Cyber Security Videos
Expectation vs. Reality Cloud Platform Backup
Contrary to your expectations, after data loss, it’s likely that you will only be able to restore your cloud data partially. This is because only a partial restore is possible with the “built-in” backup. What you need is a business-class backup and recovery solution.
Backup Myths for Cloud Platforms
There are several backup myths circulating that you should be aware of, including believing that robust backup is included in your cloud platform, backup protects you against ransomware and all backup is the same.
Compliance: Following Best Practices
Who wouldn’t want to build a work culture that not only complies with regulatory standards but also prevents hackers from stealing your clients’ sensitive information?
A managed service provider can help you build compliance programs that eliminate your risk of fines, downtime, lawsuits or business shutdown.
MSP (What’s Included – Security, Compliance, Backup)
Are you still relying on your in-house IT team to keep your systems up to date?
Partnering with a managed service provider not only helps reduce the workload of your internal team but also fills in critical technology gaps.
Why Organizations Need an MSP
Outdated technologies are costing your business more than you think. In fact, your network may already be exposed to ransomware.
Why not seek help from MSPs to upgrade your technology infrastructure? Protect your business network against today’s sophisticated attacks with cutting-edge technologies.
Episode 7: Jeremy Miller | #EverydayGSD Podcast
Jeremy Miller, CEO of Lionfish Cyber Security, is interviewed on #EverydayGSD Podcast about his time as Green Beret, his volunteer work, and his role as CEO.
Top Cybersecurity Risks
Your small business is facing more cyberthreats than ever before, such as sophisticated ransomware and malware. However, don’t worry — there are ways to protect your business, such as regular awareness training, testing, and deploying comprehensive cybersecurity solutions.
Elements of Cybersecurity
You wouldn’t leave your car unlocked or ride a bike without a helmet. So, why not give your business the same protection from online threats?
Not sure where to start? An expert IT service provider, like us, may be just what you need.
Need More Reliable IT Services for Your Business?
One of the biggest challenges that small and medium-sized businesses face is how to use their limited resources most effectively. Every decision, from what products or services to offer to how to market and sell them, has to be made to protect their bottom line. Small businesses also face several challenges in obtaining reliable IT services in-house. This is where an IT service provider can be helpful.
Things to Avoid While Practicing Organizational Agility
Even though it’s no secret that small to medium-sized businesses often have vastly fewer resources in comparison to larger enterprises, prioritizing agility is just as critical for their survival. This is because, in today’s world, where a variety of unpleasant surprises can arise at any time, you must be well prepared to avoid becoming overwhelmed.
Is Your Supply Chain Resilient?
An entire supply chain becomes vulnerable if one component is exposed to risk, just like a house of cards will topple if one section is out of balance. Supply chain resilience refers to an organization’s ability to use its resources to handle unanticipated supply network disruptions.
What You Should Know if Your Business Is Targeted by Ransomware
In 2020 alone, there were close to 300 million ransomware attacks worldwide. The cost of ransom payments demanded by hackers are also increasing in tandem with the increase in attacks. Offerings like ransomware-as-a-service have made it easier for criminals with little technical knowledge to become threat actors.
How to Become a Resilient Organization
Organizations and individuals that discovered meaningful ways to practice resilience in the face of change, from remote and hybrid working to digital acceleration, proved to have an enormous strategic advantage.
Operational and Data Integrity Risks of IoT for SMBs
If your business has adopted IoT devices or has imminent plans to do so, there are five major security risks you need to take into consideration to successfully maintain the security of your IT operations and the sensitive assets those IoT devices connect to.
The Role of Compliance in Cybersecurity
Many organizations fall victim to cybercrime because compliance and security are not a high priority for them.
For your organization to run smoothly, both compliance and security are critical.
How Data Compliance and Cybersecurity Differ
To ramp up your organization’s security posture, you can implement strong authentication, data protection, access monitoring, network-to-edge defenses, etc.
By routinely validating the effectiveness of these solutions once they’re in place, you can ensure your organization is taking the necessary measures to avoid non-compliance and security
Why Attacks on Critical Infrastructure Are Dangerous
Experts listed cyberattacks on CI as a top concern in 2020, and this trend is estimated to persist into and beyond 2021.1 In the interest of national and global security, CI facilities must take proper measures to prevent threat actors from accessing their networks.
Compliance as a Service
Protecting your data isn't just smart business. It's required by federal and state laws. Are you taking proper precautions against cyberthreats looming over your business?
