Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Health & Fitness
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts115/v4/2c/2c/6d/2c2c6d33-9ae0-9dc6-8d77-0616e88667c1/mza_13853103828496242770.jpg/600x600bb.jpg
:60 Second InfoSec
AlphaONE Operations
10 episodes
1 day ago
Get weekly updates and insightful information from the world of Information Security (InfoSec) with your host Kevin Sutton in :60(ish) seconds! Kevin is one of the founders of AlphaONE Operations--an Alabama-based cybersecurity company-and has multiple years of experience in the information technology industry. AlphaONE builds their services & solutions with security in mind from the start – not as an after-thought. And while their competitors build solutions around a customer’s history, AlphaONE is working to predict & prevent your next possible threat. Find out more at https://www.a1ops.com.
Show more...
Tech News
News
RSS
All content for :60 Second InfoSec is the property of AlphaONE Operations and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Get weekly updates and insightful information from the world of Information Security (InfoSec) with your host Kevin Sutton in :60(ish) seconds! Kevin is one of the founders of AlphaONE Operations--an Alabama-based cybersecurity company-and has multiple years of experience in the information technology industry. AlphaONE builds their services & solutions with security in mind from the start – not as an after-thought. And while their competitors build solutions around a customer’s history, AlphaONE is working to predict & prevent your next possible threat. Find out more at https://www.a1ops.com.
Show more...
Tech News
News
Episodes (10/10)
:60 Second InfoSec
:60 Second InfoSec (6/16/21): Ransomware--Administrative & Physical Controls

In this episode of our series on ransomware, Kevin covers some administrative and physical controls that business owners can employ to secure their facilities along with their information.

Administrative controls cover the human element within computer security and all levels of an organization are considered in scope....from entry level all the way to the C-Suite.

Physical controls cover security measures to deter unauthorized physical access to sensitive material. As they say, "possession is 9/10ths of the law" -- in the data security world, the easiest way to gain a foothold is through physical intrusions.

For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.

Show more...
4 years ago
2 minutes 26 seconds

:60 Second InfoSec
:60 Second InfoSec (6/9/21): Ransomware--Defense in Depth

Like any other cyber security threat, ransomware needs to be addressed with what's known as "Defense in Depth."

It's a combination of controls used in tandem to support one another...  technical controls, physical controls, and administrative controls. In this episode, Kevin hits on some of the technical controls that can make or break your chance of surviving a cyber attack.

The obvious ones that most people think of are network components like firewalls, switches, and routers.

They are important and helpful when configured appropriately, but there are a few others you should think about.

For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.

Show more...
4 years ago
2 minutes 21 seconds

:60 Second InfoSec
:60 Second InfoSec (6/1/21): Ransomware--How To Stay Out Of The Security Headlines!

This is the first episode of a series where we focus on one of the attack types that has been making a lot of noise in the news recently...  ransomware.

In this series, we'll cover topics to help you understand what it is, why your business should care, what you can do to protect yourself.  And hopefully you never need it, BUT .... how you should prepare in case you're ever in the precarious situation of being locked out of your data.

At AlphaONE, we specialize in working with SMBs -- or Small & Medium Size Businesses.  We hear things like "I'm too small, the bad guys don't care about me" or "I have cybersecurity insurance for when I get hit." There are many reasons that this way of thinking can be disastrous and Kevin touches on them all in this series so be sure to listen for help in keeping your name out of the security headlines!

For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.

Show more...
4 years ago
2 minutes 27 seconds

:60 Second InfoSec
:60 Second InfoSec (5/24/21): Social Engineering--Physical Threats: The "IT Guy"/"Cable Guy" Attacks

This is the last week in our coverage on Social Engineering -- or the use of deception to manipulate human behavior.

In this episode, Kevin introduces you to a couple more tactics that the bad guys use to try and bypass your PHYSICAL security controls--"The IT Guy Attack" and “The Cable Guy Attack."  Both involve someone pretending to be a tech to gain access to highly controlled spaces and once they're in, they can usually go through a facility unnoticed.

How can you and your employees defend against these attacks? Listen to find out!

AlphaONE is always available to help test, train, and educate your business & employees on social engineering.  Get in touch with us at a1ops.com and follow us on social media (FB, Twitter, Insta, LinkedIn).

Show more...
4 years ago
1 minute 36 seconds

:60 Second InfoSec
:60 Second InfoSec (5/17/21): Social Engineering--Physical Threats: Tailgating

The word "tailgating" is usually associated with fun and football, but this week, Kevin lets us know that it is also a tactic the bad guys use to gain physical access to your business and its assets by taking advantage of natural human tendencies.

This is Part 3 in our coverage on social engineering—using deception to manipulate human behavior.

Not familiar with the concept of social engineering? Check out our blog for more information about this deceptive practice designed to take advantage of human nature to bypass your electronic security (https://www.a1ops.com/blog/).

For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.

Show more...
4 years ago
1 minute 47 seconds

:60 Second InfoSec
:60 Second InfoSec (Trailer)
4 years ago
20 seconds

:60 Second InfoSec
:60 Second InfoSec (5/10/21): Social Engineering--Phishing, Vishing & Smishing

This week, Kevin will continue our coverage on social engineering—using deception to manipulate human behavior.

Our topics in this episode are additional threats on your technical electronic controls--phishing, vishing and smishing. And while the names of these tactics may sound strange or even silly, you better believe they are very effective at gaining access to otherwise protected assets! 

Not familiar with the concept of social engineering? Check out our blog for an intro to this deceptive practice designed to take advantage of human nature to bypass your electronic security (https://www.a1ops.com/what-is-social-engineering/).

For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.

Show more...
4 years ago
1 minute 7 seconds

:60 Second InfoSec
:60 Second InfoSec (5/3/21): Social Engineering--USB Key Drops

Social engineering, simply put, is essentially the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques. 

For example, instead of trying to find a software vulnerability, a social engineer might call an employee and pose as an IT support person trying to trick the employee into divulging his password. 

In this episode, Kevin explains how one trick at the social engineer's disposal involves using something as simple as a strategically placed USB key.

For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.

Show more...
4 years ago
1 minute 7 seconds

:60 Second InfoSec
:60 Second InfoSec (4/19/21): Ransomware Part 2

The second episode in our series about ransomware. In this episode, Kevin tells you what to do to prevent getting into a situation where you or your company is attacked or targeted by hackers.

For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.

Show more...
4 years ago
1 minute 14 seconds

:60 Second InfoSec
:60 Second InfoSec (4/12/21): Ransomware Part 1

Ransomware. You hear about it a lot in the news, but do you know what it is and how it can effect you and your business? In this episode, Kevin walks you through how to react if you or your business have been attacked with ransomware.

For more information, contact AlphaONE Operations at 833-ALPHA-ONE / 334-245-3125 or visit our website: a1ops.com.

Show more...
4 years ago
1 minute 5 seconds

:60 Second InfoSec
Get weekly updates and insightful information from the world of Information Security (InfoSec) with your host Kevin Sutton in :60(ish) seconds! Kevin is one of the founders of AlphaONE Operations--an Alabama-based cybersecurity company-and has multiple years of experience in the information technology industry. AlphaONE builds their services & solutions with security in mind from the start – not as an after-thought. And while their competitors build solutions around a customer’s history, AlphaONE is working to predict & prevent your next possible threat. Find out more at https://www.a1ops.com.