![]() |
One Step Beyond CyberAuthor: One Step
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way.As technology advances, it can be challenging to keep up with the latest trends and developments. Dont worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as well as provide tips for simplifying tech. Whether you're a business owner, IT professional, or someone interested in navigating the cyber world this podcast is for you. We understand the challenges of managing technology, and we're here to help. Sit back, relax, and join us as we dive in, providing you with the knowledge and tools you need to succeed in this rapidly evolving field. Subscribe now and become a part of the One Step community! Language: en-us Contact email: Get it Feed URL: Get it iTunes ID: Get it |
Listen Now...
S3 EP 03 Retail Under Attack: Lessons from the Largest Data Breach in History
Episode 3
Thursday, 22 May, 2025
One Step Secure IT provides a range of specialized services including Cybersecurity, Managed/Co-Managed IT, Information Security, and Compliance, that enable businesses across the country to leverage technology as a competitive advantage and prioritize business growth. Contact us today: https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form Episode Chapters: 00:00 Episode outline 00:26 Welcome Episode00:50 Unpacking Hot Topic Cyber breach. What happened with this breach. What do we know about the breach so far? 04:27 This breach exposed highly sensitive data, including partial credit card details and loyalty points, which hackers could exploit for identity theft, financial fraud, and account takeovers. How these types of stolen data specifically pose risks—not just for customers, but also for retailers? 06:02 Hot Topic, Torrid, and Box Lunch are all larger businesses, but we tend to speak to more of the SMB entrepreneur is something like this still relevant to those size businesses? 08:49 How to minimize the risk (compliance and policies), the impact (incident response plan), and the reputational damage? 16:36 What exactly does double extortion entail, and should businesses be concerned about even more risks in these types of attacks? 21:58 Final Thoughts and Closing Podcast Video One Step Secure IT - YouTubeLearn about our services https://www.onestepsecureit.com/Host by: Scott Kreisberg - CEO & Founder of One Step Produced by Genesis Aquino Music Production by Michael Stevens----LinkedIn: https://www.linkedin.com/company/onestepsecureit/mycompany/Facebook:https://www.facebook.com/OneStepSecureITTwitter:https://twitter.com/onestepsecureit