The Cyber Savvy Cafe logo

The Tech-Savvy Podcast for Busy Professionals

Powered by East Atlantic Security

The tech-savvy podcast for busy professionals

A visit to the Cyber Savvy Cafe is like a really great coffee break discussing topics of interest with your friends at work: New tech, IoT devices, cyber training, remote workstations, streamlining IT for efficiency, and more.

Short, 20-minute episodes every week. Add us to your morning playlist!

Latest Episode:

Ssn 1 Ep 24 IoT devices and security; image of refrigerator running away.

Ssn 1 Ep 24: Is Your Refrigerator Running? IoT on the Move

Did you know your smart devices are hackable? Learn how to enjoy the advantages of modern IoT without compromising the security of your network.

Popular Episodes

Ep 22--the importance of cyber awareness training for your staff; image of a hand knocking on the door.

Ssn 1 Ep 22: Knock Knock, Who’s There?

How security awareness training and phishing simulations can save your business from a catastrophic breach.

How to know if an online company is an imposter, image of a professional woman with a shark shadow behind her.

Ssn 1 Ep 18: Detecting an Imposter

How to Know if an Online Company is Legit and Safety Protocols for Purchases

Two kids playing on the computer amidst concerns of network security.

Ep 11: The Little’s

Kids Online and Network Security

How and why you may be at risk of a cyberbreach when children are using the network–and what you can do about it.

Ssn 1 Ep 9 Spies at the coffee shop; black and white image of a fedora and sunglasses.

Ep 9: Spies at the Coffee Shop

Public Wi-Fi, Charging Stations, and Other Cyber Traps

In today’s episode we talk about the sneaky cyber back doors you open every time you connect a device in a public space.

Previous Episodes:

Shopping securely online, image of woman in sunglasses with shopping bags popping out of a phone.

Ssn 1 Ep 23: Shopping Online

Avoiding the common security pitfalls of shopping online, and desktop vs. mobile security.

Ep 22--the importance of cyber awareness training for your staff; image of a hand knocking on the door.

Ssn 1 Ep 22: Knock Knock, Who’s There?

How security awareness training and phishing simulations can save your business from a catastrophic breach.

What happens after you get hacked? Image of business woman on the phone after a breach.

Ssn 1 Ep 21: After the Attack

What Happens to Your Data After a Breach

 

Ever wonder exactly what a hacker gets from your data after a breach? In today’s episode, we explore what happens to your data when it hits the dark web.

Ssn 1 Ep 20: Don't Bother Me; image of woman holding her hand up with her face turned away.

Ssn 1 Ep 20: Don’t Bother Me

Why You’re Not Too Small To Be Noticed

 

Why small businesses are desirable targets—and why cyberattacks against SMBs are on the rise.

The easiest way to get hacked--image of a door being opened.

Ssn 1 Ep 19: The Easiest Way to Get Hacked

There’s an easy back door into your organization–and a very easy way to close it.

How to know if an online company is an imposter, image of a professional woman with a shark shadow behind her.

Ssn 1 Ep 18: Detecting an Imposter

How to Know if an Online Company is Legit and Safety Protocols for Purchases

Leverage remote workstations to give your company the competitive edge, image of of remote workers

Strategies for Cutting Costs Series

Ssn 1 Ep 17: Who Has the Remote?

How to leverage remote workstations, build a competitive edge, and make your company one of the most sought-after places to work.

Co-managed IT comparison against fully managed IT costs--image of two people fist-bumping.

Strategies for Cutting Costs Series

Ssn 1 Ep 16: The New Kid in Town, Part 3

Today’s episode concludes the discussion about co-managed IT and compares a Co-MIT approach with traditional Managed IT services.

Co-Managed IT, an IT partnership that strengthens companies and IT security; image of a black man shaking hands with a white woman.

Strategies for Cutting Costs Series

Ssn 1 Ep 15: The New Kid in Town, Part 2

Signs that your internal IT department is overworked, the fallout you could face, and how co-managed IT can support your team in a cost-effective way.

Co-Managed IT, an IT partnership that strengthens companies and IT security; image of two people shaking hands.

