
Cyber Savvy
DTC, Inc.
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will.
How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful?
Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which directly impact business owners. Our Cyber Savvy podcast episodes feature Mike Shelah as he brings in a new guest each month.
New episodes will be posted twice a month on the first and last Thursday, make sure to follow and subscribe wherever you listen to your podcasts, so you don't miss new content!
We would love to hear from you! Please send us your comments and questions to: AskUs@DTCtoday.com
Categories: Technology
Listen to the last episode:
Send us a text In this episode of the Cyber Savvy Podcast, host Mike Shelah chats with James Stanger, Chief Technology Evangelist at CompTIA. James shares his unique journey from a PhD in British Romantic Literature to becoming a cybersecurity expert. The conversation explores the revolution in cybersecurity, the critical importance of backups in fighting ransomware, and the evolution of technology that's making both our lives easier and more complex. Tune in for valuable insights on digital ...
Previous episodes
-
28 - Tech Acceleration and the Future of Security with James Stanger | Part One Tue, 13 May 2025
-
27 - Back to Basics! Understanding Your Digital Crown Jewels with Evgeniy Kharam | Part 2 Tue, 22 Apr 2025
-
26 - Back to Basics! Understanding Your Digital Crown Jewels with Evgeniy Kharam | Part 1 Mon, 07 Apr 2025
-
25 - The Role of Cyber Insurance in Your Business with Steve Heller | Part 2 Tue, 25 Mar 2025
-
24 - The Role of Cyber Insurance in Your Business with Steve Heller | Part 1 Tue, 11 Mar 2025
-
23 - Understanding CMMC Requirements with DefCerts CEO Ryan Bonner | Part 2 Tue, 25 Feb 2025
-
22 - Understanding CMMC Requirements with DefCerts CEO Ryan Bonner | Part 1 Tue, 11 Feb 2025
-
21 - Building Cyber Resilience with Tasha Cornish | Pt. 2 Tue, 28 Jan 2025
-
20 - Building Cyber Resilience with Tasha Cornish | Pt. 1 Tue, 14 Jan 2025
-
19 - Cybersecurity's New Frontier for Defense Contractors | Part 2 Tue, 17 Dec 2024
-
18 - Cybersecurity's New Frontier for Defense Contractors | Part 1 Thu, 05 Dec 2024
-
17 - Compliance Frameworks and Cybersecurity Speak with Loren Larson | PART 2 Mon, 18 Nov 2024
-
16 - Interview with Dell Cyber Security Specialist Loren Larson | PART 1 Thu, 07 Nov 2024
-
15 - Introducing Mike Shelah Tue, 22 Oct 2024
-
14 - Main Threats Against Medical Professionals ft. Scott Leister Tue, 08 Oct 2024
-
13 - The Drivers of DTC's Culture ft. Monica Smith and Pam Villeneuve Tue, 17 Sep 2024
-
12 - Just Culture Continuation ft. Pablo Breuer and Monica Smith Tue, 13 Aug 2024
-
11 - What is Just Culture? ft. CSO Andrew Rose and Monica Smith Tue, 09 Jul 2024
-
10 - Cyber Security Q&A ft. Scott Leister Tue, 11 Jun 2024
-
9 - The Henry Schein Attack Tue, 14 May 2024
-
8 - Season 1 Recap and Season 2 Preview Tue, 09 Apr 2024
-
7 - Future of Cybercrime and Cybersecurity Tue, 14 Nov 2023
-
6 - Data Breach Tue, 10 Oct 2023
-
5 - Identity Theft Tue, 12 Sep 2023
-
4 - Cyber Extortion Tue, 08 Aug 2023
-
3 - Phishing Tue, 11 Jul 2023
-
2 - History of Cybercrime Tue, 13 Jun 2023
-
1 - Introduction to Cyber Savvy Tue, 30 May 2023