Created with Sketch.
32 minutes | Dec 25, 2020
End-User Awareness Training - Part II
Make sure you let your colleagues know about this podcast, it could save your company a lot of aggravation, frustration, stress and money. This podcast covers using corporate email for non-work-related activities, webmail attacks, phone scams, web scams, domain name impersonation and so much more. We want as many people to get this information, so we can stop the long line of victims from growing even longer.
35 minutes | Dec 24, 2020
End-User Awareness Training - The Number One Weapon Against Ransomware, is Education!
This is the podcast for all your employees. If we don't let our non-technical employees know the risks, we all pose while working on a computer, as well as how to reduce that risk, then it's not a matter of if, but a matter of when we suffer a ransomware attack. Please send a link of this podcast to every colleague, friend and family member. We all need to know this information and have it reinforced from time to time.
31 minutes | Dec 23, 2020
Protect your Backups and Make Them Impenetrable to a Ransomware Attack
Hackers are going to encrypt or permanently delete your backups as a part of their ransomware attack. Ransomware has been so successful for them; they have been increasing the ransom to astronomical prices. Get prepared and lock hackers out of your backups, preventing them from destroying your only way to recover. Don't let a click by an end-user destroy your company. A fellow employee might provide a hacker access to the network by clicking on a phishing email, but the hacker will not be able to get to your backups, as long as secure them correctly.
29 minutes | Dec 22, 2020
Get Ready for Hacker Armageddon Starting the Holiday Season, December 2020
Ransomware and network intrusions are predicted to be the largest problems for corporations, government agencies, hospitals and schools in 2021. But did you know that hackers typically hit hard during the holidays. Skeleton crews, top management are often off on the holidays and the least experienced people are working during the most crucial times, which means that the network is at its most vulnerable state. Get prepared for the 2020 holiday season hacker attacks and learn how to strengthen your network and use key security features to help prevent disasters and reduce your risk posture. Get prepared and listen to this podcast every weekday. We are going to try to get you ready to survive an attack.
34 minutes | Jun 24, 2020
Forensic Linguistics, Audio Forensics, Copyright Infringement and Top Five Network Management Mistakes
Segment One - Forensic Linguistics. Understanding how individuals can be identifed by how they write. Segment Two - Audio Forensics. Understanding authentication and enhancements. Segment Three - Copyright Infringement. Understanding the legal implications and repercusions. Segment Four - Top Five Network Management Mistakes. Learn how to deal with the most common mistakes.
38 minutes | Jun 23, 2020
Network Security and Cellphone Forensics
Segment One - Network Security. Segment Two - Network Security Continued. Segment Three - Network Security Continued. Segment Four - Cellphone forensics.
40 minutes | Jun 22, 2020
Digital Forensic Cases, Expert Witness Testimony, Network Security Standards, Security Standards Continued
Segment One - Digital forensics and the types of cases you may be involved in. Segment Two - Expert witness, testing results and ethics. Segment Three - Network security standards including physical security of devices and continuous operation. Segment Four - Security standards continued with network design and firewall deployment.
37 minutes | Jun 19, 2020
Don’t Click, Computer Security, Phone Scams, Tech Support Scams, Chromebook Forensics, Windows Registry (USBStor) and Imaging Files and Folders
Segment One - Reminding everyone not to click. Reviewing email scams, UAC, Defender, Firewalls and Remote Desktop security. Segment Two - Reviewing phone scams, domain impersonation and tech support scams. Segment Three - Analyzing data from Chromebooks and USB information located in the Windows registry. Segment Four - The difference between imaging a hard drive and imaging files and folders. Brief review of Program Files (x86) folder.
27 minutes | Jun 18, 2020
Sources of Evidence, Searching Email, Backups & Network Documentation.
Segment one discusses locating potential evidence on computers for HR, attorneys and administrators. Segment two talks about searching email with Discovery Attender by SherpaSoftware.com. Segment three covers onsite and offsite backups. Segment four reviews the necessity for documentation, policies, procedures and proper wiring.
