Check out our companion blog!

Videos

Sept. 4, 2024

Top Free Security Awareness Training Resources You Must Know

Discover essential online resources for free or low-cost security awareness training! In this video, we review helpful tools from the FTC, NIST, and other organizations to enhance your cybersecurity knowledge. Don't miss out on these valuable insights! #SecurityAwareness #Cybersecurity #FreeTraining #NIST #FTCResources #InternetSafety #OnlineLearning #DataProtection #CyberAwareness #SecurityTraining

View more
Sept. 4, 2024

Essential Tips to Spot Fishing Scams Before You Click

Learn how to protect yourself from fishing scams in this video. We'll explore crucial indicators and red flags to watch for before clicking on links or emails. Stay safe online and make informed decisions with these expert strategies. #FishingScams #OnlineSafety #CyberSecurity #PhishingAwareness #EmailScams #CyberHygiene #ProtectYourself #InternetSafety #ScamPrevention #StayAlert

View more
Sept. 3, 2024

Master Ransomware Defense: Essential Security Strategies

In this video, discover key strategies to eliminate up to 95% of ransomware threats. We discuss the importance of patch management, password security, MFA, and user training for both admins and users to protect your organization effectively. #RansomwareDefense #CyberSecurity #MFA #PasswordManagement #PatchManagement #UserTraining #SecurityStrategies #InformationSecurity #CyberAwareness #ITSafety

View more
Sept. 3, 2024

How Metrics-Based Bonuses Transform Team Performance

Discover how evaluating departmental metrics can boost workplace engagement and results. This video explores the implementation of standards that lead to quarterly bonuses, ensuring team motivation and success align with performance goals. #TeamPerformance #Metrics #EmployeeEngagement #Bonuses #BusinessSuccess #WorkplaceMotivation #DepartmentalStandards #Productivity #QuarterlyReviews #CorporateCulture

View more
Sept. 3, 2024

Shocking Statistics: Why Stolen Devices Cause Data Breaches

In this video, we uncover staggering statistics linking stolen devices to data breaches. Learn from real-life cases, including how an unsecured laptop led to significant vulnerabilities. Protect your data effectively by understanding these risks! #DataProtection #CyberSecurity #StolenDevices #BreachAwareness #DataSafety #EmployeeSecurity #CyberThreats #LaptopSecurity #TechAwareness #InformationSecurity

View more
Sept. 2, 2024

Protect Yourself: Avoid Malware in Google Search Results

Learn how to safeguard yourself from malware disguised as legitimate downloads. This video discusses the importance of vetting search results and educating users about online security. Don't fall victim to phishing attacks through unexpected sources! #MalwarePrevention #OnlineSafety #CyberSecurityTips #SearchEngineSafety #UserEducation #PhishingAwareness #TechTips #DigitalSecurity #CyberThreats #SafeBrowsing

View more
Sept. 2, 2024

Connecting Management with Customers: My IT Journey

In this video, I share my experience in the IT department of a credit card company and how management's initiative to engage with customers transformed our perspectives. Discover the good and bad of this unique approach to customer support. #CustomerSupport #ITJourney #ManagementStrategy #BusinessInsights #CreditCardCompany #CustomerEngagement #TechSupport #EmployeeExperience #BusinessManagement #LeadershipTips

View more
Sept. 2, 2024

Master Cybersecurity Training: Strategies for Success

Discover expert strategies for effective cybersecurity training in this must-watch video. Learn how to create engaging programs, implement best practices, and build a strong security culture in your organization. Whether you're an IT pro or business owner, these tips will help strengthen your digital defenses against evolving cyber threats. While…

View more
Sept. 2, 2024

Mastering Phishing: Test Your Skills with Real Scenarios

Discover how companies like KnowBe4 and HawksHunt are transforming cybersecurity training. This video explores effective methods to identify phishing scams and why ongoing training is crucial for everyone. Safeguard your digital world by enhancing your phishing detection skills! #PhishingAwareness #CyberSecurity #KnowBe4 #HawksHunt #EmailSafety #CyberTraining #OnlineSecurity #PhishingScams #DigitalSafety #InformationSecurity

View more
Sept. 2, 2024

Is Your Camera Watching You? Unsettling Tech Experiences

Explore chilling encounters with technology, like unexpected camera activations and spooky mouse movements. Learn the importance of staying alert to unusual digital behaviors and how to help others identify potential scams and tech anomalies. Stay safe in our tech-driven world! #TechConcerns #DigitalSafety #CameraPrivacy #SpookyTech #ModernLife #TechScams #CyberAwareness #PrivacyMatters #Gadgets #StayInformed

