Artwork

Inhoud geleverd door Object First. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Object First of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !

Unveiling Zero-Click Dangers, 2024's Riskiest Devices, and Mastering Backup Strategies

38:00
 
Delen
 

Manage episode 424293344 series 3556341
Inhoud geleverd door Object First. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Object First of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

How safe is your email? This week on Zero Gravity Live, we explore the hidden threats lurking in your inbox, starting with a zero-click vulnerability in Microsoft Outlook that can activate malicious code just by viewing an email. We dive into the critical importance of zero trust and data resilience, drawing parallels to past cybersecurity challenges and emphasizing the need for robust security practices in an ever-evolving digital landscape. You'll also hear our thoughts on why unique passwords are still one of your best defenses against these sophisticated attacks.
Next, we shift gears to discuss the most perilous connected devices of 2024. From unpatched hypervisors to vulnerable IP cameras and NAS devices, we explore how these technologies, while integral to modern operations, pose significant risks if left unsecured. We share a real-world example of an insider threat where a former IT employee wreaked havoc by wiping out 180 virtual servers, illustrating the devastating potential of both external and internal security breaches. Learn why zero trust, immutability, and resilience are non-negotiable in today's cybersecurity strategies.
Finally, we underscore the indispensable role of backups and recovery plans in safeguarding business continuity. Discover why simply having backups isn't enough without ensuring their recoverability through techniques like verification and the 3-2-1-1-0 rule. We'll discuss how a comprehensive strategy can protect your operations and reputation from all types of threats, including rogue administrators and ransomware. Stay tuned for our next episode, where we'll reveal the surprising dangers posed by emojis in your digital communications. Until then, stay weightless, stay frictionless, stay zero gravity.

Watch us live every Tuesday at 11 am EST

Need the best storage for Veeam? Check out Ootbi by Object First

  continue reading

Hoofdstukken

1. Tech Talk (00:00:00)

2. Email Security and Zero Click Vulnerability (00:10:00)

3. Connected Device Security Risks (00:16:39)

4. Insider Threats and Data Resilience (00:25:30)

5. Backup and Recovery Importance (00:35:33)

21 afleveringen

Artwork
iconDelen
 
Manage episode 424293344 series 3556341
Inhoud geleverd door Object First. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Object First of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

How safe is your email? This week on Zero Gravity Live, we explore the hidden threats lurking in your inbox, starting with a zero-click vulnerability in Microsoft Outlook that can activate malicious code just by viewing an email. We dive into the critical importance of zero trust and data resilience, drawing parallels to past cybersecurity challenges and emphasizing the need for robust security practices in an ever-evolving digital landscape. You'll also hear our thoughts on why unique passwords are still one of your best defenses against these sophisticated attacks.
Next, we shift gears to discuss the most perilous connected devices of 2024. From unpatched hypervisors to vulnerable IP cameras and NAS devices, we explore how these technologies, while integral to modern operations, pose significant risks if left unsecured. We share a real-world example of an insider threat where a former IT employee wreaked havoc by wiping out 180 virtual servers, illustrating the devastating potential of both external and internal security breaches. Learn why zero trust, immutability, and resilience are non-negotiable in today's cybersecurity strategies.
Finally, we underscore the indispensable role of backups and recovery plans in safeguarding business continuity. Discover why simply having backups isn't enough without ensuring their recoverability through techniques like verification and the 3-2-1-1-0 rule. We'll discuss how a comprehensive strategy can protect your operations and reputation from all types of threats, including rogue administrators and ransomware. Stay tuned for our next episode, where we'll reveal the surprising dangers posed by emojis in your digital communications. Until then, stay weightless, stay frictionless, stay zero gravity.

Watch us live every Tuesday at 11 am EST

Need the best storage for Veeam? Check out Ootbi by Object First

  continue reading

Hoofdstukken

1. Tech Talk (00:00:00)

2. Email Security and Zero Click Vulnerability (00:10:00)

3. Connected Device Security Risks (00:16:39)

4. Insider Threats and Data Resilience (00:25:30)

5. Backup and Recovery Importance (00:35:33)

21 afleveringen

Alle afleveringen

×
 
Loading …

Welkom op Player FM!

Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.

 

Korte handleiding