The team encourages listeners to educate themselves on the importance of implementing robust security measures to maintain privacy, including setting up separate networks, updating router firewalls, and researching device security features. As the conversation broadens to include considerations for small businesses and the expanding range of internet-enabled devices, the team concludes by underscoring the importance of privacy in the IoT era.
CyberSoundTM is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
Where to Listen to CyberSoundTM
Enter Giveaway to Celebrate our 100th CyberSound Episode!
Learn how we work together with our clients to manage, defend, and respond to their infrastructure needs.
Most Recent Episode
101
Home Smart Home: Security vs. Convenience in IoT
In this episode of CyberSound, co-hosts Jason and Michael sit down with Brian Brehart of Vancord to delve into the complexities of securing smart home devices within the context of the Internet of Things (IoT). The conversation explores the balance between convenience and security when integrating smart technology into homes, touching on topics such as wireless thermostats, smart TVs, and voice-activated assistants like Alexa.
Meet the Hosts of CyberSoundTM
CyberSoundTM is hosted by cybersecurity professionals who work in the industry on a daily basis. Meet Vancord’s Jason Pufahl, Steven Maresca, and Matt Fusaro.
Most Recent Episodes
Play Video
PODCAST EPISODE 51
GLBA Compliance in Higher Ed: Helping to Protect Student Financial Data
There are changing expectations in higher education for protecting student financial records. This is an opportunity for your institution to get ahead in information security as the Gramm-Leach-Bliley Act (GLBA) requirements begin to go into effect this year.
Join Jason, Steve, and guest star Brian Kelly from EDUCAUSE on today’s episode of CyberSound to discuss the importance of performing self-assessments to sustain your eligibility with these obligations. Don’t wait– start your journey to compliance now.
Play Video
PODCAST EPISODE 50
The Cyber Journey To Protecting Sensitive Data: How Evident Must It Be?
The Department of Defense (DoD) holds security standards for organizations that handle controlled, unclassified information– particularly NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC). These standards are set to ensure protection in your business and to avoid any potential data breaches or financial impacts.
Today, Jason and Steve are joined by FutureFeed’s Jim Goepel, where the team outlines the life cycle for protecting your cyber data and how to make sure you’re meeting the goals of your POAM.
Play Video
PODCAST EPISODE 49
Economic Effects on the Cyber Industry
Today, the economic landscape is directly impacting the cybersecurity industry, which has resulted in unrest. With the current state of the job and stock markets, it is crucial to be aware of these challenges to adapt accordingly.
On today’s episode of CyberSound, Jason, Steve, and Matt discuss specific factors contributing to this downturn in the industry and alternative approaches to hiring, such as seeking more diversified candidates to ensure greater success in your organization.
Play Video
PODCAST EPISODE 48
Tangible and Intangible Enterprise Risk
Reducing physical security risk requires great flexibility in meeting the specified needs of clients. This understanding allows experts to analyze the severity of a situation and mitigate it appropriately.
Today, Kenneth Grossberger from Elite Investigations joins the team at CyberSound to discuss ways you can minimize reputational risk, the importance of physical and cybersecurity training, and practices to ensure safe risk management in the workplace.
Play Video
PODCAST EPISODE 47
The Hacker Personas
The modern-day internet hacker holds a strong illusion to the public eye. These are not random, lone actors— they are usually serious, organized attackers with a profit-based motive. These motives are important to understand for instilling the right cybersecurity defense mechanisms in your organization.
This week, the experts at CyberSound address the common misconception of hackers and reference notable groups in hopes of helping users better understand the true persona of an attacker.
Play Video
PODCAST EPISODE 46
Revisiting Cybersecurity Fundamentals
Are you a beginner in IT looking for simple steps to be proactive about cybersecurity? Or want a refresher on the basics of preventative maintenance online?
Today, cybersecurity experts Jason, Steve, and Matt revisit best practices discussed in the first-ever CyberSound episode and introduce new concepts, like endpoint detection and response (EDR), to ensure ultimate security.
Play Video
PODCAST EPISODE 45
The Latest: June 2022 News Segment
Open-source software (OSS) allows web developers to study, modify, and customize software to fit their needs. Historically, many organizations have felt a lack of security in these projects; however, major tech giants like Microsoft and Amazon are making significant investments today. What does this mean for the future of software developers? What is the difference between proprietary and open-source software? And what should you consider when evaluating the needs of your organization?
Today, the experts at CyberSound bring you the latest cybersecurity news, including the changing digital landscape for open-source software on both the developer and user ends.
Play Video
PODCAST EPISODE 44
Identity Crisis: The Give and Takes of Identity-Based Authentication
With the rise of remote work and the option to work from anywhere, employees can access company data more easily than before, making identity and access management a critical security issue for businesses to consider.
Today on CyberSound, Jason, Steve, and Matt sit down with identity and access management expert Dylan Marquis to discuss the give and takes of identity-based authentication and why it’s essential to keep in mind.
Play Video
PODCAST EPISODE 43
What Would You Do? The Value of Acting Out an Attack
We all know that practice makes perfect, and the same holds true when it comes to incident response in the case of a cybersecurity attack. Linn discusses the value of acting out an incident— better known as a tabletop exercise, and what is needed to implement these exercises as standard practice for businesses.
