Vancord logo
Vancord CyberSound Podcast

Protect your business with tips & tactics from our IT security experts

CyberSound
CyberSoundTM is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.

Where to Listen to CyberSoundTM

Enter Giveaway to Celebrate our 100th CyberSound Episode!

Learn how we work together with our clients to manage, defend, and respond to their infrastructure needs.

Most Recent Episode

101

Home Smart Home: Security vs. Convenience in IoT

In this episode of CyberSound, co-hosts Jason and Michael sit down with Brian Brehart of Vancord to delve into the complexities of securing smart home devices within the context of the Internet of Things (IoT). The conversation explores the balance between convenience and security when integrating smart technology into homes, touching on topics such as wireless thermostats, smart TVs, and voice-activated assistants like Alexa.

The team encourages listeners to educate themselves on the importance of implementing robust security measures to maintain privacy, including setting up separate networks, updating router firewalls, and researching device security features. As the conversation broadens to include considerations for small businesses and the expanding range of internet-enabled devices, the team concludes by underscoring the importance of privacy in the IoT era.

Meet the Hosts of CyberSoundTM

CyberSoundTM is hosted by cybersecurity professionals who work in the industry on a daily basis. Meet Vancord’s Jason Pufahl, Steven Maresca, and Matt Fusaro.
Jason Pufahl
VP Security Services
Steven Maresca
Senior Security Engineer
Matt Fusaro

Manager Security Services

Most Recent Episodes

Play Video
PODCAST EPISODE 51

GLBA Compliance in Higher Ed: Helping to Protect Student Financial Data

There are changing expectations in higher education for protecting student financial records. This is an opportunity for your institution to get ahead in information security as the Gramm-Leach-Bliley Act (GLBA) requirements begin to go into effect this year.
Join Jason, Steve, and guest star Brian Kelly from EDUCAUSE on today’s episode of CyberSound to discuss the importance of performing self-assessments to sustain your eligibility with these obligations. Don’t wait– start your journey to compliance now.
Play Video
PODCAST EPISODE 50

The Cyber Journey To Protecting Sensitive Data: How Evident Must It Be?

The Department of Defense (DoD) holds security standards for organizations that handle controlled, unclassified information– particularly NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC). These standards are set to ensure protection in your business and to avoid any potential data breaches or financial impacts.
Today, Jason and Steve are joined by FutureFeed’s Jim Goepel, where the team outlines the life cycle for protecting your cyber data and how to make sure you’re meeting the goals of your POAM.
Play Video
PODCAST EPISODE 49

Economic Effects on the Cyber Industry

Today, the economic landscape is directly impacting the cybersecurity industry, which has resulted in unrest. With the current state of the job and stock markets, it is crucial to be aware of these challenges to adapt accordingly.
On today’s episode of CyberSound, Jason, Steve, and Matt discuss specific factors contributing to this downturn in the industry and alternative approaches to hiring, such as seeking more diversified candidates to ensure greater success in your organization.
Play Video
PODCAST EPISODE 48

Tangible and Intangible Enterprise Risk

Reducing physical security risk requires great flexibility in meeting the specified needs of clients. This understanding allows experts to analyze the severity of a situation and mitigate it appropriately.
Today, Kenneth Grossberger from Elite Investigations joins the team at CyberSound to discuss ways you can minimize reputational risk, the importance of physical and cybersecurity training, and practices to ensure safe risk management in the workplace.
Play Video
PODCAST EPISODE 47

The Hacker Personas

The modern-day internet hacker holds a strong illusion to the public eye. These are not random, lone actors— they are usually serious, organized attackers with a profit-based motive. These motives are important to understand for instilling the right cybersecurity defense mechanisms in your organization.
This week, the experts at CyberSound address the common misconception of hackers and reference notable groups in hopes of helping users better understand the true persona of an attacker.
Play Video
PODCAST EPISODE 46

Revisiting Cybersecurity Fundamentals

Are you a beginner in IT looking for simple steps to be proactive about cybersecurity? Or want a refresher on the basics of preventative maintenance online?
Today, cybersecurity experts Jason, Steve, and Matt revisit best practices discussed in the first-ever CyberSound episode and introduce new concepts, like endpoint detection and response (EDR), to ensure ultimate security.
Play Video
PODCAST EPISODE 45

The Latest: June 2022 News Segment

Open-source software (OSS) allows web developers to study, modify, and customize software to fit their needs. Historically, many organizations have felt a lack of security in these projects; however, major tech giants like Microsoft and Amazon are making significant investments today. What does this mean for the future of software developers? What is the difference between proprietary and open-source software? And what should you consider when evaluating the needs of your organization?
Today, the experts at CyberSound bring you the latest cybersecurity news, including the changing digital landscape for open-source software on both the developer and user ends.
Play Video
PODCAST EPISODE 44

Identity Crisis: The Give and Takes of Identity-Based Authentication

With the rise of remote work and the option to work from anywhere, employees can access company data more easily than before, making identity and access management a critical security issue for businesses to consider.
Today on CyberSound, Jason, Steve, and Matt sit down with identity and access management expert Dylan Marquis to discuss the give and takes of identity-based authentication and why it’s essential to keep in mind.
Play Video
PODCAST EPISODE 43

What Would You Do? The Value of Acting Out an Attack

We all know that practice makes perfect, and the same holds true when it comes to incident response in the case of a cybersecurity attack. Linn discusses the value of acting out an incident— better known as a tabletop exercise, and what is needed to implement these exercises as standard practice for businesses.
On this episode of CyberSound, Jason, Steve, and Matt are joined by Linn Freedman, Chair of the Data Privacy and Cybersecurity Team at Robinson+Cole.
Play Video
PODCAST EPISODE 42

Growing Up Online: How Do I Talk to My Child About Cybersecurity?

