Cybersecurity Threats & Defenses for Small Businesses
Автор: CSUB SBDC
Загружено: 2025-06-18
Просмотров: 18
Top cybersecurity threats and mistakes small businesses make and how to strengthen cyber defenses are topics of this week’s free SBDC webinar. Host and SBDC Director Kelly Bearden is joined by certified cybersecurity professional Robert L Duchesne III, president of RD3 Technologies, and virtual chief information security officer Dr. Michael Chambers, also from RD3 Technologies.
Bearden begins the webinar with a look at available capital resources, and strategies to grow and expand existing businesses.
This marks the 348th episode of the “Webinar Wednesday” business series that provides news and information helpful to employers and business owners.
The CSU Bakersfield SBDC provides free one-on-one help to small business owners. New and existing businesses can go to www.csubsbdc.com for more information or to sign up to meet with a business advisor at no cost.
TIMESTAMPS
00:00 Intro
00:54 What’s up today June 4, 2025
02:39 Poll Question #1: “Why are you here today?
04:47 Poll Questions #2: “Which well-known company was hit with a cybersecurity incident this week?”
08:41 Loan Calculator https://www.calculator.net/loan-calcu...
09:58 What is the APR your FinTech is Charging?
11:02 SBA Disaster Programs
SBA website for disaster relief https://lending.sba.gov/
SBA website for disaster relief – EIDL https://www.sba.gov/funding-programs/...
Kern County deadlines to apply for SBA Economic Injury Disaster Loans
https://www.sba.gov/funding-programs/...
18:07 Kelly introduces Dr. Michael Chambers and Robert Duchesne, RD3 Technologies
www.RD3Technologies.com
19:53 Robert Duchesne begins to speak
Cybersecurity Importance for Manufacturers
20:40 The importance of cybersecurity for manufacturers is discussed. Reputation is highlighted as a key concern for businesses
23:04 Concerns about small businesses' perceptions of cybersecurity are raised. Many believe that they are not targets for cyber threats
24:41 Ransomware attacks are identified as a significant threat. The discussion emphasizes the need for regular updates and email security
Phishing and Ransomware Threats
25:13 Phishing emails are discussed as a significant threat. Ransomware is mentioned as a consequence of phishing attacks
27:00 A significant data breach involving employee information is revealed. Over 500 employee records, including sensitive data, were publicly accessible
30:40 The importance of firewalls and proper configuration is emphasized. Analogies are used to illustrate the risks of inadequate security measures.
Implementing Multifactor Authentication
31:34 Multifactor authentication is explained in detail. Various methods of implementation are discussed
33:35 The importance of assuming compromised credentials is emphasized. A resource for checking compromised passwords is recommended https://haveibeenpwned.com/
36:14 The significance of backups in ransomware recovery is highlighted. Immutable backups are stressed as essential for data protection
Vendor Trust and Privacy Policies
36:53 Concerns about trusting vendors are raised. The importance of understanding privacy policies is emphasized
37:30 The use of AI tools for privacy policy analysis is discussed. ChatGPT is mentioned as a helpful resource https://chatgpt.com/
Vendor Risk Management and Employee Training
40:22 The importance of vendor risk management is emphasized. Organizations are advised to vet vendors handling sensitive data
41:01 Multi-factor authentication is identified as a crucial security measure. Organizations are cautioned about the false sense of security from auto-updates
42:16 All businesses have a WAN IP. Find your WAN IP by going here:
https://whatismyipaddress.com/
42:57 Employee training is highlighted as essential for cybersecurity. The concept of being perceptive in physical environments is introduced
48:40 Kelly rejoins Robert and Michael for discussion and Q & A with attendees
Data Protection and Compliance Strategies
48:57 Public Wi-Fi usage raises significant security concerns. Virtual private networks are recommended for protection https://www.pcmag.com/picks/the-best-...
51:19 Password Protection - password management strategies are discussed. External devices for password protection are suggested
Password Management and Security Architecture
51:40 Password managers are discussed for security benefits. Concerns about proper configuration and breaches are highlighted
53:33 A security architecture review is recommended for new technology. Vulnerability scanning and network segmentation are emphasized
https://www.tenable.com/products/ness...
56:39 Final thoughts stress the inevitability of being hacked. Security is framed as a state of mind rather than a product
#cybersecurity #malware #ransomware
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: