• SECURING YOUR WORK TECHNOLOGY

  • Mar 8 2022
  • Length: 59 mins
  • Podcast

SECURING YOUR WORK TECHNOLOGY  By  cover art

SECURING YOUR WORK TECHNOLOGY

  • Summary

  • With much anticipation of imminent cyber warfare attacks increasing from Russia, in the midst of the ongoing onslaught of the Ukraine, out of a sense of urgency the next two podcasts were recorded. If you have not ensured that your work internet is secured, you will definitely want to listen as Cyber Security Expert Debi Carr joins Susan and Janice at the table to discuss what really needs to be done to protect any business from cyber warfare.

    Episode Highlights

    • The current landscape of cyber warfare
    • Cyberwarfare is not contained to a country
    • Four layers of cybersecurity protection

    Quotes

    "For us to have it in our heads that it’s happening over there and it could never affect us here, is a myth…”

    “We are all still very vulnerable to this situation. The threat is real.”

    “We work off IP addresses and you never know if that IP address is in Russia, the Ukraine or wherever.”

    “If that email happens to have a trojan in it and they click on it, then it can affect all computers.” 

    “ A lot of phishing emails are trying to get donations, creating fears that compel action - it all about the money.”

    “Do not follow any links in an email. If you get an invoice, do not enable ANY macros (should be a popup).”

    “Be careful where you are internet surfing.  Between February 25 2020 and March 25, 2020, over 500k websites were created and the FBI estimates that over 450k of them held malicious code in them.”

    “Google ads can be cloned by not the real company they supposedly represent and have malicious code downloaded into your computer by simply clicking.”

    “We need to have a culture of security by having layers of security.”

    “No personal emails on your work computer.”

    “Every business in the US should have a firewall.”

     “Every business should have a perimeter defense.”

    “They need a firewall that needs an active IDS that is constantly updating, like a traffic cop standing on the corner, making sure that all traffic has permission to be there.”

     “Use active directory to grant user permissions for a workplace server.”

    “Guest accounts should have restrictions in the active directory setup.”

    “Always use a VPN on your phone or laptop at a restaurant or hotel when accessing their internet.”

    “Using Google’s Incognito protects your privacy in search but does not protect from malicious coding.”

    “The purpose of an active backup is to get back up as quickly as possible in the event of a malicious attack or crash.”

    “The four layers need to be in your practice or workplace.”

    Links & Resources 

    Debi Carr’s Website:     https://dkcarr.com/ 

    DK Carr & Associates Phone:  (844) 352-2771

    Janice Janssen’s Website:   GTSGurus.com (sign up for the newsletter)

    GTS Phone:  844-664-4487

    Susan’s Website:  https://SusanGunnSolutions.com  (sign up for the newsletter)

    SGS Phone:  888-994-3167

    Book Money In, Money Out: Financial Organization In Your Practice 

    Book Getting The Most Out of QuickBooks In Your Practice  

    Book Advanced QuickBooks In Your Practice  

    Ask The Expert Online Consultation

    Show more Show less
activate_primeday_promo_in_buybox_DT

What listeners say about SECURING YOUR WORK TECHNOLOGY

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.