Defense Strategies to Combat Insider Threats
Insider threats are among the most dangerous cyber threats out there. Yet, organizations of all sizes seem to be either reluctant or negligent when it comes to fighting them.
Securing Your Remote Workers
Over the last few years, we have seen several tech companies, such as Buffer, Todoist and Help Scout, to name a few, switch to a fully remote or partial work setup. Most of these companies spent months preparing for the switch by training their employees, setting up remote work policies and ensuring the necessary infrastructure was in place to deal with cybersecurity threats.
Have you seen these parental control options?
Are your kids safe online? The Internet is a DANGEROUS place – so if you have children or teens, you’ve probably thought about their safety online more than once. Not taking action can lead to all kinds of TROUBLE down the road, so here’s what to do…
We honor you, the unsung heroes of our country’s supply chain, who show unrelenting dedication and support for the warfighters of our great country!
Presented by Lionfish Cyber Security with Horse Soldier Bourbon. IEDC, PTAC, NDIA, AFCEA
• Networking 4:00 – 4:30
• Opening Remarks 4:30 - Jeremy Miller
• Color Guard – VFW Carmel • Pledge of Allegiance - Tim Pitchford
• National Anthem - Sammi Lorena
• Old Glory • Toast (Flag) - David Hart
• ARMY Birthday • Toast (Army) - John Spanogle
• Patriotic Speech • Toast (Unsung Heroes - DoD Contractors) -Jeremy Miller
• IEDC - Bryan Langley (Indiana Economic Development Center)
• PTAC - Andy Alexander (Procurement Technical Assistance Center)
• NDIA & NEINDIANA - Nick Darrah (The National Defense Industrial Association) ( Northeast Indiana Regional Partnership)
• AFCEA - David Hart (Armed Forces Communications and Electronics Association)
• Alex Hernandez (Special Guest Speaker)
• John Spanogle (Special Guest Speaker)
• Closing - Jeremy Miller
• Bottle Signing /Networking
Lionfish Interview with Chris Kubeca
Author Chris Kubecka is a world-renowned cyber warfare and offensive digital security expert and author of the book, Hack the World with OSINT. She is known for re-establishing the Saudi Aramco international business networks and establishing security after a major cyberwarfare attack. In this video, she shares her cyber career journey and reveals her secrets to success with Lionfish CEO, Jeremy Miller.
Security Weekly, Episode #649 - "Fighting the Cyber War With Battlefield Tactics" - Guests include:
Jeremy Miller, CEO, Lionfish Cyber Security and Philip Niedermair, CEO, National Cyber Group
Episode #649 discusses how mission set tactics used by Special Forces can be applied directly to the cyber war being waged today. These mission sets are very relevant for the front line of cybersecurity professionals, who are essentially the next generation of Special Operation forces. These are the men and women that protect our country, our businesses and our families. Approaching the cyber war with this mindset, Miller is re-aligning how cybersecurity in small to medium sized businesses is structured. His team plans to be a force multiplier for SMBs by bundling resources and capabilities into an affordable security platform, making cyber security more a strength than a weakness for these organizations.
Cyber Security Maturity Model Certification (CMMC) Explained
Katie Arrington, CISO for the Office of the Undersecretary of Defense for Acquisition, discusses the importance of the Cybersecurity Maturity Model Certification (CMMC) for all government contractors, including SMBs throughout the supply chain.
How Privacy Violations, Fines and Economic Sanctions Create Darker Opportunities - Christina Kubecka, CEO of HypaSec and Special Advisor to Lionfish Cyber Security
Although there’s no flying car in every garage yet. We do have malicious code capable of crashing governments and markets easily available by Google. A world where data seems leaked more often than secured. New laws and fines appear an opportunity to reverse the current, rather depressing trend of our private data seemingly spilled everywhere, breach after breach. Leaked data, compromised and vulnerable systems have become a new type of currency in the underground cyber crime economy. Some economically sanctioned countries, seeing high returns possible from digital crime, have invested heavily. The European Union’s new data protection regulations, EU GDPR, come into force in May 2018 with wide ranging implications and worldwide income fining teeth. Unfortunately, with progress comes new cyber crime opportunities, for some regimes with nuclear weapons. Learn key points and the effect the EU GDPR can have on your organization. Serious pitfalls, loopholes and take aways. Unravel the way some sanctioned countries actively utilize breaches ad digital crime to fund “interesting” regimes and a new type of cyber crime built on privacy.
Hack the World and Galaxy with OSINT - Christina Kubecka, CEO of HypaSec and Special Advisor to Lionfish Cyber Security