive conversation on the importance of people and relationships in this industry, key business drivers in the market, and address the ongoing cybersecurity talent gap.
One Year of CyberSound
It’s been one year since the release of our first ever episode of CyberSound! Tune in as Jason, Steve, and Matt revisit snippets of episodes this past year and share laughs and valuable lessons learned throughout the creation of this podcast.
Thanks to our listeners for joining us on this journey, and we look forward to providing you with more impactful cybersecurity content over the next year.
Balancing Priorities of Infrastructure and Security
IT and cybersecurity are two fundamental pieces of an organization’s internet protection. But how can these respective departments work together to bring a more strategic approach to projects?
Today, the team at CyberSound sits down with Lou Ardolino of Vancord for a productive conversation on using effective communication to bring infrastructure and security technology teams together to build a better future for your clients.
GLBA Compliance in Higher Ed: Helping to Protect Student Financial Data
There are changing expectations in higher education for protecting student financial records. This is an opportunity for your institution to get ahead in information security as the Gramm-Leach-Bliley Act (GLBA) requirements begin to go into effect this year.
The Cyber Journey To Protecting Sensitive Data: How Evident Must It Be?
The Department of Defense (DoD) holds security standards for organizations that handle controlled, unclassified information– particularly NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC). These standards are set to ensure protection in your business and to avoid any potential data breaches or financial impacts.
Economic Effects on the Cyber Industry
Today, the economic landscape is directly impacting the cybersecurity industry, which has resulted in unrest. With the current state of the job and stock markets, it is crucial to be aware of these challenges to adapt accordingly.
On today’s episode of CyberSound, Jason, Steve, and Matt discuss specific factors contributing to this downturn in the industry and alternative approaches to hiring, such as seeking more diversified candidates to ensure greater success in your organization.
Tangible and Intangible Enterprise Risk
Reducing physical security risk requires great flexibility in meeting the specified needs of clients. This understanding allows experts to analyze the severity of a situation and mitigate it appropriately.
Today, Kenneth Grossberger from Elite Investigations joins the team at CyberSound to discuss ways you can minimize reputational risk, the importance of physical and cybersecurity training, and practices to ensure safe risk management in the workplace.
The Hacker Personas
The modern-day internet hacker holds a strong illusion to the public eye. These are not random, lone actors— they are usually serious, organized attackers with a profit-based motive. These motives are important to understand for instilling the right cybersecurity defense mechanisms in your organization.
This week, the experts at CyberSound address the common misconception of hackers and reference notable groups in hopes of helping users better understand the true persona of an attacker.
Revisiting Cybersecurity Fundamentals
Are you a beginner in IT looking for simple steps to be proactive about cybersecurity? Or want a refresher on the basics of preventative maintenance online?
Today, cybersecurity experts Jason, Steve, and Matt revisit best practices discussed in the first-ever CyberSound episode and introduce new concepts, like endpoint detection and response (EDR), to ensure ultimate security.
The Latest: June 2022 News Segment
Open-source software (OSS) allows web developers to study, modify, and customize software to fit their needs. Historically, many organizations have felt a lack of security in these projects; however, major tech giants like Microsoft and Amazon are making significant investments today. What does this mean for the future of software developers? What is the difference between proprietary and open-source software? And what should you consider when evaluating the needs of your organization?
Today, the experts at CyberSound bring you the latest cybersecurity news, including the changing digital landscape for open-source software on both the developer and user ends.
Identity Crisis: The Give and Takes of Identity-Based Authentication
With the rise of remote work and the option to work from anywhere, employees can access company data more easily than before, making identity and access management a critical security issue for businesses to consider.
Today on CyberSound, Jason, Steve, and Matt sit down with identity and access management expert Dylan Marquis to discuss the give and takes of identity-based authentication and why it's essential to keep in mind.
What Would You Do? The Value of Acting Out an Attack
We all know that practice makes perfect, and the same holds true when it comes to incident response in the case of a cybersecurity attack. Linn discusses the value of acting out an incident— better known as a tabletop exercise, and what is needed to implement these exercises as standard practice for businesses.
Growing Up Online: How Do I Talk to My Child About Cybersecurity?
Today’s kids are inevitably growing up online in the age of virtual learning, iPads, and the internet at our fingertips, and parents need to stay vigilant. Tune in for some tips and insight into navigating cyber-safe practices and conversations with your kids.
