
One Step Beyond Cyber
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way.
As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as well as provide tips for simplifying tech.
Whether you're a business owner, IT professional, or someone interested in navigating the cyber world — this podcast is for you. We understand the challenges of managing technology, and we're here to help. Sit back, relax, and join us as we dive in, providing you with the knowledge and tools you need to succeed in this rapidly evolving field. Subscribe now and become a part of the One Step community!
One Step Beyond Cyber
S3 EP 03 Retail Under Attack: Lessons from the Largest Data Breach in History
One Step Secure IT provides a range of specialized services including Cybersecurity, Managed/Co-Managed IT, Information Security, and Compliance, that enable businesses across the country to leverage technology as a competitive advantage and prioritize business growth. Contact us today: https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form
Episode Chapters:
00:00 Episode outline
00:26 Welcome Episode
00:50 Unpacking Hot Topic Cyber breach. What happened with this breach. What do we know about the breach so far?
04:27 This breach exposed highly sensitive data, including partial credit card details and loyalty points, which hackers could exploit for identity theft, financial fraud, and account takeovers. How these types of stolen data specifically pose risks—not just for customers, but also for retailers?
06:02 Hot Topic, Torrid, and Box Lunch are all larger businesses, but we tend to speak to more of the SMB entrepreneur is something like this still relevant to those size businesses?
08:49 How to minimize the risk (compliance and policies), the impact (incident response plan), and the reputational damage?
16:36 What exactly does double extortion entail, and should businesses be concerned about even more risks in these types of attacks?
21:58 Final Thoughts and Closing
Podcast Video One Step Secure IT - YouTube
Learn about our services https://www.onestepsecureit.com/
Host by:
Scott Kreisberg - CEO & Founder of One Step
Produced by Genesis Aquino
Music Production by Michael Stevens
----
LinkedIn:
https://www.linkedin.com/company/onestepsecureit/mycompany/
Facebook:
https://www.facebook.com/OneStepSecureIT
Twitter:
https://twitter.com/onestepsecureit