33 minutes | Jun 17, 2020
Cellphone Forensics, Understanding Expert Designation, Overview of Network Security Group and the Limitations of Industry Certifications
Segment One - Cellphone forensics, the costs and limitations. Segment Two - What makes and expert witness an expert. Segment Three - Overview of one of our sponsors, the Network Security Group. Segment Four - What is an industry certification and what value does it bring to experts.
38 minutes | Jun 16, 2020
Why we need a full forensic image, what is possible with forensic analysis, adding services for private investigators and basic security
Segment One - We explore why we need a full forensic image. Segment Two - Examples of what information can be retreived during a forensic analysis. Segment Three - How private investigators can add easy to perform computer security analysis to their service offerings. Segment Four - Understanding the basics of remote desktop, virtual private networks and two-factor authentication.
26 minutes | Jun 15, 2020
Failing Hard Drives, Axiom Software, Clone vs Forensic Image & Pirated Software
Segment one discusses dealing with failing hard drives. Segment two talks about Axiom forensic software. Segment three explains the difference between a clone and a forensic image. Segment four lays out the importance of dealing with pirated software, music and other digital products.
37 minutes | Jun 12, 2020
Drive Geometry (Tracks, Sectors and Clusters), Drive Geometry continued, Downloading and Installing Forensic Workstation Utility and Forensic Imager
Segment One - Understanding drive geometry and the relationship between tracks and sectors as well Cylinders, Heads, Sectors and Logical Block Addressing. Segment Two - Drive Geometry continued. Segment Three - Downloading, installing and using Forensic Workstation Utility, a software write-blocker. Segment Four - Downloading, installing and using Forensic Imager.
38 minutes | Jun 11, 2020
Password issues, Assessing Networks, Investigating Cybercrime and End-user Awareness Programs
Segment One - Importance of changing and not caching passwords. Steps to assessing networks. Segment Two - Assessing networks continued, policies and procedures. Segment Three - Investigating cybercrime including ransomware. Segment Four - End-user awareness programs to address email and phone scams.
37 minutes | Jun 10, 2020
Understanding Ransomware, Pitfalls and Decryption Process, Forensic Images, Disk Terminology and How not to ruin a forensic case
Segment One - Understanding ransomware, how it works and steps to consider to increase your chances of getting data back. Segment Two - Ransomware continued, pitfalls, decryption process and protecting backups. Segment Three - Forensic images, track 0 and negative tracks. Segment Four - Forensic images continued, MD5 hash and how not to ruin a forensic case.
26 minutes | Jun 9, 2020
Scams, Video Cameras, Why Defrag Affects Search Hit Results, Encrypt Mobile Laptops
Segment One identifies scams that keep occurring and can cause you financial harm and have criminal liabilities. Segment Two discusses features in Video Camera Systems. Segment Three explains why defrag affects the outcome of search hit results. Experts need to know this and identify any issues for their clients. Segment four reminds you that mobile laptops are a target of corporate thieves and identify theft criminals. This is a reminder to get your laptop encrypted today.
26 minutes | Jun 8, 2020
Recovering Hard Drive Space, Removing Duplicate Files, Experts and Network Assessments
Segment talks about how to recover valuable hard drive space. Segment two discusses the importance of identifying duplicates and older files no longer needed. Segment three explains why experts should stay within their field of expertise. Segment four reviews network assessments.
26 minutes | Jun 5, 2020
USB Security, Pen Testing & Digital Forensic Training
Segment one covers security concerns with USB drives. Segment two explains the proper use of Pen Testing. Segment three identifies the differences between fact witnesses, character witnesses and expert witnesses. Segment four discusses MD5 Hashes and what is imaged when you forensically image platter hard drives.
27 minutes | Jun 4, 2020
Attachment Safe Practices, Mobile Security Concerns, Open Shares and Network Techs
Segment One discusses the dangers of MACROS and how to stay safe. Segments two covers mobile security concerns. Segment three discusses the importance of network assessments. Segment four covers the dangers of open shares and network admin safe practices.
25 minutes | Jun 3, 2020
Computer Security, Digital Forensics and Network Technicians
Segment One reminds everyone that they are on the front lines and how to stay safe. Segments two and three cover digital forensics and segment four covers some of the duties of network technicians to help keep their networks safe and secure.
Terms of Service
Do Not Sell My Personal Information
© Stitcher 2022