On this episode of CyberSound, Jason, Steve, and Matt are joined by Lou Ardolino, Vice President of Client Success at Vancord. They discuss how they approach cybersecurity with their children, highlighting the importance of privacy, screen time, and teaching critical thinking.
Vancord: Securing a More Connected Future
If you haven’t heard the news, Vancord and TBNG are now unified as Vancord—and together, we’re securing a more connected future.
Tune into today's episode of CyberSound with Jason Pufahl and Michael Grande to learn why we're bringing the best and brightest security and engineering professionals together under one roof. As global defenders in a world where good wins, we are excited to step into this next chapter with dedicated team members, loyal customers, colleagues, and listeners like you, who have continuously supported us.
The Latest: May 2022 News Segment
In other news, recent reports highlight challenges with the Common Vulnerability Exposure (CVE) model, especially as more companies switch to cloud computing. What are the challenges? Tune in to stay informed.
This week on CyberSound, Jason, Steve, and Matt give you the latest cybersecurity news, including Elon Musk’s recent purchase of Twitter. With this acquisition comes much speculation on the impending ripple effects.
The First 48 Hours: How to Know You’ve Been Attacked
When a cyber attack occurs, organizations typically react with panic and confusion about what to do next. Cyber attacks can severely damage a data system, but businesses can be proactive to, not only try to prevent an attack, but know how to immediately respond to a cyber attack.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they dive into the dos and don'ts of the first 48 hours after a cyber attack.
April News Segment
Recently, Google announced their 5.2 billion dollar acquisition of the cyber security firm Mandiant. Also, SISA made news by imposing stricter cyber security requirements that could affect several major industries nationwide.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they share more on these stories and the rest of April's latest cybersecurity news.
The Ins and Outs of Cyber Warfare
As the war continues in Eastern Europe, questions regarding the idea and possibility of cyber warfare have risen to the surface. What is cyber warfare? Or what role will cyberattacks play in the future of how countries approach defending their nation?
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they give a primer on cyber warfare and what it could mean for us in the future.
What Does Network Segmentation Really Mean?
Network segmentation is a common practice organizations use daily to isolate and track traffic on their computer network. However, network segmentation is often taken for granted in cybersecurity discussions, or some people haven’t explored why it’s important. Network segmentation is a valuable component to any companies cybersecurity policy and procedures, so understanding the basics about what it is is essential.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they discuss the meaning and purpose of network segmentation. Listen to learn how companies can get the most of out of network segmentation, today.
Secure Access Service Edge
The evolution of cybersecurity correlates to both the security demands of organizations and technological changes in the world. In recent years, the growth of cloud based software and a growing remote workforce, has increased the need for solutions like what Gartner has coined Secure Access Service Edge, or SASE.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they discuss what is SASE and if it's important for all organizations to consider. Listen to get tips on how companies can ensure they have secure networks, regardless of the location of their staff.
I’m Understaffed – What Do I Do Now?
Cybersecurity is not a luxury service, only for large companies with big budgets. Regardless of the size of a company, security services have become vital to determine the health of an organization’s infrastructure. However, many people still undervalue or don’t understand how to utilize security strategic services.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they share how both small and large companies can invest in cybersecurity services. Listen to hear why a lack of budget or staff limitations shouldn't stop people from partnering with experts like Vancord.
Today, cyberattacks happen more frequently and with greater sophistication than ever before. Organizations around the world search for the right tools, policies, and procedures to avoid the consequences of system vulnerabilities and malware.
In this episode of CyberSound, the team discusses recent cyber threats companies are facing, along with helpful commentary on how to defend against them. Join Jason Pufahl, Steve Maresca, and Matt Fusaro, as they report on recent attacks involving the American Red Cross, why people should beware of cybersecurity threats during tax season, and how hackers prey on collaboration tools like Microsoft Teams.
Incident Response and Event Automation
This is a special episode of Cybersound featuring the Founder of security IaaS LimaCharlie, Maxime Lamothe-Brassard. He is a proven computer scientist and information security specialist, formerly with CrowdStrike and Google X’s Chronicle Security.
Join Max, along with Jason Pufahl, Steve Maresca, and Matt Fusaro, as he reviews how automation can significantly help incident responders do their job better across the entire landscape of cybersecurity. Together, they discuss what automation can do for incident response and where the new generation of cybersecurity tools are leading the industry.
Risk Assessments for Small Business
Is your business prepared for an emergency, a crisis, or even a pandemic? How would you know? Risk assessments are essential to do annually, at the very least. Risks show up in the worst places and at the worst times. Natural or physical, accidental or environmental, technological or unexplainable–risks must be assessed, scoped, and mitigated.
