kindsey@kirkham.it, davin.chitwood@irontechsecurity.com, info@webpossible.net

Videos

Check Out Our Content

Why Your Passwords Suck

Why Your Passwords Suck

Back to videosPassword security is commonly overlooked, if you do not practice using strong and unique passwords, you are left vulnerable to hackers.TOM: Alrighty then. I’m Tom Kirkham. I’m CEO and Founder of IronTech Security, and I do these every Tuesday. What...

Defense in Depth: Your Security Layers

Defense in Depth: Your Security Layers

Back to videosDefense in depth is a concept used in information security in which multiple layers of security controls (defense) are placed throughout an information technology system. Its intent is to provide redundancy in the event a security control fails or a...

How to Create an Ironclad Cybersecurity Posture & Why

How to Create an Ironclad Cybersecurity Posture & Why

Back to videosWhat's an IronClad Cybersecurity Posture? Here's what you can learn: Hacking Today & Tomorrow Who are the Hackers? Common Cybersecurity Myths Information Security vs. Information Technology Cybersecurity Fundamentals The Most Critical Security Layers...

Phishing: Don’t Get Hooked!

Phishing: Don’t Get Hooked!

Back to videosPhishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy source. Malicious actors send out thousands of phishing emails at a time in hopes of...

The Importance of Data Backup

The Importance of Data Backup

Back to videosThe main reason for data backup is to save important files if a system crash or hard drive failure occurs. Losing any amount of data can compromise your personal identity, erase your family pictures, or bankrupt your entire company. TOM: Welcome to the...

How to Stop Ransomware

How to Stop Ransomware

Back to videosIn the first quarter of 2020, the average ransomware demand amount increased to $111,605, up 33% from Q4 of 2019 according to Coveware.TOM: Welcome, everybody. Everyone. That’s my Southern accent, my poor pronunciation and bad grammar coming through. I’m...

You’ve Been Breached – Now What?

You’ve Been Breached – Now What?

Back to videosWhat is your course of action when hit with a data breach? It is critical to be prepared for a data breach at any moment. Are you prepared?TOM: Welcome, everybody. This is Deep Dive #20 for those of you that are keeping score. This is not a competition....

The History of Hacking

The History of Hacking

Back to videosHow did the cyber crime industry become as big as it is today? Watch to learn about the origin of hacking and cyber crime and how the industry got as big as it is today.TOM: First of all, let me introduce myself. My name’s Tom Kirkham. I am the founder...

The Biggest Cybersecurity Mistakes You Don’t Want To Make

The Biggest Cybersecurity Mistakes You Don’t Want To Make

Back to videosOne cybersecurity mistake can leave your organization in ruins... Assuming you're "too small" to be a target or relying on antivirus to protect your organization leaves you vulnerable to cyber criminals.TOM: You guys feel free to use the chat box....