Latest Shows

Listen and Read

The Latest!

Implementing Duo for Multi-Factor Protection on Microsoft 365 and Active Directory

Implementing Duo for Multi-Factor Protection on Microsoft 365 and Active Directory

Overview Hey there! I'm Craig Peterson, your go-to cybersecurity consultant. Let's chat about something crucial: setting up Duo Multi-Factor Authentication (MFA) with your Microsoft 365 email and Active Directory-controlled network computers. This is vital, especially if you're handling Controlled Unclassified Information (CUI). So, let me share my favorite steps to get you secured and efficient! Step 1: Check Your Prerequisites First things first, ensure you have admin access to Microsoft 365 and Active Directory. This is important because you'll need to make some changes to these systems. Step 2: Create a Duo Account Next up, head over to Duo's website(https://duo.com) and sign up. Why Duo? It's more secure than SMS-based 2FA and super user-friendly. Step 3: Integrate Duo with Active Directory Here's a key step: You'll need to integrate Duo with your Active Directory. This can be a bit technical, but essentially, you're linking Duo to your network to manage access securely. Step 4:...

2 Things Just Got Easier For Small Businesses To Protect Themselves From Hackers

2 Things Just Got Easier For Small Businesses To Protect Themselves From Hackers

Small businesses are big targets for hackers. That's because they're often seen as easy targets with limited budgets and resources when it comes to cybersecurity. And unfortunately, many small businesses fall victim to cyber-attacks every year. But don't worry! You can still protect your business with the help of DNS filtering. Small businesses, big targets: Despite their size, small businesses are often seen as easy targets by those pesky hosers (hackers). Just remember, you can't fly under their radar, folks! Small businesses, big targets: Despite their size, small businesses are often seen as easy targets by those pesky hosers (hackers). Just remember, you can't fly under their radar, folks! Hackers are looking for easy targets, and know that most small businesses don't have the resources or knowledge to protect themselves against cyberattacks. Small business owners need to be aware of this and do everything possible to keep themselves safe from hackers. The grim numbers: Brace...

Outsmarting Cyber Chaos: Defense Tactics to Stop Digital Disruptors!

Outsmarting Cyber Chaos: Defense Tactics to Stop Digital Disruptors!

Get ready to buckle up, folks! I've got some exciting insider info for you about those sneaky cyber criminals who love causing chaos on people's computers. It may sound like a plot straight out of a thrilling blockbuster movie, but trust me, it's all too real. Imagine your precious photos, important documents, and everything you hold dear locked away until you pay up to some big, bad bully. Talk about nightmare material! But why is this becoming so widespread? Well, these bullies are raking in a fortune from it, and as long as the money keeps pouring in, they won't be disappearing anytime soon. So, what can we, the heroes, do to shield ourselves? Here are some golden nuggets of wisdom to keep you safe from these sticky situations: 1.) Keep Your Files on Lockdown: Make sure to regularly back up all your files, whether it's on an external hard drive or a trusted cloud service. That way, even if an unexpected visitor tries to hold them hostage on your computer, you'll have a secure copy...

Don’t Let Them Spy on You: Protect Yourself from Sneaky Keyboard Attacks!

Don’t Let Them Spy on You: Protect Yourself from Sneaky Keyboard Attacks!

🤯 Did you know that UK universities have mastered the art of eavesdropping on your keyboard? 🎧 That's right, they don't need any fancy gadgets or gizmos – just a simple microphone! And get this, they've got a jaw-dropping success rate of a whopping 95%! 😱 You've got to admit, that's enough to send shivers down your spine! But wait, it gets even crazier! They put their skills to the test using the popular video call app, Zoom, and still achieved an impressive accuracy rate of 93%! Can you imagine the danger if this technology falls into the wrong hands? 😮 These covert listening attacks are no joke, my friends. They pose a serious threat to your privacy and security. Your passwords could be exposed, and those supposedly confidential messages might not be as safe as you thought. It's like having a nosy intruder peering over your shoulder, invading your personal space! 🙈 And here's the scary part – these attacks are on the rise! 😱 With microphones embedded in almost every device we use...

