Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Cybersecurity Threats & Defenses for Small Businesses

Автор: CSUB SBDC

Загружено: 2025-06-18

Просмотров: 18

Описание:

Top cybersecurity threats and mistakes small businesses make and how to strengthen cyber defenses are topics of this week’s free SBDC webinar. Host and SBDC Director Kelly Bearden is joined by certified cybersecurity professional Robert L Duchesne III, president of RD3 Technologies, and virtual chief information security officer Dr. Michael Chambers, also from RD3 Technologies.

Bearden begins the webinar with a look at available capital resources, and strategies to grow and expand existing businesses.

This marks the 348th episode of the “Webinar Wednesday” business series that provides news and information helpful to employers and business owners.

The CSU Bakersfield SBDC provides free one-on-one help to small business owners. New and existing businesses can go to www.csubsbdc.com for more information or to sign up to meet with a business advisor at no cost.

TIMESTAMPS
00:00 Intro
00:54 What’s up today June 4, 2025
02:39 Poll Question #1: “Why are you here today?
04:47 Poll Questions #2: “Which well-known company was hit with a cybersecurity incident this week?”
08:41 Loan Calculator https://www.calculator.net/loan-calcu...
09:58 What is the APR your FinTech is Charging?
11:02 SBA Disaster Programs
SBA website for disaster relief https://lending.sba.gov/
SBA website for disaster relief – EIDL https://www.sba.gov/funding-programs/...
Kern County deadlines to apply for SBA Economic Injury Disaster Loans
https://www.sba.gov/funding-programs/...

18:07 Kelly introduces Dr. Michael Chambers and Robert Duchesne, RD3 Technologies
www.RD3Technologies.com
19:53 Robert Duchesne begins to speak

Cybersecurity Importance for Manufacturers
20:40 The importance of cybersecurity for manufacturers is discussed. Reputation is highlighted as a key concern for businesses
23:04 Concerns about small businesses' perceptions of cybersecurity are raised. Many believe that they are not targets for cyber threats
24:41 Ransomware attacks are identified as a significant threat. The discussion emphasizes the need for regular updates and email security

Phishing and Ransomware Threats
25:13 Phishing emails are discussed as a significant threat. Ransomware is mentioned as a consequence of phishing attacks
27:00 A significant data breach involving employee information is revealed. Over 500 employee records, including sensitive data, were publicly accessible
30:40 The importance of firewalls and proper configuration is emphasized. Analogies are used to illustrate the risks of inadequate security measures.

Implementing Multifactor Authentication
31:34 Multifactor authentication is explained in detail. Various methods of implementation are discussed
33:35 The importance of assuming compromised credentials is emphasized. A resource for checking compromised passwords is recommended https://haveibeenpwned.com/
36:14 The significance of backups in ransomware recovery is highlighted. Immutable backups are stressed as essential for data protection

Vendor Trust and Privacy Policies
36:53 Concerns about trusting vendors are raised. The importance of understanding privacy policies is emphasized
37:30 The use of AI tools for privacy policy analysis is discussed. ChatGPT is mentioned as a helpful resource https://chatgpt.com/

Vendor Risk Management and Employee Training
40:22 The importance of vendor risk management is emphasized. Organizations are advised to vet vendors handling sensitive data
41:01 Multi-factor authentication is identified as a crucial security measure. Organizations are cautioned about the false sense of security from auto-updates
42:16 All businesses have a WAN IP. Find your WAN IP by going here:
https://whatismyipaddress.com/
42:57 Employee training is highlighted as essential for cybersecurity. The concept of being perceptive in physical environments is introduced
48:40 Kelly rejoins Robert and Michael for discussion and Q & A with attendees

Data Protection and Compliance Strategies
48:57 Public Wi-Fi usage raises significant security concerns. Virtual private networks are recommended for protection https://www.pcmag.com/picks/the-best-...
51:19 Password Protection - password management strategies are discussed. External devices for password protection are suggested

