Artwork

Player FM - Internet Radio Done Right
Checked 3d ago
הוסף לפני one שנה
תוכן מסופק על ידי Makani Mason. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Makani Mason או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Player FM - אפליקציית פודקאסט
התחל במצב לא מקוון עם האפליקציה Player FM !
icon Daily Deals

66. What is a Security Stack

22:05
 
שתפו
 

Manage episode 487148529 series 3553424
תוכן מסופק על ידי Makani Mason. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Makani Mason או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.

Helpful episodes to listen to first

4 Strategies for Picking Your Priorities

Questions we answer in this episode

What does Makani love building?

What is a Security Stack?

How do you build one?

What is the twist on our usual Call-to-Actions for this series?

Episode summary

A Security Stack is a piece of your Personal Security Plan focused on a specific area. It is comprised of layers of protection that work together to keep you safe.

You build a Security Stack using The Bulletproof Stack Formula, which consists of 4 Phases, 5 Questions, and 6 Layers.

Call to action

Please build this awesome system together with me by sharing your thoughts. Does the idea of a "Security Stack" make sense to you so far? Let me know on the forum.

Get the FREE Bulletproof My Identity Starter Kit

Get help from Makani

  continue reading

72 פרקים

Artwork
iconשתפו
 
Manage episode 487148529 series 3553424
תוכן מסופק על ידי Makani Mason. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Makani Mason או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.

Helpful episodes to listen to first

4 Strategies for Picking Your Priorities

Questions we answer in this episode

What does Makani love building?

What is a Security Stack?

How do you build one?

What is the twist on our usual Call-to-Actions for this series?

Episode summary

A Security Stack is a piece of your Personal Security Plan focused on a specific area. It is comprised of layers of protection that work together to keep you safe.

You build a Security Stack using The Bulletproof Stack Formula, which consists of 4 Phases, 5 Questions, and 6 Layers.

Call to action

Please build this awesome system together with me by sharing your thoughts. Does the idea of a "Security Stack" make sense to you so far? Let me know on the forum.