Cybersecurity and Privacy Checklist for Home Users and Small Businesses

Cybersecurity and Privacy Checklist for Home Users and Small Businesses

Batteries in your fire alarms aren’t the only things you should do when the clocks change. It’s also the perfect time to check into our cybersecurity stance... 🔒 Cybersecurity and Privacy Checklist for Home Users and Small Businesses 🔒 Protecting your digital life is crucial, whether you're a home user or a small business owner. While you may already have some security measures in place, there are a few things that often get overlooked. Let's make sure you're covering the bases in this handy cybersecurity checklist: 🌐 Secure your Wi-Fi: Change the default password on your router, use WPA2 encryption, and create a strong network password. This will keep unwanted guests from accessing your network and potentially compromising your data. 🔐 Update your devices and software: Regularly update your operating systems, antivirus software, and all other applications running on your devices. These updates often include critical security patches that can prevent hackers from exploiting...

The Unseen Tech Revolution in Our Military Today and Tomorrow

The Unseen Tech Revolution in Our Military Today and Tomorrow

Let's dive a bit deeper into how modern technologies are being used in conflicts, particularly in Ukraine and Gaza. Ukraine… Cyber First Russia initiated its first attacks prior to the physical invasion by launching repeated distributed denial of service (DDoS) attacks and employing a cyber-weapon called "FoxBlade," a trojan horse wiper malware identified by Microsoft. The aim was to disrupt internet connectivity and cripple Ukraine's command and control centers. According to a Microsoft report, the initial observers of the attack were based in Redmond, Washington, in the United States, demonstrating the reach of modern technology. In response, Ukraine swiftly moved its digital infrastructure to the public cloud, hosting it in data centers across Europe.  Additionally, during the invasion, a cyberattack that disabled the Viasat's KA-SAT Satellite communications network in Europe. Ukraine has collaborated with various international tech companies, including Cloudflare and Microsoft,...

Eye Spy for Download Scams: How to Spot and Avoid Hackers Trying to Trick You!

Eye Spy for Download Scams: How to Spot and Avoid Hackers Trying to Trick You!

Hey there, folks! Discover how to outsmart sneaky download scams aiming to steal your data! Learn how seemingly harmless attachments can be malicious, and protect yourself with expert tips, in this eye-opening article. Today, I want to talk to you about a sneaky little trick some Cyberhosers like to use. It's called a download scam, and it can really mess up your day if you're not careful. So here's how it works: You receive an email from someone you may or may not know asking you to open or download a document attachment. It could be something innocent, like a PDF file that seems harmless enough at first glance. But listen up – behind that innocent-looking attachment lies danger! When you click on the attachment, it might ask you to sign in to another website, like an email provider or a file-sharing platform. Seems legit, right? Wrong! That link is actually what we call a phishing site – designed by those pesky hosers who are out to steal your personal information 🕵️‍♂️ Once...

Unleash the Power of Security: Uncover the Ultimate Authentication Methods for Unparalleled System and Data Access Control

Unleash the Power of Security: Uncover the Ultimate Authentication Methods for Unparalleled System and Data Access Control

Protecting systems and data has become increasingly important in today’s digital age. With cybercrime on the rise, it is crucial to have robust authentication methods in place to control access to sensitive information. We'll explore the top authentication methods for controlling access to systems and data. Passwords These have long been the most common form of authentication. They are easy to implement, low-cost, and widely used. However, they are also often the weakest link in the security chain. Passwords can easily be guessed, stolen, or forgotten, making them vulnerable to attacks. Organizations often implement strong password policies, multi-factor authentication, and password managers to improve password security. Two-Factor and Multi-factor Authentication Two-factor and Multi-factor (2FA/MFA) are more secure forms of authentication than using passwords alone. It requires the user to provide two forms of identification, such as a password and a one-time code sent to a mobile...