Cybersecurity for SMBs: Protecting the Backbone of America

In this engaging `cybersecurity podcast`, we hear from `cybersecurity expert` Chase Cunningham as he introduces guests Maggie Dillon and Albert Whale, focusing on individuals who actively contribute to their field. This discussion provides valuable insights for `cybersecurity for entrepreneurs`, emphasizing `business protection` through proactive strategies. The conversation highlights the importance of a strong `founder mindset` […]
Cyber Chomps Episode #5 – Albert E. Whale, Maggie Dillon, and Alan Elliott, #Hacked2

Cyber Chomps Episode #5 Albert E. Whale, Maggie Dillon, and Alan Elliott, #Hacked2 Thank you and shout out to Joshua Bruyning for having us on the 5th episode of his podcast Cyber Chomps! Check out the latest from our #Hacked team, including Albert E. Whale, CEH CHS CISA CISSP BSEE CMMC-RP and Alan Elliott! Protecting your Data (both business and personal) […]
Medallion XLN Podcast Ep. 8

Cybersecurity is a field in computer science that is overlooked until it is too late. Albert E. Whale is an expert in the field of Cybersecurity and in Episode 8 of the Medallion XLN podcast we talk about his book #Hacked as well as his crowdfunding effort for ITS-SAFE as well as expert takes on how to […]
SWAT Assessment for Cybersecurity

SWAT Assessment for Cybersecurity by Albert E. Whale, CEH CHS CISA CISSPFounder & CEO Attacks are running full speed ahead Everyday new attacks are reported in organizations of various sizes. Some of the attacks are recent, most are attacks that occurred months earlier, and are just recently being discovered. What makes these events so difficult […]
Its time for a Paradigm Shift for cybersecurity
ITS Safe™ Security Appliance Seeing the Unseen A shift in the security paradigm needs to address the Unseen attacks in the environment. Detecting the Unseen activities in the environment explains why there are so many attacks being reported on a daily basis. The unseen attacks depend on the ability of the attackers to hide in […]
Can you TRUST your vendors?
The FireEye and Solarwinds breach. I was drinking my coffee this morning and I read that FireEye was Breached. What? I read that a second time. This time I also found out that their testing tools were also stolen. This is bad, I thought, because FireEye is used in many industries, but to suffer […]
What is ITS Safe (TM) and why you should be considering it for your business.
Cyber Security conversation with Brad Stoller and Albert Whale Many organizations are overwhelmed with today’s efforts to secure the organization. Whether they are a small to mid-sized business, or a global organization. Today in the US we are short more than 3.5 Million experienced Cyber Security professionals. If we think of a Computer Virus as […]
A positive change, with Albert Whale and Jim Loeffler – Episode 8

[vc_row][vc_column][vc_column_text] This is the second episode for 2019, and what we are focusing on today is focusing on the positive effects for your business. Are you the Weakest link? How do the attackers are get past your Firewall and Virus Scanners. Here are two reasons: • Hackers have the same tools. • They know […]
Equifax Breach reported to be preventable – Episode 6
This could also be titled, making your Cyber Security program into a profit center. Recorded on 12/17/2018. Today we are reviewing the news about the recent Equifax breach. The GAO and congressional hearing seem to indicate that there were three major misses in the implementation of cybersecurity, and if they were implemented correctly, would have […]
Reducing Financial Risk for Business owners – Episode 5
Today’s episode focuses on the financial risks which business owners focus on in their business. We are talking to Tom Virostek about Fudiciary Responsibility to handle the assets that his company handles for their clients. Tom is having a Webinar with the Iron City Risk Avengers in January. Please contact us, Albert.Whale@IT-Security-Solutions.com or tom@q3capital.net. https://traffic.libsyn.com/ironcityriskavengers/Financial_Risk_Mitigation.m4a The mission of […]