Get the FREE Bulletproof My Identity Starter Kit

Get help from Makani

  continue reading

72 פרקים

כל הפרקים

×
 
Helpful episodes to listen to first Seven Critical Router Security Settings How DDoS Attacks Affect You Questions we answer in this episode What are the 5 questions in the Bulletproof Stack Formula? How do they help us? Episode summary There are 5 questions we can ask to help us build a Security Stack. These questions help to ensure that our Security Stack is relevant. This means there is a legitimate threat that I care about, and I'm willing and able to take the steps necessary to defend myself. The 5 questions can be remembered with 5 words: assets, threats, risks, options, tradeoffs. Assets: What am I protecting? Threats: What are the threats? Risks: What are the risks? Options: What are my options for defense? Tradeoffs: What tradeoffs am I willing to make? Call to action Help me build a system that is going to work for you. How do you feel about the 5 words I chose to represent each question: assets, threats, risks, options, tradeoffs. Are there any you would replace? Let me know on the forum . Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Helpful episodes to listen to first Our Super Chatty Devices Questions we answer in this episode What are the 4 phases in a Security Stack? How do they help us? Which one is the most important? Episode summary The 4 phases of a Security Stack are: Learn, Prevent, Detect, and Repair. This parallels how an attack affects us over time. We want to Learn about an attack before it hits us, and ideally Prevent it from succeeding. But just in case it does get past our defenses, we want to be sure we can Detect the attack and Repair the damage done. Call to action Please build this awesome system together with me by sharing your thoughts. Are the 4 phases - learn, prevent, detect, repair - sufficiently simple and clear to you? Let me know on the forum. Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Helpful episodes to listen to first 4 Strategies for Picking Your Priorities Questions we answer in this episode What does Makani love building? What is a Security Stack? How do you build one? What is the twist on our usual Call-to-Actions for this series? Episode summary A Security Stack is a piece of your Personal Security Plan focused on a specific area. It is comprised of layers of protection that work together to keep you safe. You build a Security Stack using The Bulletproof Stack Formula, which consists of 4 Phases, 5 Questions, and 6 Layers. Call to action Please build this awesome system together with me by sharing your thoughts. Does the idea of a "Security Stack" make sense to you so far? Let me know on the forum . Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Questions we answer in this episode What is the 4P formula? What are 4 strategies for picking your priorities? What is the theme of our new series of episodes? How many episodes do you think it will take Makani to finish it? Episode summary There's a lot of ways you can improve your online security. But where should you begin? It can be a daunting question to answer. Picking your priorities goes a long way. There are 4 simple strategies you can use to get started: activity, threat, value, and speed. You could prioritize by activity: something you spend a lot of time doing or that makes you nervous. You could prioritize by threat: a common threat like phishing, or a less common threat relevant to your situation. You could prioritize by value: maybe your highest priority is keeping your retirement fund safe. You could prioritize by speed: you want protection, but you are super busy and need to be able to do so quickly and efficiently. Call to action Pick the strategy you want to use to kick off your personal security plan. Then come share your pick on the forum. Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Helpful episodes to listen to first Unique Email Addresses Troy Hunt Phished Troy Hunt Part 2 Questions we answer in this episode Why is Makani sharing his story? What is a domain name registrar? What is whois data? How can it help me stay safe online? Episode summary A domain name is what we think of as a website - facebook.com or makanimason.com. In order to have your own domain, you need to pay some money and share some personal information with a domain name registrar. This information is then publicly available, unless you choose to make it private through your registrar. Unfortunately for some domains, like ones that end in .us - keeping this information private is prohibited. Unfortunately, I didn't realize this and registered a .us domain, sharing publicly my name, email address, and phone number. It was a great invitation for hackers and scammers to harass me. Call to action Share your story of being hacked, scammed or tricked online. Give someone the gift of learning from your experience. Links Link Lantern: shine a light on an unfamiliar website Find out when a website was registered Hover: a simple trustworthy domain registrar Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Helpful episodes to listen to first Episode 62, Even a Security Expert Can Get Phished (Troy Hunt, Part 1) Episode 17, Eliminating Email Exhaustion - Part 2 - Unique Emails Episode 42, Website and Email Filtering, Part 3: Email Friends Questions we answer in this episode Who is to blame for Troy getting phished? How can you reliably tell who sent you an email? How can you cut down your email spam? What are two major flaws in our email system? Episode summary I don't blame Troy for getting phished. I blame the serious flaw in our archaic email system. Anybody can send anyone an email and you have no idea who it's from. No wonder phishing is a problem. You can't fix the system, but if you're willing to take action, you can greatly compensate for that flaw. Call to action Take one small step in strengthening your protections against phishing. Maybe listen to episode 17 about unique email addresses. Or episode 42 on how to add a friend system to your email inbox. Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Questions we answer in this episode Who is Troy Hunt? How did he get phished? What are some lessons we can learn from his story? Who will we be inviting as a guest to the podcast? Episode summary Troy Hunt, a security expert, got phished. He clicked a link in an email, and entered his password into a fake website. The hackers logged into his Mailchimp account that he uses to send his email newsletter. They stole the email addresses of all his subscribers. Troy was humble and brave enough to share his story with us so we can learn. Thank you, Troy! Call to action Share your story of being hacked, scammed or tricked online. Give someone the gift of learning from your experience. Links About Troy Hunt Troy Hunt, Security Expert, Gets Phished Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Questions we answer in this episode What is the website, ID.me used for? What are the two PIN numbers used in filing your taxes? How can I get an identity protection (IP) PIN? What does it mean (in online security) to plant your flag? Episode summary When filing your taxes, there are 2 different PINs you might use. The first is called your self-select PIN. It's 5 digits long, and pointless. The second is called an Identity Protection (IP) PIN. It's 6 digits long, and awesome. It is a strong layer of protection against a hacker stealing your tax refund. Call