In this episode of Cybersound, Jason Pufahl and Steve Maresca join Vancord's risk assessment expert, Carrie Bonin, who shares her insight about the importance of considering risks, making a plan, and ensuring everyone sticks to it.
Rise Of The Mobile Scam
There used to be a day when you could trust everything you saw on your mobile device, but that day passed long ago. Today, many spoofs are used to get your information through your phone or tablet. Push notifications to text messages, QR codes to mobile payments–threat attackers use them all. That’s why you need to be vigilant about what you click, allow, and send over your phone.
On this episode of Cybersound, join Jason, Steve, and Matt to discuss the rise of the mobile scam and what you need to know to keep your data safe.
Dark Web 101
Data resides in the “deep,” but in the “dark” is where Vancord wants to shed some light. Listen for information and gain education on what you need to know about the Dark Web so you can stay protected. As they say, “You can’t defend what you don’t know.” You need to know what’s out there, and you can keep your data protected.
Today on Cybersound, Jason, Steve, and Matt set out to demystify the Dark Web and the Deep Web. Is that possible? Did you know there was a difference?
Google Do’s And Don’ts – How To Protect Your Privacy
Did you know Incognito Mode doesn’t really mean you’re invisible to a web browser? Your behaviors could still be tracked and your clicks could still be collected. However, that doesn’t mean you can’t feel safe while browsing privately.
Today, Jason Pufahl and Steven Maresca discuss easy steps you can take to feel more confident about protecting your personal data while using any browser or Cloud-based application.
New Requirements to get Insured
Costs are higher everywhere, but in the insurance world, it seems no one was prepared for the impact of ransomware. That means prices are being passed down to the customer and no one is happy about that. Is your business prepared for your next renewal? What can you do to recoup the losses and retain some profits? Don’t miss this chat and stay prepared in 2022.
In this episode of CybersoundTM, Jason Pufahl, Steve Maresca, and Matt Fusaro discuss the stringent parameters on insurance policy renewals, particularly dealing with #cybersecurity.
The Main Frame Connecticut Public Act 21-119
Businesses have adopted specific cybersecurity standards for their protection. And some are even being incentivized to do it. Today’s special guest on Cybersound is Sherwin Yoder, a partner at the Carmody Law Firm in Connecticut, who is responsible for its privacy and security practices.
He sits down with Jason Pufahl, Steve Maresca, and Matt Fusaro to discuss a local government act--Public Act 21-119--that encourages businesses to take on cybersecurity frameworks that may protect them from data breach lawsuits.
2022: The Year Ahead Part 2
Today, Jason Pufahl, Steve Maresca, and Matt Fusaro discuss what they believe the major technology and security benchmarks will be for the year ahead.
In 2022, we will see actions on cloud infrastructure vulnerabilities taking place to help the workforce continue to move ahead with a sense of safety. Organizations use in-house tools and various software components with third-party providers, all to create a secure infrastructure. Or, does it? How can you shift risk and fortify your infrastructure as we rely greater upon the cloud? Let's find out.
A Year In Review Part 1
Managing service providers and general technology support staff evolved to a hybrid workplace in 2021. Many companies had to adapt to new working environments, which appears to be the new normal. Now, tech support has to manage these remote workstations. Sounds easy, but from encrypting cloud software to protecting the staff from ransomware, today’s IT manager has more to consider to optimize the business for efficiency and productivity.
Join Jason, Steve, and Matt as they look back on how organizations are adjusting to a hybrid workforce and the technical concerns that pose to today's workforce.
Security is Not Optional
With the threat landscape continuously shifting, keeping security top of mind when it comes to the implementation of managed services is more important than ever.
Jason and Matt sit down with Michael Grande, CEO, and President of TBNG Inc. to discuss why oversight can cause issues for any type of business, no matter the size or type of data they have, and how being proactive is key. In the age of ransomware attacks— security is not optional.
Ransomware Attack: The First 48
If your organization has not been a victim of ransomware, be thankful but remain aware. When you least expect it, someone could click on the wrong link or download the wrong file, and your entire company will be held hostage to the highest bidder.
What do you do when that happens? Where do you turn for incident response? How will your team prepare? The next few moments of CyberSound may help you get ready for the first steps of that emergency if it ever happens.
How Does Santa REALLY Know What to Bring You?
