Infosec for All, Shawn Bowman Cyber Security Threats for Small Businesses TOC The AI-Powered Con Artist: Today's #1 Threat to Your Bank Account The Real-World Risks to Your Business Digital Hostage-Taking: Why Ransomware Remains a Nightmare The True Cost of a Ransomware Att...
Infosec for All, Shawn Bowman Is Your AI a Security Risk? TOC Is Your AI Assistant a Security Risk? What in the World Are "AI Hallucinations"? Your 30-Minute Challenge: Become the AI Fact-Checker Discussion Is Your AI Assistant a Security Risk? What in the W... AI Hallucinations Artificial Intelligence Business Security Generative AI
Infosec for All, Shawn Bowman The Unlocked Drawer TOC Introduction The Analog Blind Spot: Securing the Physical World The 30-Minute Challenge: Fortify Your Physical Space Discussion Introduction The Analog Blind Spot: Securing the Physical World The ... analog security clean desk policy document security non-technical security office security physical security visual hacking
Infosec for All, Shawn Bowman The Importance of Backing Up Your Data TOC A Data Disaster That Could Have Been Prevented Why Data Loss Happens Your Backup Safety Net: The 3-2-1 Rule Types of Backups and Best Practices Taking Action: Secure Your Data Today Don’t Wait for... backup backups data recovery
Infosec for All, Shawn Bowman Cryptographic Key Management TOC Cryptographic Key Management: What Can Go Wrong? Why Key Management Matters Common Key Management Pitfalls Real-World Consequences Key Management Best Practices Conclusion Discussion Cryptographic... SMB Cybersecurity compliance data protection encryption infosec key management risk mitigation small business it
Infosec for All, Shawn Bowman Zero Trust in the Real World TOC Why “Trust, but Verify” Doesn’t Cut It Anymore What Is Zero Trust—and Why It Matters Real-World Examples and Steps for Small Businesses Your 30-Minute Zero Trust Kickstart Final Thoughts Discussio... NIST NIST SP 800-207 SMB Cybersecurity Zero Trust for small businesses affordable Zero Trust solutions credentials how to impliment zero trust password smb
Infosec for All, Shawn Bowman Securing Your Home Router TOC Introduction The Hidden Dangers of Default Settings Why Factory Settings Are a Security Nightmare Step‑by‑Step Guide The High Stakes of Doing Nothing Your Router Security Checklist Conclusion Disc... Home Router diy hardware
Infosec for All, Shawn Bowman When 16 Billion Credentials Leak TOC Introduction What Really Happened? Why This Still Matters How to Tell If You’ve Been Affected What You Can Do About It Today The Bigger Lesson Conclusion Works Cited Discussion Introduction In Jun... credentials infostealers leak password
Infosec for All, Shawn Bowman Ransomware-as-a-Service (RaaS) TOC Introduction The RaaS Ecosystem: How the Criminal Business ModelOperates EscalatingThreats: The Evolution and Widespread Impact of RaaS Cryptocurrency: The Financial Engine of Ransomware-as-a-Serv... Cyber Extortion RaaS attacks ransomware
Infosec for All, Shawn Bowman The Silent Backbone of Cyber Defense TOC Introduction The CVE Program: A Pillar of Global Cybersecurity CVEs in Action: Integral to Modern Cybersecurity Strategy A Near Miss: The Current State and Recent Alarms Potential Impacts: From Gl... CVE Defense Global
Infosec for All, Shawn Bowman Selecting the Right Cybersecurity Framework TOC Introduction Why Do Very Small Businesses Need a Cybersecurity Framework? Key Factors for VSBs When Choosing a Cybersecurity Framework Popular Cybersecurity Frameworks Suited for Very Small Busine... framework smb
Infosec for All, Shawn Bowman Staying Vigilant TOC Introduction Understanding Phishing and Vishing Recognizing the Signs Protecting yourself and Your Organization Conclusion Bibliography Discussion Introduction In today’s digital age, cyber threat... attacks email phishing vishing