Password Management and Security Architecture
51:40 Password managers are discussed for security benefits. Concerns about proper configuration and breaches are highlighted
53:33 A security architecture review is recommended for new technology. Vulnerability scanning and network segmentation are emphasized
https://www.tenable.com/products/ness...
56:39 Final thoughts stress the inevitability of being hacked. Security is framed as a state of mind rather than a product

#cybersecurity #malware #ransomware

Cybersecurity Threats & Defenses for Small Businesses

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

SBA 504 Loan Program Updates

SBA 504 Loan Program Updates

Funding Your Business Loan with Little Collateral & More!

Funding Your Business Loan with Little Collateral & More!

Interagency: Meeting Gold Standard Science Requirements for Data Collection for Projects/Studies

Interagency: Meeting Gold Standard Science Requirements for Data Collection for Projects/Studies

Jake Paul vs. Anthony Joshua FULL Highlights | Netflix

Jake Paul vs. Anthony Joshua FULL Highlights | Netflix

How Technology is Reshaping the Way Industry Operates | Schneider Electric

How Technology is Reshaping the Way Industry Operates | Schneider Electric

ZEŁENSKI U NAWROCKIEGO: WOŁYŃ, WDZIĘCZNOŚĆ, ODBUDOWA UKRAINY

ZEŁENSKI U NAWROCKIEGO: WOŁYŃ, WDZIĘCZNOŚĆ, ODBUDOWA UKRAINY

Where Leadership and Networking Collide

Where Leadership and Networking Collide

What to Do Financially After a Spouse or Loved one Dies (Taxes, Benefits, and Common Mistakes)

What to Do Financially After a Spouse or Loved one Dies (Taxes, Benefits, and Common Mistakes)

How plasma improves pet nutrition and product quality

How plasma improves pet nutrition and product quality

New Elementary School Building Committee Meeting 12.15.26

New Elementary School Building Committee Meeting 12.15.26

Ziemkiewicz: Czarzasty pajacuje z łańcuchem i grozi prezydentowi - przekaz dla debili!

Ziemkiewicz: Czarzasty pajacuje z łańcuchem i grozi prezydentowi - przekaz dla debili!

Podaj Paczkę 🎁 - Pełne odcinki 📺 | Seria 3 💙 | Blue - Oficjalny Polski Kanał

Podaj Paczkę 🎁 - Pełne odcinki 📺 | Seria 3 💙 | Blue - Oficjalny Polski Kanał

INDIE NOWYM ŚWIATOWYM LIDEREM. CHINY W TYLE

INDIE NOWYM ŚWIATOWYM LIDEREM. CHINY W TYLE

Reinforcement Learning Tutorial - RLVR with NVIDIA & Unsloth

Reinforcement Learning Tutorial - RLVR with NVIDIA & Unsloth

NEMSIS v3 Implementation Call, December 10, 2025

NEMSIS v3 Implementation Call, December 10, 2025

Wojna czy pokój? Co czeka Polskę? Nadchodzi atak Rosji? — Jacek Bartosiak i Piotr Zychowicz

Wojna czy pokój? Co czeka Polskę? Nadchodzi atak Rosji? — Jacek Bartosiak i Piotr Zychowicz

How to Prepare for Legal Due Diligence

How to Prepare for Legal Due Diligence

Интернет в небе: Сергей

Интернет в небе: Сергей "Флеш" о том, как «Шахеды» и «Герберы» научились работать в одной связке

█▬█ █ ▀█▀  KOLĘDY POLSKIE NAJPIĘKNIEJSZE TRADYCYJNE 🎵  1 GODZINA HD 🎄

█▬█ █ ▀█▀ KOLĘDY POLSKIE NAJPIĘKNIEJSZE TRADYCYJNE 🎵 1 GODZINA HD 🎄

The 6 Most Profitable AI Businesses to Start in 2026

The 6 Most Profitable AI Businesses to Start in 2026

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]