Cybersecurity with Dan Greenig
Manage episode 348252713 series 3373728
With the internet landscape in flux and social media applications poised for change, keeping up with security tactics is more relevant than ever. But with so many moving parts, new applications and sudden privacy policy rewrites, how can one be sure they are staying up-to-date with their personal and business security online?
Kathryn poses this question to professional White-Hat Hacker Dan Greenig as he delves into his 7 Principles of Cybersecurity plus guidelines for evaluating applications and platforms. He offers advice uniquely tailored to the needs of Authorpreneurs who use a broad array of applications in their writing careers.
About Our Guest:
Dan Greenig is a Cybersecurity professional, specializing in corporate cybersecurity and mitigating hacking risks by finding the vulnerabilities first- as a White-Hat Hacker. He calls on his experience as both writer and husband of a writer to give insights on the needs of the Authorpreneur.
You can find Dan online at his personal website here.
Topics Discussed in the Episode
See the tab above “Chapter Markers” for a list of Timestamps.
Highlights include:
- Hacking as a career- what is a White-Hat?
- Why do hackers come from and why do they do it?
- Everyone is Hacking Everyone- How individuals get around State snooping
- Dan’s 7 Principles of Cybersecurity
- 3 Security Guidelines
- DefCon and the Internet of Things
- Back ups and Encryption
- Messaging Apps and Encryption
- How to apply the Principles
- Social Engineering- Phishing on Social Media, emails and phone calls
- Children and Security
- Resources for Writers
- Fast Fave Three
- Different isn’t always Better, but Better is Always Different
Resources mentioned in this episode:
Note: Authorpreneurs Unleashed is listener-supported. When you buy through links on our site, we may earn an affiliate commission at no additional cost to you. Thanks for your support, and for sharing this podcast with your writing friends.
- DefCon Hacking Conference
- The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick
- Social Engineering by Christopher Hadnagy
All the links for Authorpreneurs Unleashed and Unleashing the Next Chapter:
- Learn more about Unleashing the Next Chapter, Authorpreneurs Unleashed, and Kathryn at UnleashingTheNextChapter.com.
- Find all our social media links HERE.
- Subscribe to the Unleashing email newsletter HERE
- Subscribe to the Authorpreneurs Unleashed podcast HERE or through your favorite podcast player.
Kapitel
1. Cybersecurity with Dan Greenig (00:00:00)
2. Introduction:Plants and Writing (00:00:44)
3. Hacking as a career- what is a White-Hat? (00:06:46)
4. Where do hackers come from and why do they do it? (00:11:15)
5. Dan’s 7 Principles of Cybersecurity (00:18:54)
6. 3 Security Guidelines (00:28:49)
7. DefCon and the Internet of Things (00:31:01)
8. Back ups and Encryption (00:35:31)
9. Messaging Apps and Encryption (00:40:27)
10. How to apply the Principles (00:41:59)
11. Social Engineering- Phishing on Social Media, emails and phone calls (00:45:51)
12. Children and Security (00:52:40)
13. Resources for Writers (00:58:18)
14. Thanksgiving & Fast Fave Three (01:03:58)
15. "Different isn’t always Better, but Better is Always Different" (01:03:58)
52 episoder