When it comes to cybersecurity, it's simply not enough to install a bunch of tools to protect you and your business. Simply installing a bunch of these security tools without putting a cybersecurity plan in place can have a lot …
Most businesses believe that cybersecurity comes down to installing a bunch of tools that help protect their computer networks and data from cybercriminals. The fact is, cybersecurity comes secondary to information security or infosec. In Part 2 of...
Greg Scasny is the Chief Technology Officer of Blueshift Cyber. Blueshift Cyber is a managed SOC (security operations center) company that watches business networks 24/7/365 to monitor for cyber-attacks. Greg shares with us two rarely discussed ways...
Brandis Kelly, President of the Technology Specialist, based in Wichita, Kansas, joins me to talk about Healthcare and HIPAA Compliance. Brandis shares with us a scary threat facing medical practices today that goes beyond cybersecurity. If you work...
According to statistics from 2019, the average IoT device gets attacked just 5 minutes after connecting to the internet. More importantly, 98% of all IoT device traffic is unencrypted. This includes thermostats, smart speakers, smart TVs, industrial...
Jason Whitehurst sees a lot of ransomware cases. As CEO of Futuresafe, an MSSP or Managed Security Service Provider, Jason's job is to protect business networks from cyber-attacks. In this episode, Jason explains why IT and Cybersecurity people are...
Welcome to Legends of IT! I created this podcast to support the hard-working IT people of the world. Each season, I will speak with some of the most fantastic technology minds alive today and ask them the questions we all …