Artwork

Treść dostarczona przez Kathryn McClatchy. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Kathryn McClatchy lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !

Cybersecurity with Dan Greenig

1:10:47
 
Udostępnij
 

Manage episode 348252713 series 3373728
Treść dostarczona przez Kathryn McClatchy. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Kathryn McClatchy lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

With the internet landscape in flux and social media applications poised for change, keeping up with security tactics is more relevant than ever. But with so many moving parts, new applications and sudden privacy policy rewrites, how can one be sure they are staying up-to-date with their personal and business security online?

Kathryn poses this question to professional White-Hat Hacker Dan Greenig as he delves into his 7 Principles of Cybersecurity plus guidelines for evaluating applications and platforms. He offers advice uniquely tailored to the needs of Authorpreneurs who use a broad array of applications in their writing careers.

About Our Guest:

Dan Greenig is a Cybersecurity professional, specializing in corporate cybersecurity and mitigating hacking risks by finding the vulnerabilities first- as a White-Hat Hacker. He calls on his experience as both writer and husband of a writer to give insights on the needs of the Authorpreneur.

You can find Dan online at his personal website here.

Topics Discussed in the Episode

See the tab above “Chapter Markers” for a list of Timestamps.

Highlights include:

  • Hacking as a career- what is a White-Hat?
  • Why do hackers come from and why do they do it?
  • Everyone is Hacking Everyone- How individuals get around State snooping
  • Dan’s 7 Principles of Cybersecurity
  • 3 Security Guidelines
  • DefCon and the Internet of Things
  • Back ups and Encryption
  • Messaging Apps and Encryption
  • How to apply the Principles
  • Social Engineering- Phishing on Social Media, emails and phone calls
  • Children and Security
  • Resources for Writers
  • Fast Fave Three
  • Different isn’t always Better, but Better is Always Different

Resources mentioned in this episode:

Note: Authorpreneurs Unleashed is listener-supported. When you buy through links on our site, we may earn an affiliate commission at no additional cost to you. Thanks for your support, and for sharing this podcast with your writing friends.

All the links for Authorpreneurs Unleashed and Unleashing the Next Chapter:

  continue reading

Rozdziały

1. Cybersecurity with Dan Greenig (00:00:00)

2. Introduction:Plants and Writing (00:00:44)

3. Hacking as a career- what is a White-Hat? (00:06:46)

4. Where do hackers come from and why do they do it? (00:11:15)

5. Dan’s 7 Principles of Cybersecurity (00:18:54)

6. 3 Security Guidelines (00:28:49)

7. DefCon and the Internet of Things (00:31:01)

8. Back ups and Encryption (00:35:31)

9. Messaging Apps and Encryption (00:40:27)

10. How to apply the Principles (00:41:59)

11. Social Engineering- Phishing on Social Media, emails and phone calls (00:45:51)

12. Children and Security (00:52:40)

13. Resources for Writers (00:58:18)

14. Thanksgiving & Fast Fave Three (01:03:58)

15. "Different isn’t always Better, but Better is Always Different" (01:03:58)

52 odcinków

Artwork
iconUdostępnij
 
Manage episode 348252713 series 3373728
Treść dostarczona przez Kathryn McClatchy. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Kathryn McClatchy lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

With the internet landscape in flux and social media applications poised for change, keeping up with security tactics is more relevant than ever. But with so many moving parts, new applications and sudden privacy policy rewrites, how can one be sure they are staying up-to-date with their personal and business security online?

Kathryn poses this question to professional White-Hat Hacker Dan Greenig as he delves into his 7 Principles of Cybersecurity plus guidelines for evaluating applications and platforms. He offers advice uniquely tailored to the needs of Authorpreneurs who use a broad array of applications in their writing careers.

About Our Guest:

Dan Greenig is a Cybersecurity professional, specializing in corporate cybersecurity and mitigating hacking risks by finding the vulnerabilities first- as a White-Hat Hacker. He calls on his experience as both writer and husband of a writer to give insights on the needs of the Authorpreneur.

You can find Dan online at his personal website here.

Topics Discussed in the Episode

See the tab above “Chapter Markers” for a list of Timestamps.

Highlights include:

  • Hacking as a career- what is a White-Hat?
  • Why do hackers come from and why do they do it?
  • Everyone is Hacking Everyone- How individuals get around State snooping
  • Dan’s 7 Principles of Cybersecurity
  • 3 Security Guidelines
  • DefCon and the Internet of Things
  • Back ups and Encryption
  • Messaging Apps and Encryption
  • How to apply the Principles
  • Social Engineering- Phishing on Social Media, emails and phone calls
  • Children and Security
  • Resources for Writers
  • Fast Fave Three
  • Different isn’t always Better, but Better is Always Different

Resources mentioned in this episode:

Note: Authorpreneurs Unleashed is listener-supported. When you buy through links on our site, we may earn an affiliate commission at no additional cost to you. Thanks for your support, and for sharing this podcast with your writing friends.

All the links for Authorpreneurs Unleashed and Unleashing the Next Chapter:

  continue reading

Rozdziały

1. Cybersecurity with Dan Greenig (00:00:00)

2. Introduction:Plants and Writing (00:00:44)

3. Hacking as a career- what is a White-Hat? (00:06:46)

4. Where do hackers come from and why do they do it? (00:11:15)

5. Dan’s 7 Principles of Cybersecurity (00:18:54)

6. 3 Security Guidelines (00:28:49)

7. DefCon and the Internet of Things (00:31:01)

8. Back ups and Encryption (00:35:31)

9. Messaging Apps and Encryption (00:40:27)

10. How to apply the Principles (00:41:59)

11. Social Engineering- Phishing on Social Media, emails and phone calls (00:45:51)

12. Children and Security (00:52:40)

13. Resources for Writers (00:58:18)

14. Thanksgiving & Fast Fave Three (01:03:58)

15. "Different isn’t always Better, but Better is Always Different" (01:03:58)

52 odcinków

Wszystkie odcinki

×
 
Loading …

Zapraszamy w Player FM

Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.

 

Skrócona instrukcja obsługi