Look for any podcast host, guest or anyone
Showing episodes and shows of

Mat Lock & Brad Lilly

Shows

Cyber HeroesCyber HeroesThe Fake Website Exposé: Unveiling the Top 7 Tactics to Spot and Avoid Online DeceptionIn this episode, Mat and Brad delve into the world of fraudulent websites and equip you with the essential knowledge to protect yourself from cyber scams. Join them as they uncover the seven key signs that can help you identify a fake website and stay one step ahead of online fraudsters. From analysing website design and functionality to scrutinising URL details and user reviews, their expert tips and strategies will empower you to navigate the digital landscape with confidence. Don't let deceptive websites compromise your security and privacy. Tune in to "The Fake...2023-07-0613 minCyber HeroesCyber HeroesRansomware Explained: How to Protect Your Business From AttacksIn this episode of the CyberHeroes Podcast, we discuss ransomware, its impact on businesses, and how to protect and recover from attacks. We were joined by Greg Edwards of Canauri, a cybersecurity expert with extensive experience dealing with ransomware threats. As ransomware attacks constantly evolve, staying informed about the latest trends is crucial to protect your organisation. We explore the shift from targeting individual users to attacking businesses and the increasing prevalence of double extortion, where attackers encrypt data and threaten to leak sensitive information. The conversation begins with an overview of ransomware...2023-04-0532 minCyber HeroesCyber HeroesWhy You Should Avoid Using Browser-Based Password ManagersIn this episode of Cyber Heroes Live, the hosts discuss the risks of browser-based password managers and recommend dedicated password manager apps for better security. Chrome and Safari are the most commonly used browser-based password manager platforms, which remember and autofill passwords for various web pages. Despite their best efforts, their security features are still limited and vulnerable to cyber-attacks. Here are 3 important questions: What are browser-based password managers, and why are they not recommended? What are the limitations of browser-based password managers in terms of security features and vulnerability to cyber-attacks? What are...2023-04-0312 minCyber HeroesCyber HeroesHow To Respond To (And Recover From) A Ransomware AttackAs it turns out, ransomware isn’t ‘technically’ the attack vector, it's more of the symptom or the 'ultimate goal'. Most ransomware cases use phishing as the means of compromising a network, that’s the most popular attack vector in 2023. Regardless, a ransomware attack seeks to encrypt or exfiltrate a company's sensitive data or proprietary information. Money is then demanded to provide either a decryption key or to not release the data into the public domain. To address this very real threat, Mat talks to Curtis Preston (aka Mr. Backup), a data protection expert who speciali...2023-03-0951 minCyber HeroesCyber Heroes6 Ways To Protect Your Smartphone From CybercriminalsSmartphones have become an integral part of our daily lives, and we rely on them for everything from communication to banking and shopping.  However, the risks of cyber attacks on phones are significant, and they can result in the theft of personal information, financial loss, and other consequences. In this episode of the CyberHeroes Podcast, Brad and Mat discuss the general advice around Android and Apple phone security, the risks of cyber attacks on phones, and the top 6 tips for reducing the risk of cyber attacks when using your smartphone. This episode is p...2023-03-0721 minCyber HeroesCyber HeroesHow to create a culture of cyber savvinessIn this episode Mat and Brad discuss the Top 5 steps for making cyber security savviness a culture inside any organisation. This is a guide for managers and leaders who understand that building comprehensive defences against cyberattacks is a necessary demand of modern business. There's no 'one thing' that will be successful in averting cybercrime, but rather a deliberate, cohesive series of activities and behaviours by an entire organisation. As always the aim is to help you, the listener better able to protect your people, profits and reputation from cyber criminals. If you get...2023-02-2614 minCyber HeroesCyber HeroesHow a Zero Trust Policy Can Protect Your BusinessWhat is Zero Trust? In this episode, Brad and Mat take a deep dive into all things Zero Trust, a security framework that assumes that every person, device, and application that attempts to access your network is a potential threat. Cyber attacks are becoming more sophisticated, and the rise of remote work and bring-your-own-device (BYOD) policies have made it easier for attackers to gain access to sensitive information. Zero Trust helps address these challenges by ensuring that every access request is verified and authorised, regardless of where it originates. If you're...2023-02-2013 minCyber HeroesCyber HeroesThe Business of RansomwareYou have probably heard the term 'ransomware' but is it a risk to you? In this episode of the Cyberheroes podcast, we discuss what ransomware is, how it works, and the motivation behind it. We also discuss the process and percentage chances of recovering your data, even if you pay a ransom demand... And, importantly, we talk about some of the things you can do that will help to prevent you from becoming a victim of a ransomware attack. On The Cyber Heroes Podcast, we talk about how to protect your...2022-12-2711 minCyber HeroesCyber Heroes12 Tips To Have A Happy (cybercrime-free) ChristmasFor most of us, the holiday season is the perfect time to be with family and friends, hang out at the beach, and overindulge in some yummy food. What’s not to love? But cybercriminals also love Christmas. Why? Because it’s the perfect time for them to attack. Think about it. The reason cyber attacks surge between Christmas and the New Year is that businesses and, people, in general, have their guards down. Cybercriminals know that companies are operating with fewer staff and are ‘less r...2022-12-1731 minCyber HeroesCyber HeroesHow a Healthcare Professional Got Hacked for $100kThis is a story of how a medical professional on the South Coast of NSW got hacked for almost $100,000. Part of what drives us at Cyber Heroes is understanding the personal impact that attacks such as this have on the victims. $100,000 would be enough of a loss for many small businesses to close their doors forever. But in this example, the business owner's cyber insurance paid out the majority of the loss so the monetary loss was closer to $10,000. But no insurance policy in the world can undo the harm to a reputation...2022-11-2913 minCyber HeroesCyber HeroesHow to Complete Your Cyber Insurance QuestionnaireWelcome to this episode of our podcast, where we will be diving into the world of cyber insurance. Mat discusses what cyber insurance is, how it works, and the pros and cons of having it. We will also cover the key factors you should consider when completing your questionnaire, to ensure that you don't get claims rejected. Our guest for this episode, Brendan Goddard, is an expert in the field of cyber insurance and provides insights and advice on how to navigate this complex and rapidly evolving area.  Join Mat and Brendan as t...2022-11-0428 minCyber HeroesCyber HeroesGmail Gaff or Identify Theft?Imagine you receive confirmation of a booking for two business class seats to Paris in your name from Singapore Airlines... But you didn’t book any flights. In this episode, you’ll hear the mysterious story of one of our team, James.  Not only will the series of emails and odd circumstances cause you to question, ‘What would I do?’ but it also brings into question the seemingly low levels of security and scrutiny surrounding your airline frequent flyer accounts. On The Cyber Heroes Podcast, we talk about how to protect your peop...2022-10-2611 minCyber HeroesCyber HeroesHow a Tradie Got Hacked for $5,000When Dave (a plumber) emailed his client to advise that he had a new bank account, all appeared normal and they paid the $5,000 into his new account. The problem was, Dave didn't send the email and didn't have a new bank account.  Dave's email account had been compromised and all inbound emails were being duplicated and forwarded to a cyber criminal without his knowledge, obviously. In this episode, you'll hear how this cybercrime played out and how you can ensure you never become a victim of a crime like this. On T...2022-10-2014 min