Byte Sized Security

Marc David

In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new episodes released every Monday, Byte Sized Security covers topics like social engineering, password management, multi-factor authentication, security awareness training, regulatory compliance, incident response, and more. Whether you're an IT professional, small business owner, developer, or just someone interested in learning more about cybersecurity, Byte Sized Security is the quick, easy way to pick up useful tips and insights you can immediately put into practice. The clear, jargon-free advice is perfect for listening on your commute, during a lunch break, or working out. Visit bytesizedsecurity.com to access episodes and show notes with key takeaways and links to useful resources mentioned in each episode. Don't let cybercriminals catch you off guard - get smart, fast with Byte Sized Security! Tune in to boost your cybersecurity knowledge and help secure your part of cyberspace. read less
Technology

Episodes

Ep42: Three Privacy Actions You Need Today
Jul 5 2025
Ep42: Three Privacy Actions You Need Today
# Byte Sized Security Show Notes## Episode Title: 3 Immediate Actions to Protect Your Privacy Today## Episode Summary:In this episode of Byte Sized Security, host Marc David outlines three practical, actionable steps to enhance your privacy protection immediately. With data breaches nearly doubling in 2024 and companies like AT&T and Ticketmaster experiencing massive exposures, these privacy protection measures aren't just theoretical—they're essential defenses against real threats.## Key Discussion Points:* The alarming state of data breaches in 2024: 10,626 confirmed breaches, nearly double from previous year* Major breaches highlighted: AT&T (73M records), Ticketmaster (560M users), National Public Data (2.9B records)* The average breach costs $4.88 million, or $165 per stolen record* **Step 1**: Enable two-factor authentication everywhere * 2FA stops 99.9% of automated attacks * Use authentication apps instead of SMS * Save backup codes in a safe place* **Step 2**: Audit your privacy settings * Detailed walkthrough for Facebook, Instagram, Twitter/X, and LinkedIn * Phone settings review for both iOS and Android * Revoking unnecessary app permissions* **Step 3**: Protect your connection and digital footprint * Using a VPN to encrypt connections and mask browsing * Reviewing and cleaning your digital footprint * Opting out of data broker sites * Deleting old, unused accounts* The importance of ongoing privacy maintenance## Tools and Resources Mentioned:* **Authentication Apps:** * [Google Authenticator](https://googleauthenticator.net/) * [Authy](https://authy.com/)* **Recommended VPN Services:** * [NordVPN](https://nordvpn.com/) * [ExpressVPN](https://www.expressvpn.com/) * [Surfshark](https://surfshark.com/)* **Data Broker Removal Services:** * [DeleteMe](https://joindeleteme.com/) * [Privacy Bee](https://privacybee.com/) * [Optery](https://optery.com/)* **Data Broker Sites to Opt Out From:** * [Whitepages](https://www.whitepages.com/) * [PeopleFinder](https://www.peoplefinder.com/) * [Spokeo](https://www.spokeo.com/)
Ep:41 Beware: Your Top VPN App May Be a Chinese Government Spy
Jul 3 2025
Ep:41 Beware: Your Top VPN App May Be a Chinese Government Spy
Episode Summary:In this episode, we explore the alarming discovery that many of the top-rated VPN apps on the App Store and Google Play are secretly owned by Chinese companies. These VPNs pose a serious risk to user privacy and security, as Chinese law requires them to hand over all user data to the government without justification.Key Topics Covered:- Chinese-owned VPN apps masquerading as legitimate services- Lack of transparency and disclosure around company ownership- Risks of user data being accessed by the Chinese government- Failure of app stores to properly vet and regulate these VPN apps- Importance of researching VPN providers before using themMain Takeaways:- Many popular VPN apps are secretly owned by Chinese companies, creating a significant risk to user privacy and security.- App stores like the App Store and Google Play are not properly vetting and regulating these potentially compromised VPN apps.- Users must do their own research to ensure the VPN they are using is trustworthy and not owned by a company with ties to the Chinese government.Timestamps for Major Topics:- 0:00 - Introduction to the issue of Chinese-owned VPN apps- 1:30 - Examples of top-ranked VPN apps with hidden Chinese ownership- 3:00 - Explanation of the legal requirements for Chinese companies to hand over user data- 4:30 - Lack of action by app stores to remove or label these problematic VPN apps- 6:00 - Importance of user research and caution when selecting a VPN provider---I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.----Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep40: The AI Layoff Apocalypse Has Already Started — And You’re Next
May 30 2025
