Check out our companion blog!

Videos

Sept. 2, 2024

Connecting Management with Customers: My IT Journey

Connecting Management with Customers: My IT Journey

In this video, I share my experience in the IT department of a credit card company and how management's initiative to engage with customers transformed our perspectives. Discover the good and bad of this unique approach to customer support. #CustomerSupport #ITJourney #ManagementStrategy #BusinessInsights #CreditCardCompany #CustomerEngagement #TechSupport #EmployeeExperience #BusinessManagement #LeadershipTips

View more
Sept. 2, 2024

Master Cybersecurity Training: Strategies for Success

Master Cybersecurity Training: Strategies for Success

Discover expert strategies for effective cybersecurity training in this must-watch video. Learn how to create engaging programs, implement best practices, and build a strong security culture in your organization. Whether you're an IT pro or business owner, these tips will help strengthen your digital defenses against evolving cyber threats. While…

View more
Sept. 2, 2024

Mastering Phishing: Test Your Skills with Real Scenarios

Mastering Phishing: Test Your Skills with Real Scenarios

Discover how companies like KnowBe4 and HawksHunt are transforming cybersecurity training. This video explores effective methods to identify phishing scams and why ongoing training is crucial for everyone. Safeguard your digital world by enhancing your phishing detection skills! #PhishingAwareness #CyberSecurity #KnowBe4 #HawksHunt #EmailSafety #CyberTraining #OnlineSecurity #PhishingScams #DigitalSafety #InformationSecurity

View more
Sept. 2, 2024

Is Your Camera Watching You? Unsettling Tech Experiences

Is Your Camera Watching You? Unsettling Tech Experiences

Explore chilling encounters with technology, like unexpected camera activations and spooky mouse movements. Learn the importance of staying alert to unusual digital behaviors and how to help others identify potential scams and tech anomalies. Stay safe in our tech-driven world! #TechConcerns #DigitalSafety #CameraPrivacy #SpookyTech #ModernLife #TechScams #CyberAwareness #PrivacyMatters #Gadgets #StayInformed

View more
Aug. 28, 2024

Massive Health Care Hack: 1 Million Patient Records Stolen

Massive Health Care Hack: 1 Million Patient Records Stolen

Discover the shocking details of a major health care breach where a fired employee accessed sensitive data. This video unravels how a lapse in security led to the theft of a million patients' records and what it means for healthcare privacy. #HealthCareHack #DataBreach #PatientPrivacy #CyberSecurity #DataProtection #MicrosoftSubsidiary #HealthCareSecurity #ITSecurity #PrivacyMatters…

View more
Aug. 26, 2024

How to write an Incident Response Plan? Cybersecurity 101

How to write an Incident Response Plan? Cybersecurity 101

Discover what an incident response plan is and why it's crucial for your organization's cyber resilience. Expert Dr. Mike Saylor breaks down key components, from business impact analysis to testing strategies. Then we talk about the components of the plan and where to store it. Learn how to protect your…

View more
Aug. 19, 2024

Cyberattack Blast Radius: How to Minimize Damage

Cyberattack Blast Radius: How to Minimize Damage

Discover expert strategies to minimize the cyberattack blast radius and protect your business. Learn about least privilege access, network segmentation, and outbound traffic control from cybersecurity expert Mike Saylor. Essential viewing for IT pros and business owners looking to enhance their cyber defenses and mitigate potential damages from attacks. While…

View more
Aug. 12, 2024

Ransomware Forensics 101: Protect Your Data

Ransomware Forensics 101: Protect Your Data

Dive into the world of ransomware forensics with cybersecurity expert Mike Saylor. Learn essential steps in cyber attack analysis, including evidence preservation, forensic imaging, and mobile device forensics. Discover key tools and techniques to protect your organization's data and strengthen your cyber defenses against ransomware threats. While you're here, Here's…

View more
Aug. 5, 2024

The Truth About Cyber Security Insurance

The Truth About Cyber Security Insurance

Dive into the world of cyber security insurance with expert Mike Saylor and your hosts W. Curtis Preston and Prasanna Malaiyandi. Uncover crucial insights on maximizing your coverage, preparing for incidents, and leveraging insurer expertise. Whether you're a small business owner or corporate executive, this video provides essential knowledge to…

View more
July 29, 2024

Advanced Ransomware prevention

Advanced Ransomware prevention

Discover essential ransomware prevention strategies in this comprehensive guide. From application whitelisting to building relationships with security experts, we cover crucial techniques to protect your organization. Whether you're an IT professional or business owner, this video provides valuable insights to enhance your cybersecurity posture. Don't miss these expert tips on…

View more
July 22, 2024

Master Cybersecurity Training: Strategies for Success

Master Cybersecurity Training: Strategies for Success

Discover expert strategies for effective cybersecurity training in this must-watch video. Learn how to create engaging programs, implement best practices, and build a strong security culture in your organization. Whether you're an IT pro or business owner, these tips will help strengthen your digital defenses against evolving cyber threats. While…

View more
July 15, 2024

How to survive an IT Security Audit

How to survive an IT Security Audit

Discover how to survive a comprehensive IT security audit to protect your organization from cyber threats. This video covers essential steps, including user education, application whitelisting, and securing remote access. Learn best practices from IT security experts and strengthen your cyber defenses today. While you're here, Here's some great episodes…

View more
July 8, 2024

How to Stop Ransomware Attacks: 3 Essential Strategies

How to Stop Ransomware Attacks: 3 Essential Strategies

Discover how to stop ransomware attacks with three essential strategies: patch management, password security, and multi-factor authentication. Learn why these methods are crucial for protecting your data and systems from cyber threats. IT professionals and business owners alike will gain valuable insights on strengthening their cybersecurity defenses. Don't miss this…

View more
July 1, 2024

How Do You Make Immutable Backups to Defeat Ransomware?

