Feb 18, 2020
How to Secure Your Business Network
In this episode, Alex Penrose from Jolly Frogs tells us about pen testing, reverse engineering, the Internet of Things (IoT), risk profile and risk appetite statement of organisations, social engineering, and the two departments in organisations that hackers take advantage of to get information, botnets and vulnerabilities, should you or should you not run automatic updates, backups and disaster recovery, the cloud, password databases and alternative like using passwords that are hard to crack but easy to remember, two-factor authentication, and other security dos and dont's.
To read the full transcript, visit the Dorks Delivered blog.