Ep40: The AI Layoff Apocalypse Has Already Started — And You’re Next
The Imminent AI Job Crisis: Are You Prepared?This episode highlights the alarming prediction by Dario Amodei, CEO of Anthropic, that AI could eliminate half of all entry-level white-collar jobs within the next one to five years, potentially raising U.S. unemployment to 20%. While major companies are quietly adopting advanced AI systems, the public and lawmakers remain largely unaware or in disbelief. The episode discusses the impacts of AI on various industries and jobs, stressing the need for urgent action such as an AI 'token tax,' real-time job replacement tracking, legislative briefings, and worker reskilling programs. The message is clear: the AI job crash is imminent, and proactive measures are essential to mitigate its effects.00:00 The Impending Disappearance of White-Collar Jobs00:37 Real-World Examples of AI-Induced Job Cuts01:03 The Rise of AI Agents in the Workplace01:30 The Alarming Capabilities of Advanced AI01:48 Public Response and the Threat to Democracy02:32 Proposed Solutions to the AI Job Crisis02:57 The Urgency of Immediate Action03:06 Conclusion: Preparing for the AI Job Crash---I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.--Sites Mentioned in this EpisodeBehind the Curtain: A white-collar bloodbath--Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep39: AI in the Workplace: Adapt or Be Replaced
May 27 2025
Ep39: AI in the Workplace: Adapt or Be Replaced
Adapt or Replace: How AI is Changing Entry-Level Job MarketsAI has already impacted the job market significantly, particularly affecting entry-level positions. The script highlights that entry-level hiring has decreased due to the integration of AI, which automates routine tasks. Companies are reconsidering traditional roles and opting for more efficient AI solutions. Job seekers are faced with two choices: compete against AI or learn to leverage it to improve productivity. The script emphasizes the importance of mastering AI tools to stay relevant in the workforce and outlines steps to integrate AI proficiency into daily routines and resumes.00:00 AI Isn't Coming for Your Job00:02 The Impact of AI on Entry-Level Jobs00:18 Automation and Workflow Changes00:39 Adapting to the AI Revolution00:46 The Future of Work: Competing with AI01:07 Embracing AI Tools for Success01:15 The Consequences of Ignoring AI01:31 Final Thoughts: Adapt or Be Replaced---I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.----Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep38: Spot Phishing Emails: Stay Safe
May 21 2025
Ep38: Spot Phishing Emails: Stay Safe
# Episode: "Avoiding the Phishing Bait: How to Spot Scam Emails"## Episode SummaryIn this episode of Byte Sized Security, host Marc David breaks down how to identify phishing emails. He provides practical tips to recognize scam attempts and protect your personal information from fraudulent emails.## Key Discussion Points- Introduction to phishing scams and why they're dangerous- Identifying typos and grammar mistakes in suspicious emails- How to verify the sender's email address and domain- The importance of inspecting links before clicking- Why urgency and alarming messages are red flags- How to properly report suspicious emails- The value of regular security software updates## Resources Mentioned- Email security features (spam/phishing reporting tools)- Security software (mentioned to keep updated)- [Amazon.com](https://www.amazon.com) (referenced as an example of legitimate domain)## TakeawayAlways verify email details carefully before taking action, never rush to respond to urgent requests, and maintain vigilance to protect your personal information.---I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.----Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep37: Deepfakes and Digital Deception: The 2025 Threat
May 19 2025
Ep37: Deepfakes and Digital Deception: The 2025 Threat
**Episode Summary:**Marc David dives into the rapidly evolving world of deepfakes and digital deception, projecting forward to 2025. The episode explores the alarming growth in deepfake use, driven by accessible AI technology and user-friendly tools. Mark discusses the severe consequences for businesses (e.g., fraudulent CEO announcements, financial scams like the Polish bank incident), politics (e.g., election manipulation), and personal lives. The discussion also covers emerging solutions, including AI-powered detection tools like those from MIT's DeepTrace Lab, the role of regulations like GDPR, and practical steps listeners can take, such as using verification software like Truepic. The core message is the importance of vigilance and questioning the authenticity of digital content.**Key Discussion Points:*** **The Explosion of Deepfake Use (00:21):** * A 900% increase in deepfake videos was found by Sensity researchers in 2021. * The problem is projected to have quadrupled by 2025.