View more
Aug. 28, 2024

Massive Health Care Hack: 1 Million Patient Records Stolen

Discover the shocking details of a major health care breach where a fired employee accessed sensitive data. This video unravels how a lapse in security led to the theft of a million patients' records and what it means for healthcare privacy. #HealthCareHack #DataBreach #PatientPrivacy #CyberSecurity #DataProtection #MicrosoftSubsidiary #HealthCareSecurity #ITSecurity #PrivacyMatters…

View more
Aug. 26, 2024

How to write an Incident Response Plan? Cybersecurity 101

Discover what an incident response plan is and why it's crucial for your organization's cyber resilience. Expert Dr. Mike Saylor breaks down key components, from business impact analysis to testing strategies. Then we talk about the components of the plan and where to store it. Learn how to protect your…

View more
Aug. 19, 2024

Cyberattack Blast Radius: How to Minimize Damage

Discover expert strategies to minimize the cyberattack blast radius and protect your business. Learn about least privilege access, network segmentation, and outbound traffic control from cybersecurity expert Mike Saylor. Essential viewing for IT pros and business owners looking to enhance their cyber defenses and mitigate potential damages from attacks. While…

View more
Aug. 12, 2024

Ransomware Forensics 101: Protect Your Data

Dive into the world of ransomware forensics with cybersecurity expert Mike Saylor. Learn essential steps in cyber attack analysis, including evidence preservation, forensic imaging, and mobile device forensics. Discover key tools and techniques to protect your organization's data and strengthen your cyber defenses against ransomware threats. While you're here, Here's…

View more
Aug. 5, 2024

The Truth About Cyber Security Insurance

Dive into the world of cyber security insurance with expert Mike Saylor and your hosts W. Curtis Preston and Prasanna Malaiyandi. Uncover crucial insights on maximizing your coverage, preparing for incidents, and leveraging insurer expertise. Whether you're a small business owner or corporate executive, this video provides essential knowledge to…

View more
July 29, 2024

Advanced Ransomware prevention

Discover essential ransomware prevention strategies in this comprehensive guide. From application whitelisting to building relationships with security experts, we cover crucial techniques to protect your organization. Whether you're an IT professional or business owner, this video provides valuable insights to enhance your cybersecurity posture. Don't miss these expert tips on…

View more
July 22, 2024

Master Cybersecurity Training: Strategies for Success

Discover expert strategies for effective cybersecurity training in this must-watch video. Learn how to create engaging programs, implement best practices, and build a strong security culture in your organization. Whether you're an IT pro or business owner, these tips will help strengthen your digital defenses against evolving cyber threats. While…

View more
July 15, 2024

How to survive an IT Security Audit

Discover how to survive a comprehensive IT security audit to protect your organization from cyber threats. This video covers essential steps, including user education, application whitelisting, and securing remote access. Learn best practices from IT security experts and strengthen your cyber defenses today. While you're here, Here's some great episodes…

View more
July 8, 2024

How to Stop Ransomware Attacks: 3 Essential Strategies

Discover how to stop ransomware attacks with three essential strategies: patch management, password security, and multi-factor authentication. Learn why these methods are crucial for protecting your data and systems from cyber threats. IT professionals and business owners alike will gain valuable insights on strengthening their cybersecurity defenses. Don't miss this…

View more
July 1, 2024

How Do You Make Immutable Backups to Defeat Ransomware?

Discover how to make immutable backups in this comprehensive guide. Learn why immutable backups are crucial for protecting your data against ransomware and other cyber threats. We cover different implementation options, best practices, and common pitfalls to avoid. Whether you're an IT pro or just getting started with data protection,…

View more
June 25, 2024

How to Protect Backups from Ransomware

Discover expert strategies on how to protect backups from ransomware attacks. Learn about immutable storage, access controls, and monitoring to secure your data's last line of defense. Don't let cybercriminals compromise your critical data - watch now to fortify your backup systems against ransomware threats! While you're here, Here's some…

View more
June 17, 2024

What is ransomware? How does it work?

🔒 Ransomware is a major cybersecurity threat that can devastate businesses and individuals. In this video, we explore how ransomware works, from initial access to data exfiltration, and discuss the critical importance of prevention and recovery strategies. Learn about the evolution of ransomware and discover practical advice for protecting yourself…

View more
June 10, 2024

What is SIEM, SOAR, and XDR? A Comprehensive Overview

Discover the power of SIEM, SOAR, and XDR in protecting your organization from cyber threats. In this video, we define these essential tools, explore real-world examples of their effectiveness, and provide guidance on choosing and implementing the right solution for your business. While you're here, Here's some great episodes from…

View more
June 3, 2024

Cybersecurity Blue Team Strategies: Proven Tactics for Defending Your Organization

Discover proven cybersecurity blue team strategies to defend your organization against evolving threats. This video explores the key tactics and real-world examples of effective blue teams in action, from implementing robust monitoring tools to conducting incident response drills. Learn how to build a resilient defense and stay one step ahead…

View more