You’ll have to excuse the guys on this episode. They’re announcing that Santa Claus is now a client of Vancord. And since “the big man” is buying all those electronic devices, he is naturally concerned about your online identity.
Spend the next few minutes listening to what Santa wants to bring you for the holidays—and you should want him to bring you those things. Happy Holidays!
Welcome to Cyber Incident Monday. Shopping is now a 24/7 occurrence with people shopping online, on their phones, or in stores. Data breaches always spike during the holidays, which is why consumers must be vigilant about protecting their information. There are potential pitfalls about shopping and putting your PII (Personal Identifiable Information) everywhere, but what are they?
Learn how to safeguard your secret numbers and passwords? Join the Vancord team as they share the warning signs and provide some safety tips to ensure your identity remains yours during the holiday season.
Preventing the Burnout: Preparing for time off
Indeed has shared that 52% of all workers are feeling burned out. This creates stress, fatigue, frustration, and mental health issues. How can prevent the burn out? Prepare for the time off! It’s simple to say and difficult to do.
Today, Jason, Matt, and Steve sit down with a licensed clinical social worker of 17 years, Lisa Grande. She will lead the conversation around the topic of professional burnout and how to make yourself a priority and allow yourself to recharge and unplug from work. It's not about work-life balance as much as it is finding success.
Automotive Hacking, Should You be Worried? (Dude, Who Stole My Car?)
As our cars become more intelligent and more connected, it is essential to consider the security risks of their connectivity. While automotive hacking isn’t new, do we need to worry as autonomous cars become more popular on the market?
In this week's episode of CyberSound, Jason, Paul, and Matt discuss the signs of automotive hacking and the risks it may pose to our vehicles.
Demystifying AI in Security
The center of cybersecurity conversations has revolved around Artificial intelligence (AI) and machine learning. Maybe the better question should be, “Do you need AI in your security products?”
This week, we discuss the basics of AI, how it can work with cybersecurity, and is it a silver bullet solution. Join Jason as he speaks with Vancord Senior Security Engineers Matt Fusaro and Steve Maresca.
Phishing Redux — Can we trust anything?
Phishing scams are back with a vengeance. With their redux comes a new set of tricks designed to make your life difficult.
On this episode of CyberSound, Jason chats about the latest threat actor tactics making the rounds with Randy Pargman, vice president of threat hunting and counterintelligence services at Binary Defense, and Matt Fusaro, senior security engineer with Vancord.
Leadership in Incident Response
Business continuity during a cybersecurity incident is more than just having a plan in place. It is about leadership—acting as a “human firewall” that can communicate internally and externally effectively.
On episode 15 of CyberSound, Jason and Paul sit down with Fred Cass, Associate CIO of Trinity College, to discuss what leadership looks like during incident response.
Value of Security Standards
Aligning to a specific cybersecurity standard or blueprint for your ruling guide for compliance provides value and credibility to your organization. Meeting and exceeding regulatory requirements is a conduit to improving your business.
Join Jason Pufahl and Steve Maresca in a conversation with Carrie Bonin, a Cybersecurity consultant, in our latest episode about security standards and compliance requirements.
Cyber Safety First
Here is a chilling statistic: 40% of elementary school kids have already chatted with a stranger online!
Episode 13 of our CyberSound podcast, created in the alignment with October CyberSecurity Month, features guest expert Patrick Craven, Director of (ISC)2, non-profit center for CyberSafety, in a discussion about how to keep children and families safe online.
Careers in CyberSecurity
Recorded in alignment with October CyberSecurity Month. Whether you’ve obtained your skills through a college degree program, through earned certifications, or you are entirely self-taught, CyberSecurity is an outstanding career choice for people who are curious.
And now is a great time to start your career path or continue your career trajectory in this highly specialized field. Tune in now to podcast hosts Jason Pufahl and Steve Maresca, along with special guest Michael Grande President of TBNG Inc., as they discuss options you may not have known existed.
Fight the Phish
Recorded in alignment with October CyberSecurity Month. Called the scourge of the internet, phishing is a nefarious attempt to steal your sensitive data.
In this episode, CyberSound podcast hosts Jason Pufahl and Steve Maresca define phishing techniques and provide some critical-thinking suggestions to help you evaluate the validity of suspicious messages. Listen in as they help you protect yourself from attackers getting your credentials.
Basic Security Must-Haves: Personal Edition
Whether you work on a Mac or a PC, cybersecurity is a primary concern for all, especially with so many of us working remotely where company security measures may not be as effective.
Listen in for some common misconceptions that might surprise you.