Couverture de Plaintext with Rich

Plaintext with Rich

Plaintext with Rich

De : Rich Greene
Écouter gratuitement

À propos de ce contenu audio

Cybersecurity is an everyone problem. So why does it always sound like it’s only for IT people?


Each week, Rich takes one topic, from phishing to ransomware to how your phone actually tracks you, and explains it in plain language in under ten minutes or less. No buzzwords. No condescension. Just the stuff you need to know to stay safer online, explained like you’re a smart person who never had anyone break it down properly. Because you are!

© 2026 Plaintext with Rich
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !
    Épisodes
    • Zero Trust, Explained In Plain Text
      Feb 20 2026

      A breach that looks like a normal login can slip past the loudest alarms. That simple truth reshaped how we think about defense and led us to a clearer model: access is the attack surface, and trust must be earned every time. We unpack zero trust in plain language, showing how to move from implied safety behind a perimeter to conditional, per-request decisions that scale across cloud, remote work, and vendor ecosystems.

      We start with the core signals that drive better decisions: identity that’s verified beyond passwords using strong multi-factor authentication; device posture that proves a system is updated, encrypted, and managed; and least privilege that connects people only to what they need right now. From there, we add segmentation to contain failures and reduce lateral movement. Along the way, we contrast traditional VPNs with zero trust network access, highlighting why connecting users to applications not entire networks shrinks blast radius and adapts access as risk changes.

      Then we get tactical with a zero trust starter kit you can apply without a full rebuild. Separate daily and admin accounts, map your real access paths across SSO, cloud consoles, remote management, and vendor portals, enforce baseline device standards, and narrow connectivity around crown jewels like finance platforms, production, and admin consoles. We close by clearing common myths: zero trust isn’t “trust no one,” it isn’t a product you buy once, and it’s not just for large enterprises. Smaller teams often gain the most because a single compromised account can be devastating.

      If this breakdown helps you see your environment more clearly, follow the show, share it with someone who’s on the hook for security outcomes, and leave a quick review to tell us what to tackle next.

      Is there a topic/term you want me to discuss next? Text me!!

      Afficher plus Afficher moins
      8 min
    • How Supply Chain Attacks Turn Trust Into Exposure
      Feb 13 2026

      Your defenses can be flawless and still fail when the breach starts upstream. We unpack how modern supply chains software updates, cloud services, MSPs, contractors, and open source libraries turn everyday trust into an attack surface, and what it takes to build resilience without grinding work to a halt. From tampered updates to phished third-party accounts and poisoned dependencies, we map the repeat patterns that let one supplier compromise ripple into hundreds of customers, and explain why these intrusions look like routine business rather than obvious threats.

      We keep it plain and practical with a starter kit designed for high impact: identify your crown jewels so protection has focus, list the vendors who hold your data or access, enforce least privilege ruthlessly, and treat vendor logins like production keys with mandatory MFA. Then, level up with targeted visibility monitor unusual vendor behavior such as new locations, large downloads, permission spikes, or disabled controls and move fast on critical patches for shared components, because common libraries create common urgency. We also cover the questions that separate security theater from reality: MFA by default, patch timelines for critical CVEs, incident notification practices, role-based access, and SSO support.

      Contracts matter, so put expectations in writing: breach notification windows, required controls, and clear ownership. And when all else fails, tested backups are the difference between disaster and a brief interruption restore drills turn plans into confidence. Smaller teams aren’t spared; they often depend on more third-party tools and get caught in the collateral damage when a popular vendor is hit. You can’t control every supplier, but you can control access, monitoring, and recovery. List your vendors, enforce MFA on every vendor account, limit access aggressively, and verify backups by doing a real restore. If this breakdown helps, subscribe, share it with a teammate, and leave a quick review so others can find it too.

      Is there a topic/term you want me to discuss next? Text me!!

      Afficher plus Afficher moins
      8 min
    • How Phishing Wins By Borrowing Your Emotions
      Feb 6 2026

      Most breaches don’t start with malware. They start with a feeling. We explore why social engineering works so well in ordinary moments, and how attackers lean on urgency, authority, and fear to push quick clicks, rushed approvals, and hasty payments. From email to texts, calls, QR codes, and AI‑polished messages, the goal is always the same: capture your action before your judgment arrives.

      We walk through clear definitions to separate phishing from the broader field of social engineering, then map the modern attack surface: smishing that imitates banks and delivery alerts, vishing that mimics support desks and fraud departments, business email compromise that reroutes invoices, and MFA fatigue attacks that poke until someone taps approve. You’ll hear how voice cloning and fluent writing make lures feel familiar, and why the best fix isn’t being smarter it’s being slower.

      To make that practical, we share an anti‑phishing starter kit you can use today. Pause for ten seconds when messages touch money, passwords, codes, downloads, or urgency. Verify requests in a second channel you already trust. Treat “unexpected plus urgent” as suspicious by default. Then add stronger layers: inspect domains and destinations, use password managers for detection, prefer passkeys or hardware keys for MFA, and require two‑person approvals for wire transfers, vendor changes, and payroll updates. If you’ve already clicked, act fast: alert security, change passwords from a clean path, check MFA and forwarding rules, and escalate immediately when money is at risk. We end by busting three myths: good phishing isn’t obvious, confidence invites mistakes, and training helps but processes stop more.

      If this helped, share it with someone who moves fast under pressure, subscribe for future plain‑text breakdowns, and leave a quick review to help others find the show.

      Is there a topic/term you want me to discuss next? Text me!!

      Afficher plus Afficher moins
      9 min
    Aucun commentaire pour le moment