How Do You Make Immutable Backups to Defeat Ransomware?

Discover how to make immutable backups in this comprehensive guide. Learn why immutable backups are crucial for protecting your data against ransomware and other cyber threats. We cover different implementation options, best practices, and common pitfalls to avoid. Whether you're an IT pro or just getting started with data protection,…

View more
June 25, 2024

How to Protect Backups from Ransomware

How to Protect Backups from Ransomware

Discover expert strategies on how to protect backups from ransomware attacks. Learn about immutable storage, access controls, and monitoring to secure your data's last line of defense. Don't let cybercriminals compromise your critical data - watch now to fortify your backup systems against ransomware threats! While you're here, Here's some…

View more
June 17, 2024

What is ransomware? How does it work?

What is ransomware? How does it work?

🔒 Ransomware is a major cybersecurity threat that can devastate businesses and individuals. In this video, we explore how ransomware works, from initial access to data exfiltration, and discuss the critical importance of prevention and recovery strategies. Learn about the evolution of ransomware and discover practical advice for protecting yourself…

View more
June 10, 2024

What is SIEM, SOAR, and XDR? A Comprehensive Overview

What is SIEM, SOAR, and XDR? A Comprehensive Overview

Discover the power of SIEM, SOAR, and XDR in protecting your organization from cyber threats. In this video, we define these essential tools, explore real-world examples of their effectiveness, and provide guidance on choosing and implementing the right solution for your business. While you're here, Here's some great episodes from…

View more
June 3, 2024

Cybersecurity Blue Team Strategies: Proven Tactics for Defending Your Organization

Cybersecurity Blue Team Strategies: Proven Tactics for Defending Your Organization

Discover proven cybersecurity blue team strategies to defend your organization against evolving threats. This video explores the key tactics and real-world examples of effective blue teams in action, from implementing robust monitoring tools to conducting incident response drills. Learn how to build a resilient defense and stay one step ahead…

View more
May 27, 2024

What is a Red Team in Cyber Security? Expert Insights

What is a Red Team in Cyber Security? Expert Insights

In this video, we explore the concept of a red team in cyber security and its crucial role in strengthening an organization's defenses. Join us as we sit down with Dwayne Laflotte, a seasoned offensive cybersecurity expert and the CTO and red team leader at Pulsar Security. Dwayne shares his…

View more
May 20, 2024

Google Cloud Disaster: How UniSuper Narrowly Avoided Catastrophe

Google Cloud Disaster: How UniSuper Narrowly Avoided Catastrophe

In this video, we explore the harrowing tale of Australian pension provider UniSuper's brush with disaster when Google accidentally deleted their entire cloud environment. With over $125 billion and 600,000 members' accounts at stake, this incident highlights the importance of robust backup strategies and disaster recovery planning for organizations relying…

View more
May 13, 2024

How eDiscovery Services are Transforming Legal Cases

How eDiscovery Services are Transforming Legal Cases

Are you a legal professional looking to streamline your eDiscovery process? Or perhaps you're an IT expert interested in the latest advancements in legal technology? In this video, we explore the world of electronic discovery services and how they're revolutionizing the way legal teams handle data in the digital age.…

View more
May 6, 2024

Cloud Computing disaster recovery: Lessons

Cloud Computing disaster recovery: Lessons

In this video, we explore the critical relationship between cloud computing and disaster recovery. Learn the essential best practices to protect your data and ensure business continuity in the cloud. Discover strategies for choosing a reliable provider, implementing the 3-2-1 rule, and utilizing thi

View more
April 29, 2024

Protecting Your YouTube Channel from Data Loss: "Life Uncontained" Crash

Protecting Your YouTube Channel from Data Loss: "Life Uncontained" Crash

In this video, we dive deep into the devastating data loss experienced by the popular YouTube channel "Life Uncontained" and the valuable lessons we can all learn from their unfortunate crash. The life uncontained data loss incident serves as a stark reminder of the importance of implementing robust backup strategies…

View more
April 22, 2024

Doctorate Students Lose Research Data on Dedoose

Doctorate Students Lose Research Data on Dedoose

In 2014, the cloud-based qualitative research platform Dedoose experienced a catastrophic crash that led to the loss of customer data and backups. Researchers lost countless hours of work in the Dedoose outage. In this video, we dive into the details of the Dedoose data disaster. We look at how it…

View more