to action Click here to get your Identity Protection PIN. Links Get an Identity Protection PIN Information about the IRS self-select PIN Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Questions we answer in this episode What is a DDoS attack? What social media platform was recently the target of a DDoS attack? How can your home network be impacted by one? What can you do to protect your home network? Episode summary DDoS attacks are growing faster than the squash in my garden - seriously, it's wild! The slaves in the army? Devices quietly hijacked by hackers. There are millions of them scattered around the globe... And yes, your home devices could be part of the army without you knowing it. Call to action Take one small action to improve your home network's security. You have 9 suggestions, found in Episodes 51-59 . Links DDoS attack against X/Twitter Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Helpful episodes to listen to first Episode 40 - Website and Email Filtering Episode 56 - Home Network Attacks From Within Episode 57 - How Firewalls Protect You And What You Might Be Missing Questions we answer in this episode What is a trojan horse? What are two ways an outbound firewall protects you? What is an outbound firewall's greatest frustration and greatest strength? What is an allow list? Episode summary If you want to protect your computer, you need both an inbound and outbound firewall. Almost nobody uses an outbound firewall - despite it's awesomeness. The firewall limits the damage malware can do by blocking it from phoning home or spreading through your network. Sure, you'll need to pay attention when your firewall asks you questions. But that tiny hassle is worth the warm fuzzy you'll get knowing that only apps you trust can make outbound calls. Call to action Join the tiny but elite crowd of people using an outbound firewall. If you're on a Mac, get Little Snitch Mini . If you're on Windows or Linux, get Portmaster by Safing . Then report back on the forum how it goes. Links Portmaster by Safing Little Snitch Mini Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Helpful episodes to listen to first How to Access Your Router Home Network Attacks From Within Questions we answer in this episode What is a guest network? How can it protect my home network? Does everyone need to use it? What are the 3 categories of Internet of Things (IoT) devices? Episode summary A guest network is a second wifi network you can set up at home. It lets visitors use your internet without touching your main network. That means your personal devices are protected from any malware their devices might be carrying. If you often have people over, it’s a smart extra layer of protection. A guest network can also protect your devices against threats from your own devices if they get infected. Call to action Login to your router, and get a guest network setup today. Please refer to your router's manual for instructions. Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Helpful episodes to listen to first Don't Answer the Phone Bulletproof My Home Home Network Attacks From Within Questions we answer in this episode What is a firewall? Why do I need more than one firewall? Which device already has a firewall enabled? What kinds of devices have an increased need for a firewall? Episode summary Firewalls in buildings stop fire from spreading. Firewalls on computers do something similar: they stop malware from spreading. Your router has a firewall that blocks threats from the internet before they reach your home network. But what if the malware is already inside your network? For that, you need a firewall on each of your computers. These are especially vital for laptops, which often connect to public wifi. And here’s the secret weapon almost nobody talks about: outbound firewalls. They’re a unique and powerful extra layer of protection - and wildly underrated. Call to action Please verify that the firewall is turned on for each computer in your home. Links Change Firewall settings on Mac How to turn on Windows firewall Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Helpful episodes to listen to first Don't Answer the Phone Questions we answer in this episode What is a computer virus? How does a computer virus spread? How does patient (device) zero get infected? What protection do we NOT have against these attacks? Episode summary What happens if a device in your home gets infected with a computer virus? Just like a human virus, it wants to spread. But how does that first device get infected? There are plenty of ways, but one that is often underestimated is through Internet of Things (IoT) devices. Smart TVs, Alexa, and other "smart" appliances are prime targets for hackers. Ironically, some of the must vulnerable devices are the ones meant to protect you - like a home security system. And what's worse, your router probably won't stop the malware from spreading once it's inside your network. That's why need layered protection. In this series, we'll walk through at four them (maybe more). Call to action Make a list of all devices in your home that connect to the internet. Specifically look for devices besides phones and computers that might get overlooked. Keep this list handy as you continue listening to the rest of this series of episodes. Links Ring pays $5.8 million for privacy failures Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Questions we answer in this episode What are the seven most critical router security settings? What is WPS and when is it okay to use? What is a brute force password attack? Which unexpected setting helps against this attack? Episode summary Default passwords and settings make a hacker's job easy. It's time to take just a few minutes and strengthen your router's security. If you don't know how to access your router, please listen to Episode 54 Call to action Adjust these settings: 1 - use a strong, unique router admin password of at least 14 characters 2 - disable remote administration if you can or use a random username and strong, unique password for the cloud account 3 - enable automatic firmware updates 4 - use a strong, unique wifi password of at least 16 characters 5 - use a unique wifi name with no brand or personal information in it 6 - disable WPS (Wi-Fi Protected Setup) 7 - disable UPnP (Universal Plug and Play) Links Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Questions we answer in this episode Why do I need the manual for my router? What's the first step in accessing my router? How many passwords are there for my home network? What are the two methods for connecting to a router? Episode summary If you can install an app, and visit a website, you can learn to access your router. Reading the section in the router's manual should help. Yes, I realize many of us don't read manuals anymore, but that's what I suggest. You also need to know your router's admin username and password is. It's probably printed on the bottom of your router, but if not, here again, the manual is your friend. Finally, install the router's brand app if they have one, and you're ready to go! Call to action Connect to your router, change the admin password, and keep that password in a safe place. Links Common router passwords Get the FREE Bulletproof My Identity Starter Kit Get help from Makani…
 
Loading …

ברוכים הבאים אל Player FM!

Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

מדריך עזר מהיר

האזן לתוכנית הזו בזמן שאתה חוקר
הפעלה