* **Drivers of the Deepfake Surge (00:35):** * Accessible and user-friendly AI technology. * Cheaper software accelerating spread.* **Impact on Businesses (00:48):** * Potential for CEO deepfakes to announce fraudulent mergers or layoffs. * Real-world example: A Polish bank lost millions in 2023 due to a deepfake scam involving an urgent fake call to redirect funds.* **Impact on Politics (01:10):** * Deepfakes manipulating elections (e.g., doctored videos of candidates). * Erosion of voter trust.* **Current Preparedness & Solutions (01:21):** * We are not yet fully equipped, but solutions are evolving. * **Detection Tools (01:25):** AI systems learning to recognize deepfakes by detecting minute digital artifacts. * MIT's DeepTrace Lab: Provides tools analyzing AI generation flaws. * **Policy and Regulations (01:42):** * Europe's GDPR now covers AI-generated media. * The US is considering similar steps.* **What You Can Do (01:52):** * Stay informed. * Report suspicious content. * Support legislative actions against deepfakes. * Use available verification tools.* **Today's Takeaway (02:04):** * Be vigilant. * Question authenticity until trust is verifiable.**Tools & Sites Mentioned:*** **Sensity:** (Research mentioned from 2021 regarding the 900% increase in deepfake videos). Sensity was an AI threat intelligence company, later acquired. The research highlighted the scale of the problem.* **MIT DeepTrace Lab:** A research initiative at MIT focusing on detecting deepfakes and manipulated media. * Website: [https://deeptrace.csail.mit.edu/](https://deeptrace.csail.mit.edu/)* **GDPR (General Data Protection Regulation):** Europe's privacy and data protection law, now addressing AI-generated media. * Official Information: [https://gdpr-info.eu/](https://gdpr-info.eu/)* **Truepic:** A company offering photo and video verification technology. * Website: [https://truepic.com/](https://truepic.com/)------I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.----Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a...
Ep36: DeepSeek AI – The Real Issue Isn't China, It’s AI Security
Feb 3 2025
Ep36: DeepSeek AI – The Real Issue Isn't China, It’s AI Security
AI Security and Competition: Unpacking the Debate Around DeepSeekThis episode delves into the controversy surrounding DeepSeek, a Chinese AI considered by some as a national security threat. It questions whether this stance is legitimate or merely a tactic by big tech to stifle competition. The episode highlights multiple security breaches across the AI industry, including OpenAI and Google, arguing that the core issue lies in how AI handles security rather than its origin. The discussion also explores the suspicious uniformity in the anti-DeepSeek narrative, the potential motivations of big AI corporations to maintain monopolies, and the necessity of reading AI privacy policies. Additionally, the episode critiques the U.S. response to AI competition, drawing parallels to historical moments like the Sputnik era, and advocates for stronger AI security regulations and more open-source innovation. Listeners are encouraged to reflect on whether the fear of DeepSeek is justified or manipulated by big tech interests.00:00 Introduction: The DeepSeek Controversy00:08 Data Leaks: A Global Issue00:39 The Suspicious Narrative Against DeepSeek01:24 Big AI's Fear of Open Source01:35 Smart AI Usage Tips02:29 The Real Issue: AI Governance03:15 The AI Moat Playbook04:08 Big Tech's Control Over AI05:49 The Global AI Competition09:45 Security and Privacy Concerns17:22 Conclusion: The Future of AI---I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.--Sites Mentioned in this EpisodeDeepSeek Privacy Policy - The DeekSeek Privacy Policy--Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep34: They say TikTok is dangerous... but look who's talking
Jan 13 2025
Ep34: They say TikTok is dangerous... but look who's talking
The Real Threat of TikTok: Manipulation by Any OwnerThe video discusses the controversy surrounding TikTok and the calls to ban it due to national security concerns. It questions the hypocrisy of other social media giants like Facebook and Twitter (now X) which have also manipulated users for profit. The script emphasizes that the issue isn't the country that owns TikTok, but rather the potential for manipulation by any corporation. The discussion highlights that banning social media isn't the solution and points out that corporate greed remains the true threat, affecting trust in these platforms.00:00 Introduction: The TikTok Controversy00:16 The Hypocrisy of Social Media Giants00:44 The Real Question: Who Controls TikTok?01:01 Conclusion: The True Threat of Manipulation---I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.--Sites Mentioned in this EpisodeCambridge Analytica - Wikipedia--Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep33: Do you really need to know Python or coding to be a great cybersecurity engineer?
Nov 6 2024
Ep33: Do you really need to know Python or coding to be a great cybersecurity engineer?
