Podcast

Challenging the Cybersecurity System: Why Do We Continue To Make The Same Mistakes

In this episode, we talk with Adam Gordon from ITProTV and Chris Foulon from the Breaking into Cyber podcast to discuss some of the things that organizations are getting wrong with cybersecurity. It’s pretty obvious to most people that something in the industry simply isn’t working &#8...

Why you should model your cybersecurity program on an industry framework

The California Consumer Privacy Act is right around the corner. Organizations will need to be compliant starting in 2020. CCPA is a game-changer for the cybersecurity space. The ability for your customers to sue you for breaches without even having to prove damages is a huge change. But you ca...

Common SMB Cybersecurity mistakes

Cybersecurity is a concern that all companies have to deal with. It’s not something only for large companies. You see, like it or not, we are actually in a cyber war. Nations are actively targeting and attacking one another. Companies just find themselves caught up in the cross fire. In toda...

Don’t have anything that attackers want? Think again. Ex-CIA analyst shares why every org is being targeted

You have probably heard someone say or even thought at some point – I don’t have anything of value for a cyber attacker. If so, you are actually very very wrong. In this episode, Angela Hill, an ex-CIA analyst walks us through how and why nation states are actively targeting and comp...

Security Awareness Training: Building transformational programs that actually effect change

In today’s episode, our guest, Perry Carpenter from KnowBe4 provides insanely actionable advice on how organizations should implement security awareness programs. You see: Just throwing information at employees doesn’t make them any better. Instead, organizations must overcome the 3 a...

Using the CIS20 security controls as a starting point for a security program (Part 2)

For small and medium organizations, implementing a formal security program can see like a huge task. However, breaking this into small steps can help make that goal seem more attainable. The CIS 20 security controls is a framework that every SMB should begin implementing. Under CCPA, organizatio...

Using the CIS 20 security controls as a starting point for a security program (Part 1)

For small and medium organizations, implementing a formal security program can see like a huge task. However, breaking this into small steps can help make that goal seem more attainable. The CIS 20 security controls is a framework that every SMB should begin implementing. Under CCPA, organizatio...

What exactly is cloud security? Is it different than traditional security?

With the widespread adoption of cloud technologies in the last decade or so, we so often hear about cloud security. In this episode, Adam Gordon, an educator and experienced professional discusses cloud security with us. What exactly is the cloud? How is it different? Is it really new? And the top a...

M is For Malware: A Security Consultant’s Passion Project

Curtis Brazzell is a security consultant who has been working in information security for several decades. One day, while reading a bedtime book to his toddler, Curtis had an idea. Why not write a cybersecurity A-B-C book for kids. We know that children need to be taught security principles early...

HIPAA is an example of the minimum security controls organizations should implement

Donna Grindle discuses the HIPAA law and the security controls organizations must implement to be compliant.

About SmartFix

We are a family owned business that provides fast, warrantied repairs for all your mobile devices.

Brooklyn Area

2307 Beverley Rd Brooklyn, New York 11226 United States

1000 101-454555
[email protected]

Store Hours
Mon - Sun 09:00 - 18:00

San Francisco Area

358 Battery Street, 6rd Floor San Francisco, CA 27111

1001 101-454555
[email protected]

Store Hours
Mon - Sun 09:00 - 18:00

121 Resources for you to:

Learn & Master Cyber Security
Send Me the PDF
close-link
Get the Exclusive Bonus
Privacy Checklists and My Favorite Resources

Get Instant Access! 
Your information will never be shared
close-link
LET'S FIGURE OUT HOW TO HELP YOU BECOME A CYBER HERO + FREE STUFF!

Reasons to Subscribe to the CyberX Email List:

 
CLICK HERE TO SUBSCRIBE

 1. Free Stuff 
You'll get instant access to free resources. 

 2. Content Tailored to You 
Over time, Ill get to learn more about you and deliver content that actually matters

 3. No Hype 
Just real content that's meant to make a difference. 
 

close-link

Download the PDF Version Of This Guide

Want to save this guide for later? I'll email you the PDF for free. 
 
DOWNLOAD THE FREE GUIDE
close-link

Discover the holes in your security program with our free self-assessment


Take our security self-assessment and get customized advice that will walk you through how you can improve your organization's security and reduce the risk of breaches in less than 60 days. 

 
START THE ASSESSMENT

Takes 5 minutes
close-link

SAVE MY SPOT!

How would you like us to help you?

Reserves
I want to do my own security using CyberX's proven frameworks.
Warrior
I want CyberX to do my cybersecurity WITH me
We've put together frameworks and guides for you to build a cybersecurity and compliance program
CyberX will help build strategies and/or consult with you or your team to set you in the right direction. Execution is not included.

Tell us about you and your business

It proviedes us with necessary insight into your business and goals

Name

Email

Phone

Only 1 more step

It allows us to create a plan to reach your goals much faster

Monthly IT Budget

Company Name

Almost Ready

What are your struggling with?

What services are you looking for? (Check all that apply)

...expect a quick reply from our team soon!

SEND US YOUR REQUEST