Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/93/f3/7e/93f37edc-d417-4c3b-5596-e9185ed16b56/mza_7811711220227521869.jpg/600x600bb.jpg
Phishing for Trouble from ISMS.Online
ISMS Online
11 episodes
4 days ago
"Phishing for Trouble" is the cybersecurity podcast that demystifies compliance and information security in your business. Technology and software are the backbone of modern business, simplifying daily operations and driving innovation. But when it comes to cybersecurity and compliance, it’s no longer just an IT problem—it’s everyone’s responsibility. Rebecca Harper and David Holloway bring together industry-leading experts to break down high-profile cyber and information security incidents, exploring what went wrong and, crucially, how you can avoid the same pitfalls.
Show more...
Business
RSS
All content for Phishing for Trouble from ISMS.Online is the property of ISMS Online and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
"Phishing for Trouble" is the cybersecurity podcast that demystifies compliance and information security in your business. Technology and software are the backbone of modern business, simplifying daily operations and driving innovation. But when it comes to cybersecurity and compliance, it’s no longer just an IT problem—it’s everyone’s responsibility. Rebecca Harper and David Holloway bring together industry-leading experts to break down high-profile cyber and information security incidents, exploring what went wrong and, crucially, how you can avoid the same pitfalls.
Show more...
Business
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/42456156/42456156-1731698687696-473e31ff3136a.jpg
How safe is my private information?
Phishing for Trouble from ISMS.Online
37 minutes 29 seconds
11 months ago
How safe is my private information?

"Phishing for Trouble," is the cybersecurity podcast that demystifies compliance and information security in your business.

 

Data protection doesn’t have the most exciting reputation but it can be pretty dramatic when you miss it off your compliance list! From the legal consequences of data breaches to human error, not having a prevention or response plan in place can land even the biggest companies in hot water.

 

In this podcast Dave and Becca explore the different between personal and sensitive information and what makes a strong password. Plus they share tips on how you can use compliance frameworks to help secure your organisation against cyberattacks and hacks.

 

As always they’re joined by expert guests from the world of cybersecurity, compliance and information security:

 

Gary Hibberd is a security consultant who runs “Consultants Like Us” He shares his tips on how to build a data protection policy that doesn’t cost you a penny.

 

Steve Wright is the CEO and Founder of Privacy Culture. He has 30 years of cybersecurity experience and he explains just how vital it is for organisations to protect their customer data through robust processes and frameworks.

 

Ash Patel works for ECI partners and knows just how important it is to continuously evolve your information compliance and security. In fact, he says it’s a crucial part of managing change.

 

Links Mentioned in this episode:

The General Data Protection Act

Phishing for Trouble from ISMS.Online
"Phishing for Trouble" is the cybersecurity podcast that demystifies compliance and information security in your business. Technology and software are the backbone of modern business, simplifying daily operations and driving innovation. But when it comes to cybersecurity and compliance, it’s no longer just an IT problem—it’s everyone’s responsibility. Rebecca Harper and David Holloway bring together industry-leading experts to break down high-profile cyber and information security incidents, exploring what went wrong and, crucially, how you can avoid the same pitfalls.