Do You Need Coding Skills to Succeed as a Security Engineer?In this episode, we debunk the myth that coding expertise, particularly in Python, is essential for success in cybersecurity engineering. While many claim that coding skills are a gatekeeper in this field, the reality showcases a wide array of roles such as governance, risk and compliance (GRC), security awareness, and SOC analysis, which do not require deep coding knowledge. The ability to write simple, logical instructions can be helpful, especially in application security or cloud engineering roles. However, mastering core cybersecurity skills like threat modeling, vulnerability assessment, and incident response often has a greater impact. Additionally, AI tools are making coding tasks more accessible. We encourage you to focus on the skills that matter most for your desired cybersecurity role and not be deterred by the myth of mandatory coding expertise.00:00 Introduction: Do You Need to Know Python for Cybersecurity?00:06 Debunking the Coding Myth in Cybersecurity00:26 The Role of Coding in Specific Security Roles00:59 Core Skills Beyond Coding01:07 Non-Coding Roles in Cybersecurity01:34 The Impact of AI on Coding in Cybersecurity02:12 Essential Skills for Cybersecurity Professionals02:38 Encouragement for Aspiring Security Engineers---I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.----Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep32: Cybersecruity is more than learning how to code
Oct 30 2024
Ep32: Cybersecruity is more than learning how to code
Dismantling Gatekeeping in Cybersecurity: Embracing Diverse TalentsThe episode discusses the need to move beyond gatekeeping in cybersecurity, which often prioritizes coding skills over diverse talents. It highlights the importance of embracing individuals who have strategic vision, risk management expertise, and effective communication abilities, even if they lack programming experience. The host argues that cybersecurity is a complex, multidisciplinary field that requires diverse teams to solve its challenges. The episode calls on hiring managers and leaders to recognize and nurture a variety of skills within their teams, aiming to dismantle barriers and create more inclusive opportunities in cybersecurity.00:00 The Importance of Diverse Talents in Cybersecurity00:06 The Problem with Gatekeeping Based on Coding Skills00:24 A Story of Overlooked Talent01:11 The Need for Visionaries and Strategists01:38 The Human Aspect of Cybersecurity02:35 The Power of Effective Communication03:40 Encouraging Diverse Skillsets in Hiring04:06 Broadening Skills Beyond Coding04:31 A Message to Aspiring Cybersecurity Professionals05:00 The Future of Cybersecurity05:40 A Call to Action for the Cybersecurity Community---I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.----Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep31: How I turned Claude AI into a career coach and got 3 job offers in 2 weeks
Oct 29 2024
Ep31: How I turned Claude AI into a career coach and got 3 job offers in 2 weeks
Tailoring Your Resume with AI: My Honest Experience with ClaudeWe're diving into the often daunting task of tailoring resumes for specific jobs and how an AI tool, Claude, made this process significantly easier. The presenter shares a detailed, step-by-step account of their experience using Claude to enhance their resume, highlighting the tool's deep analysis, actionable feedback, and authentic improvement suggestions. They discuss the importance of presenting one's true skills and value in a competitive job market while emphasizing that quality and customization in job applications matter more than quantity. The episode wraps up by encouraging viewers to be genuine, strategic, and thoughtful in their job search efforts.00:00 Introduction: The Dreaded Resume Tailoring00:38 Discovering Claude AI: A Game Changer01:22 How Claude AI Works: Step-by-Step Guide02:15 Real-World Application: Matching Job Descriptions03:04 Addressing the Experience Gap with Confidence04:27 The Importance of Authenticity in Job Applications05:20 Final Thoughts and Practical Advice---I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.--Sites Mentioned in this EpisodeClaude - Your Career Coach - My step by step experience using Claude Projects as a Career Coach--Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep29: Hack Your Career: Insider Tips for Cybersecurity Beginners
Aug 29 2024
Ep29: Hack Your Career: Insider Tips for Cybersecurity Beginners
Navigating Cybersecurity: Q&A Session with MarcIn this special episode recorded outdoors, Marc answers listener questions about breaking into the cybersecurity field. Topics include gaining practical experience without an IT background, the importance of certifications, essential soft skills, networking strategies, handling job rejections, and making a career transition into cybersecurity. Marc provides practical advice on how to stand out in interviews, tailor your resume, and continuously improve your chances of landing a cybersecurity job. Resources and contact information are available in the show notes.00:00 Introduction and Format Change00:29 Question 1: Gaining Practical Experience in Cybersecurity03:31 Question 2: Importance of Certifications06:46 Question 3: Crucial Soft Skills09:26 Question 4: Standing Out in Job Interviews12:33 Question 5: Networking in Cybersecurity15:59 Question 6: Handling Rejection and Improving Applications22:35 Conclusion and Final Thoughts---I do hope you enjoyed this episode of the podcast. Here are some helpful resources, including any sites that were mentioned in this episode.--Sites Mentioned in this EpisodeCybersecurity Conferences - Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2024, 2025, and beyond.The Hire Drive Podcast Series - Apple PodcastsZero to Hired: Job Hunting in the AI Age - "Zero to Hired: Job Hunting in the AI Age" demystifies the complex world of job searching and hiring practices, providing job seekers with a comprehensive step-by-step guide to leverage artificial intelligence and modern digital tools to land their dream job. --Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep28: How to Delete Your Data from the Internet