On this episode of CyberSound, Jason, Steve, and Matt are joined by Linn Freedman, Chair of the Data Privacy and Cybersecurity Team at Robinson+Cole.
Play Video
PODCAST EPISODE 42
Growing Up Online: How Do I Talk to My Child About Cybersecurity?
Today’s kids are inevitably growing up online in the age of virtual learning, iPads, and the internet at our fingertips, and parents need to stay vigilant. Tune in for some tips and insight into navigating cyber-safe practices and conversations with your kids.
On this episode of CyberSound, Jason, Steve, and Matt are joined by Lou Ardolino, Vice President of Client Success at Vancord. They discuss how they approach cybersecurity with their children, highlighting the importance of privacy, screen time, and teaching critical thinking.
Most Recent Episodes
51
GLBA Compliance in Higher Ed: Helping to Protect Student Financial Data
There are changing expectations in higher education for protecting student financial records. This is an opportunity for your institution to get ahead in information security as the Gramm-Leach-Bliley Act (GLBA) requirements begin to go into effect this year.
Join Jason, Steve, and guest star Brian Kelly from EDUCAUSE on today’s episode of CyberSound to discuss the importance of performing self-assessments to sustain your eligibility with these obligations. Don’t wait– start your journey to compliance now.
Play Video
50
The Cyber Journey To Protecting Sensitive Data: How Evident Must It Be?
The Department of Defense (DoD) holds security standards for organizations that handle controlled, unclassified information– particularly NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC). These standards are set to ensure protection in your business and to avoid any potential data breaches or financial impacts.
Today, Jason and Steve are joined by FutureFeed’s Jim Goepel, where the team outlines the life cycle for protecting your cyber data and how to make sure you’re meeting the goals of your POAM.
Play Video
49
Economic Effects on the Cyber Industry
Today, the economic landscape is directly impacting the cybersecurity industry, which has resulted in unrest. With the current state of the job and stock markets, it is crucial to be aware of these challenges to adapt accordingly.
On today’s episode of CyberSound, Jason, Steve, and Matt discuss specific factors contributing to this downturn in the industry and alternative approaches to hiring, such as seeking more diversified candidates to ensure greater success in your organization.
Play Video
48
Tangible and Intangible Enterprise Risk
Reducing physical security risk requires great flexibility in meeting the specified needs of clients. This understanding allows experts to analyze the severity of a situation and mitigate it appropriately.
Today, Kenneth Grossberger from Elite Investigations joins the team at CyberSound to discuss ways you can minimize reputational risk, the importance of physical and cybersecurity training, and practices to ensure safe risk management in the workplace.
Play Video
47
The Hacker Personas
The modern-day internet hacker holds a strong illusion to the public eye. These are not random, lone actors— they are usually serious, organized attackers with a profit-based motive. These motives are important to understand for instilling the right cybersecurity defense mechanisms in your organization.
This week, the experts at CyberSound address the common misconception of hackers and reference notable groups in hopes of helping users better understand the true persona of an attacker.
Play Video
46
Revisiting Cybersecurity Fundamentals
Are you a beginner in IT looking for simple steps to be proactive about cybersecurity? Or want a refresher on the basics of preventative maintenance online?
Today, cybersecurity experts Jason, Steve, and Matt revisit best practices discussed in the first-ever CyberSound episode and introduce new concepts, like endpoint detection and response (EDR), to ensure ultimate security.
Play Video
45
The Latest: June 2022 News Segment
Open-source software (OSS) allows web developers to study, modify, and customize software to fit their needs. Historically, many organizations have felt a lack of security in these projects; however, major tech giants like Microsoft and Amazon are making significant investments today. What does this mean for the future of software developers? What is the difference between proprietary and open-source software? And what should you consider when evaluating the needs of your organization?
Today, the experts at CyberSound bring you the latest cybersecurity news, including the changing digital landscape for open-source software on both the developer and user ends.
Play Video
44
Identity Crisis: The Give and Takes of Identity-Based Authentication
With the rise of remote work and the option to work from anywhere, employees can access company data more easily than before, making identity and access management a critical security issue for businesses to consider.
Today on CyberSound, Jason, Steve, and Matt sit down with identity and access management expert Dylan Marquis to discuss the give and takes of identity-based authentication and why it's essential to keep in mind.
Play Video
43
What Would You Do? The Value of Acting Out an Attack
We all know that practice makes perfect, and the same holds true when it comes to incident response in the case of a cybersecurity attack. Linn discusses the value of acting out an incident— better known as a tabletop exercise, and what is needed to implement these exercises as standard practice for businesses.
On this episode of CyberSound, Jason, Steve, and Matt are joined by Linn Freedman, Chair of the Data Privacy and Cybersecurity Team at Robinson+Cole.
Play Video
42
Growing Up Online: How Do I Talk to My Child About Cybersecurity?
Today’s kids are inevitably growing up online in the age of virtual learning, iPads, and the internet at our fingertips, and parents need to stay vigilant. Tune in for some tips and insight into navigating cyber-safe practices and conversations with your kids.
On this episode of CyberSound, Jason, Steve, and Matt are joined by Lou Ardolino, Vice President of Client Success at Vancord. They discuss how they approach cybersecurity with their children, highlighting the importance of privacy, screen time, and teaching critical thinking.
Play Video
Sign Up for More
Subscribe for the latest updates from the Vancord team