Épisodes

  • Security Operations Centers (SOCs): Saving You Big Bucks and Lots of Sleep
    Jun 19 2024
    A few episodes back, we talked about Security Incident Event Managers (SIEMs) and how they watch for things like employees logging into Microsoft 360 through the wrong network or the sudden deletion of a lot of files from OneDrive. Security Operations Centers, or SOCs, work hand-in-hand with SIEMs to enhance your cybersecurity. Basically, the SIEM creates the log of potentially suspicious activity, and the SOC reviews the logs and sends out alerts if it sees anything that might be suspicious – even if it’s a false positive. If you are a solopreneur or own a small company, chances are you don’t have IT on call 24/7, so the SOC works while you sleep (and can even wake you up if something’s amiss). If this doesn’t have your attention, do you have business insurance? You might be paying more because you don’t have a SOC. In this episode, Tom Wyant shows you how a SOC not only gives you peace of mind, but basically functions as a member of your cybersecurity superhero squad while saving you money – and sleep – across the board. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity NeedsHow will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Security Operations Centers (SOCs): Saving You Big Bucks and Lots of Sleep first appeared on The Wyant Cybersecurity Brief.
    Afficher plus Afficher moins
    5 min
  • Third-Party Spam Filtering: A Rarely-Discussed Reason Why You Need It
    Jun 12 2024
    Almost all e-mail providers come with some sort of spam filtering, and while it’s usually halfway decent at telling the difference, yes it can be annoying when it send legitimate e-mail to spam. But have you considered that you might WANT your legitimate e-mail to go to spam? Microsoft 365 is a very reliable platform that rarely goes down, but like any cloud-based or remote service, there are occasional glitches, network issues, downtimes, and the like. With a third-party spam filter, you’ll still be able to retrieve that urgent e-mail you’ve been waiting for even while your e-mail itself is down. In this episode, Tom Wyant reveals how this works and why this could be the “aha moment” that spares you a lot of grief and silly office-politics nonsense – not to mention adding extra layers of cybersecurity, of course. We told you cybersecurity could be fun, and what’s more enjoyable than avoiding the stress of missing out because your e-mail is down? Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity NeedsHow will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Third-Party Spam Filtering: A Rarely-Discussed Reason Why You Need It first appeared on The Wyant Cybersecurity Brief.
    Afficher plus Afficher moins
    5 min
  • Encryption Strategies: Keeping Hackers In The Dark (And Your Lights On)
    Jun 5 2024
    Whether you’re an established expert at cybersecurity, an up-and-coming dynamo, or a layperson who’s here educating yourself, you have probably at least heard the word “encryption”. We use several types of encryption. One goes on laptop hard drives so if the employee or user gets separated from their laptop (lost or stolen or whatever), nobody can just pop out the hard drive and learn your secrets. Another is e-mail encryption, which is especially important if you work in a regulated industry where standards like HIPAA apply, or even if you just want an extra layer of protection from competitor spies. Did you know that Microsoft 365 email can be encrypted so that by simply adding a particular word to the subject line, you can immediately enforce end-to-end encryption? In this episode, Tom Wyant takes you through the ins and outs of encryption and how to put it to work for you. If someone can steal a whole antenna from a radio station, they can read your e-mail. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity NeedsHow will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Encryption Strategies: Keeping Hackers In The Dark (And Your Lights On) first appeared on The Wyant Cybersecurity Brief.
    Afficher plus Afficher moins
    6 min
  • Security Incident Event Managers (SIEMs): Protecting the Seams in Your Proverbial Pants
    May 29 2024
    Security Incident Event Managers (SIEMs) are not the seams in your pants or the seams in your shirts – but they will protect the seams in your proverbial pants from getting ripped open by hackers, malware, and bad actors. In many cases, potential threats to your users’ security look innocuous enough, such as the case when an employee who uses a VPN forgot to shut it off before accessing his Microsoft 365 inbox from his laptop. When your SIEM picks up a ton of files getting deleted all at once from OneDrive, is that an employee just doing a little spring cleaning of old rough drafts and documents they no longer need, or is a hacker in your system stealing your company secrets? In this episode, Tom Wyant gives a detailed layout of how SIEMs work to continuously monitor your network and your users’ machines. You’ll hear about Syslogs and SOCs (the latter of which we’ll cover in an upcoming episode), but you’ll pick it up quickly – and if you already know, it makes a handy checklist for review. You know what they say – better safe than sorry, yes? Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity NeedsHow will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Security Incident Event Managers (SIEMs): Protecting the Seams in Your Proverbial Pants first appeared on The Wyant Cybersecurity Brief.
    Afficher plus Afficher moins
    6 min
  • Security Awareness Training: Yes, Cybersecurity CAN Be Fun!
    May 22 2024

    Here at the Wyant Cybersecurity Brief, our mission is to take cybersecurity – which many people dread as an expense, a chore, or just an annoyance – and makes it easy and fun (yes, fun) for everyone.