Today’s kids are inevitably growing up online in the age of virtual learning, iPads, and the internet at our fingertips, and parents need to stay vigilant. Tune in for some tips and insight into navigating cyber-safe practices and conversations with your kids.
On this episode of CyberSound, Jason, Steve, and Matt are joined by Lou Ardolino, Vice President of Client Success at Vancord. They discuss how they approach cybersecurity with their children, highlighting the importance of privacy, screen time, and teaching critical thinking.  

Most Recent Episodes

CyberSound ep51
51

GLBA Compliance in Higher Ed: Helping to Protect Student Financial Data

There are changing expectations in higher education for protecting student financial records. This is an opportunity for your institution to get ahead in information security as the Gramm-Leach-Bliley Act (GLBA) requirements begin to go into effect this year.
Join Jason, Steve, and guest star Brian Kelly from EDUCAUSE on today’s episode of CyberSound to discuss the importance of performing self-assessments to sustain your eligibility with these obligations. Don’t wait– start your journey to compliance now.
Play Video
CyberSound ep50
50

The Cyber Journey To Protecting Sensitive Data: How Evident Must It Be?

The Department of Defense (DoD) holds security standards for organizations that handle controlled, unclassified information– particularly NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC). These standards are set to ensure protection in your business and to avoid any potential data breaches or financial impacts.
Today, Jason and Steve are joined by FutureFeed’s Jim Goepel, where the team outlines the life cycle for protecting your cyber data and how to make sure you’re meeting the goals of your POAM.
Play Video
CyberSound ep49
49

Economic Effects on the Cyber Industry

Today, the economic landscape is directly impacting the cybersecurity industry, which has resulted in unrest. With the current state of the job and stock markets, it is crucial to be aware of these challenges to adapt accordingly.
On today’s episode of CyberSound, Jason, Steve, and Matt discuss specific factors contributing to this downturn in the industry and alternative approaches to hiring, such as seeking more diversified candidates to ensure greater success in your organization.
Play Video
cybersound ep48
48

Tangible and Intangible Enterprise Risk

Reducing physical security risk requires great flexibility in meeting the specified needs of clients. This understanding allows experts to analyze the severity of a situation and mitigate it appropriately.
Today, Kenneth Grossberger from Elite Investigations joins the team at CyberSound to discuss ways you can minimize reputational risk, the importance of physical and cybersecurity training, and practices to ensure safe risk management in the workplace.
Play Video
CyberSound ep47
47

The Hacker Personas

The modern-day internet hacker holds a strong illusion to the public eye. These are not random, lone actors— they are usually serious, organized attackers with a profit-based motive. These motives are important to understand for instilling the right cybersecurity defense mechanisms in your organization.
This week, the experts at CyberSound address the common misconception of hackers and reference notable groups in hopes of helping users better understand the true persona of an attacker.
Play Video
CyberSound ep46
46

Revisiting Cybersecurity Fundamentals

Are you a beginner in IT looking for simple steps to be proactive about cybersecurity? Or want a refresher on the basics of preventative maintenance online?
Today, cybersecurity experts Jason, Steve, and Matt revisit best practices discussed in the first-ever CyberSound episode and introduce new concepts, like endpoint detection and response (EDR), to ensure ultimate security.
Play Video
CyberSound ep45
45

The Latest: June 2022 News Segment

Open-source software (OSS) allows web developers to study, modify, and customize software to fit their needs. Historically, many organizations have felt a lack of security in these projects; however, major tech giants like Microsoft and Amazon are making significant investments today. What does this mean for the future of software developers? What is the difference between proprietary and open-source software? And what should you consider when evaluating the needs of your organization?
Today, the experts at CyberSound bring you the latest cybersecurity news, including the changing digital landscape for open-source software on both the developer and user ends.
Play Video
CyberSound ep 44
44

Identity Crisis: The Give and Takes of Identity-Based Authentication

With the rise of remote work and the option to work from anywhere, employees can access company data more easily than before, making identity and access management a critical security issue for businesses to consider.
Today on CyberSound, Jason, Steve, and Matt sit down with identity and access management expert Dylan Marquis to discuss the give and takes of identity-based authentication and why it's essential to keep in mind.
Play Video
CyberSound ep43
43

What Would You Do? The Value of Acting Out an Attack

We all know that practice makes perfect, and the same holds true when it comes to incident response in the case of a cybersecurity attack. Linn discusses the value of acting out an incident— better known as a tabletop exercise, and what is needed to implement these exercises as standard practice for businesses.
On this episode of CyberSound, Jason, Steve, and Matt are joined by Linn Freedman, Chair of the Data Privacy and Cybersecurity Team at Robinson+Cole.
Play Video
CyberSound ep 42
42

Growing Up Online: How Do I Talk to My Child About Cybersecurity?

Today’s kids are inevitably growing up online in the age of virtual learning, iPads, and the internet at our fingertips, and parents need to stay vigilant. Tune in for some tips and insight into navigating cyber-safe practices and conversations with your kids.
On this episode of CyberSound, Jason, Steve, and Matt are joined by Lou Ardolino, Vice President of Client Success at Vancord. They discuss how they approach cybersecurity with their children, highlighting the importance of privacy, screen time, and teaching critical thinking.  
Play Video

Sign Up for More

Subscribe for the latest updates from the Vancord team