Strategies for Cutting Costs Series

Ssn 1 Ep 14: The New Kid in Town, Part 1

There’s a new kid in town, Co-Managed IT, and it’s changing the face–and the cost–of IT security.

In this first episode of the Strategies for Cutting Costs series, Rex and Penny discuss why Co-Managed IT is an advantageous solution for many of the IT problems facing today’s companies.

Image of a woman working remotely utilizing a virtual desktop solution.

Ep 13: Virtual Desktop–Take it on the Road

Utilizing virtual desktop solutions to turn your team into a dynamic mobilized work force.

Why and how a virtual desktop environment can take your business to the next level–especially if you have people working from home.

Rex and Penny talk about Windows Virtual Desktop: utilizing latest technologies to turn your team into a dynamic mobilized workforce.

 

Podcast ep 12 The Life and Death of an Android, image of a professional man concerned about safeguarding his phones.

Ep 12: The Life or Death of an Android

9 Easy Ways to Safeguard Your Android Device

What if your phone got infected with malware or hit with a ransomware attack? What is the immediate fallout? In this episode we talk about some of the best steps to take NOW to secure your device so hopefully you won’t ever have to answer those questions.

Two kids playing on the computer amidst concerns of network security.

Ep 11: The Little’s

Kids Online and Network Security: A Cyber-Breach Waiting to Happen

How much does your kids’ online usage impact the security of your home network? Find out how and why you may be at risk of a cyberbreach when children are using the network–and what you can do about it.

Acceptable Use Policies, an important part of your company security protocols.

Ep 10: The Problems it Solves

Acceptable Use Policies: The Whys, Whats, and Whatnots

Why it’s important to have an AUP in place, how it protects you, and how to make one.

Ssn 1 Ep 9 Spies at the coffee shop; black and white image of a fedora and sunglasses.

Ep 9: Spies at the Coffee Shop

Public Wi-Fi, Charging Stations, and Other Cyber Traps

Think you’re safe, hooking your devices up to public Wi-Fi and public charging stations? Think again. In today’s episode we talk about the sneaky cyber back doors you open every time you connect a device in a public space.

Image of a professional woman working from a remote workstation.

Ep 8: Remote Workstations–An Open Door to a Cyberbreach?

Remote workstations are here to stay, but lax home network security is putting corporate networks at risk. Here are some steps to help secure your network and close the doors to a cyber breach.

Get your copy of the free guide we discuss, “8 Security Threats for Remote Workstations and How You Can Mitigate Your Risk.”

Why a firewall is no longer enough to protect your network; image of girl pushing against a shield.

Ep 7: The Perimeter is Dead–Why a Firewall is Not Enough

In today’s episode we dive into the current cyber landscape and discuss why you need more than just a great firewall to protect your network.

Flexible IT systems that can pivot to support mobile work, image of man on laptop in a conference call

Ep 6: Flexible IT and the Need to Survive

Rex and Penny talk about the radical changes to our work environments and the need for flexible IT systems that can accommodate a mobile workforce.

Password security, image of a cipher and hour glass

Ep  5: Password Secrets and the Book of Codes

How to make passwords that take a hundred years to crack and storing passwords securely with minimal hassle. This week’s episode dives into the secrets of password security.

Using IoT devices while ensuring network security

Ep 4: IoT Devices and Network Security

Today we talk about the ever-growing popularity of IoT devices and how to ensure you or your employees’ use of IoT is not putting your network at risk.

No Phishing Zone--how to avoid being a victim of a phishing attack

Ep 3: No Phishing Zone, Part 2

Continuing on with the discussion of how to guard against phishing attacks.

No Phishing Zone-don't be the victim of a phishing attack

Ep 2: No Phishing Zone, Part 1

Rex and Penny discuss the growing rates of phishing attacks and best practices to avoid being a victim.

Top 3 ways hackers break in, image of man breaking into a home

Ep 1: Top 3 Ways Hackers Gain Access

In our season kickoff, we discuss the top 3 methods hackers use to breach your network security and gain access to your data.

Leave a Reply