    You can do this through how you design your Security Awareness Training.

    Basically, this involves teaching our users how to recognize and avoid phishing scams, occasionally testing them to see if they fall for it, and testing them weekly to see where they are on their skills.

    In this episode, Tom Wyant reveals how his process for Security Awareness Training involves tapping into a very common human emotion that can excite your users and make them look forward to their weekly quizzes – you have to check this out!

    Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better!

    Get Support For Your Cybersecurity Needs

    How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible?

    Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs:

    https://www.GoWyant.com/

    Connect With Wyant Technologies and Tom Wyant Now

    Website –

    https://www.GoWyant.com/

    Social Media –

    https://www.wyantcybersecuritybrief.com/facebook/
    https://www.wyantcybersecuritybrief.com/youtube/
    https://www.wyantcybersecuritybrief.com/linkedin/

    The post Security Awareness Training: Yes, Cybersecurity CAN Be Fun! first appeared on The Wyant Cybersecurity Brief.

    Afficher plus Afficher moins
    5 min
  • Secure Access Service Edge (SASE): Not Sassy, But Smart for Your Cybersecurity
    May 15 2024
    Secure Access Service Edge, known as SASE, is pronounced “sassy” but it doesn’t have to do with smart-mouth teenagers. It DOES have to do with protecting you from the “brats”, also known as hackers and other bad actors, who are trying to get into your network through your employees’ laptops and devices. In this episode, Managed Service Provider Tom Wyant lays out how SASE enables companies to give their employees access to the network while outside the office in a way that protects their bottom line as well as their cybersecurity. Especially now that remote work has become a permanent part of the environment of business and companies need to make sure remote employees have full access to everything they need to do their jobs, this is important even if you only have a couple people outside the office. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity NeedsHow will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post Secure Access Service Edge (SASE): Not Sassy, But Smart for Your Cybersecurity first appeared on The Wyant Cybersecurity Brief.
    Afficher plus Afficher moins
    4 min
  • Shadow IT: A Subtle, Stealth Way to Protect Your Network (And Your Budget)
    May 8 2024

    Shadow IT refers to a process where you install an agent that studies your users’ computers to determine what applications they’re running both locally and over the web.

    Chances are, you know they’re using Office 365, Adobe, whatever proprietary database software you use for record-keeping, and everything else you decided should be part of their software suite.

    But are they using Canva or something similar? And if they are, do you have several employees or users all separately using the same thing?

    In this episode, Tom Wyant reveals how having this intelligence reveals not only potential security risks, but also how knowing that five of your employees are separately using the same web-based app could potentially save you a lot of money.

    Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better!

    Get Support For Your Cybersecurity Needs

    How will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible?

    Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs:

    https://www.GoWyant.com/

    Connect With Wyant Technologies and Tom Wyant Now

    Website –

    https://www.GoWyant.com/

    Social Media –

    https://www.wyantcybersecuritybrief.com/facebook/
    https://www.wyantcybersecuritybrief.com/youtube/
    https://www.wyantcybersecuritybrief.com/linkedin/

    The post Shadow IT: A Subtle, Stealth Way to Protect Your Network (And Your Budget) first appeared on The Wyant Cybersecurity Brief.

    Afficher plus Afficher moins
    5 min
  • IT Policies: Protect Your Time and Money (and Time is Money)
    May 1 2024
    IT Policies tell your employees what is expected of them when it comes to your network, your equipment, and what is expected and acceptable procedure and behavior. We think of policies like: whether you can bring your own device to work, where you can access the company network from, storage and equipment destruction policies, and more. But what about the relationship between your cybersecurity and your finance policy? One company lost $280,000 because there was no written policy explaining how to verify requests to change account numbers. Another company has their soft phones hacked becquse an engineer left their personal laptop open to company software. In this episode, Tom Wyant shares these stories and outlines steps these companies – and yours – should take to protect your time and money, not to mention the amount of money your time costs. Cybersecurity is a smart investment that helps you gain more enjoyment and fulfillment in your business and life, so let’s join forces to change the conversation and change the world for the better! Get Support For Your Cybersecurity NeedsHow will your business grow and benefit, knowing you have the peace of mind that comes from having someone on your team who is responsive, reliable, accessible, comprehensive, and flexible? Wyant Technologies is your Proactive IT partner. Find out how we can become your single point of contact for all of your IT needs: https://www.GoWyant.com/ Connect With Wyant Technologies and Tom Wyant Now Website – https://www.GoWyant.com/ Social Media – https://www.wyantcybersecuritybrief.com/facebook/ https://www.wyantcybersecuritybrief.com/youtube/ https://www.wyantcybersecuritybrief.com/linkedin/ The post IT Policies: Protect Your Time and Money (and Time is Money) first appeared on The Wyant Cybersecurity Brief.
    Afficher plus Afficher moins
    7 min