Aug 27 2024
Ep28: How to Delete Your Data from the Internet
Safeguarding Your Identity: Essential Tools and TechniquesThis episode focuses on the increasing dangers of data breaches and the various steps individuals can take to protect their personal information. Highlighting the threats posed by data breaches and data brokers, the discussion provides detailed reviews of free resources such as OperationPrivacy.com and Google’s 'Results About You' feature. These tools help users remove their data from major brokers and search engines. Additionally, the episode covers the importance and process of freezing your credit to prevent identity theft, emphasizing the use of password managers and two-factor authentication (2FA) for enhanced security.00:00 Introduction: The Reality of Data Breaches00:22 Understanding the Risks: How Your Data is Compromised01:29 Adopting a Breach Mentality: Protecting Your Information02:27 Operation Privacy: A Free Tool for Data Removal06:41 Google Results About You: Managing Your Online Presence10:15 Freezing Your Credit: An Essential Step13:34 Conclusion: Taking Control of Your Data Security---I do hope you enjoyed this episode of the podcast. Here are some helpful resources including any sites that were mentioned in this episode.--Sites Mentioned in this EpisodeGoogle Take Controls of Results About YouOperation Privacy--Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep26: Cybersecurity Influencers Need to Do Better
Mar 14 2024
Ep26: Cybersecurity Influencers Need to Do Better
The Responsibility of Cybersecurity Influencers: A Call for IntegrityThis podcast addresses the issue of misinformation in the cybersecurity community, especially among influencers on platforms such as TikTok. The narrator emphasizes the importance of influencers conducting thorough research and providing accurate, evidence-based information rather than spreading myths or fear-mongering. They argue that cybersecurity influencers have an obligation to their audience to be reliable sources of information, citing examples such as unfounded fears about iOS updates and privacy. The podcast critiques the current state of cybersecurity discourse, where ease of content creation has led to an abundance of unverified information, comparing it unfavorably to the medical field where expertise is rigorously vetted. The narrator calls on influencers to improve their practices by doing proper research, citing sources, and understanding the real-world impact of their advice on data protection and security. Lastly, the importance of being discerning about the motives behind the information provided by influencers, including financial incentives, is highlighted as crucial for the audience's ability to trust the content they consume.00:00 The Call for Cybersecurity Influencers to Step Up00:45 The Dangers of Misinformation in Cybersecurity02:09 The Responsibility of Influencers: Research and Truth03:52 The Importance of Credibility and Trust in Cybersecurity Advice05:57 The Role of Influencers in Educating the Public Responsibly09:59 The Obligation of Cybersecurity Influencers to Provide Accurate Information12:46 Final Thoughts: The Impact of Responsible Influence---I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.----Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurity
Ep23: Updated Google Cybersecurity Professional Certificate
Nov 19 2023
Ep23: Updated Google Cybersecurity Professional Certificate
Decoding Google Cybersecurity Certificate ProgramThe speaker discusses the Google Cybersecurity Certificate Program and its benefits for both experienced and new cybersecurity enthusiasts. The speaker discusses how you can get the program for free through libraries that offer Coursera, like the California state public library. No matter if you're already in the field and looking for a refresher course or entirely new to cybersecurity, the speaker finds the program commendable. They add that while it won't guarantee you a job, it does provide a structured learning path and a certificate that you can mention on your resume.Timeline:00:00 Introduction to Google Cybersecurity Certificate Program00:16 Who Should Consider the Program00:51 Benefits of the Program01:12 Comparing with Other Certifications02:32 How to Access the Program for Free03:11 Personal Experience with the Program03:26 Benefits for Existing Certification Holders05:31 Value of the Certificate for Job Seekers07:02 Final Thoughts and Recommendations---I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode.--Sites Mentioned in this EpisodeGoogle Cybersecurity Certificate - The Google Cybersecurity Certificate program on Coursera--Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:Listen to Byte Sized Security --Support this Podcast with a Tip:Support Byte Sized Security --If you have questions for the show, feedback or topics you want covered. Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.Connect with me on TikTok: https://www.tiktok.com/@bytesizedsecurityMentioned in this episode:YouTube Byte-Sized Security Channel