{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/686295fb9951fac41bf56a27/6876c718610560d3efab763a?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"Brian Honan, cybersecurity expert and founder of BH Consulting","description":"<p>There’s so much to talk to when it comes to cybersecurity that we could only fit a fraction of our discussion with internationally recognised expert Brian Honan into our main episode. Lucky for you bonus listeners, we have the entire episode here for you to listen, learn and rethink your cyber-hygiene.</p><p><br></p><p>This one is also packed with insights for business leaders and decision-makers when it comes to cybersecurity, because as you will have heard in our main episode, Brian is not into victim-blaming when it comes to cybercrime. He can see a future where we aren’t beset with a preponderance of passwords, authenticators and multi-factor login tools – but this will require vendors making better-designed secure systems.</p><p><br></p><p>Find out from Brian how car safety provides a better model for cybersecurity, why paying ransoms makes this problem much worse, how scams have evolved while also staying much the same since the days of writing letters, what impact AI will have on our online safety and much more in this extended interview.</p><p><br></p><p>You can of course listen to the whole interview start to finish, but if you want to skip to the bits that weren’t in the main episode, here are the timestamps:</p><p>— There’s a deeper discussion about the challenges users face when it comes to cyber hygiene and the need for better security standards for products from about 13:21.</p><p>— Then from about 34:34, we continue our discussion around the need to bring more diverse talent into cybersecurity.</p><p>— Then, from about 40:35 onwards, we spoke in more detail about wider cybersecurity trends, including scams, artificial intelligence, encryption and backdoors, issues with personal apps on business devices and more top cyber hygiene tips from Brian.</p><p><br></p><p>Check out Brian’s cybersecurity company,&nbsp;<a href=\"https://bhconsulting.ie/\" rel=\"noopener noreferrer\" target=\"_blank\">BH Consulting</a>, and follow the man himself on Twitter&nbsp;<a href=\"https://twitter.com/BrianHonan\" rel=\"noopener noreferrer\" target=\"_blank\">@BrianHonan</a>. And keep up to date with the top stories in&nbsp;<a href=\"https://www.siliconrepublic.com/topics/cybersecurity/\" rel=\"noopener noreferrer\" target=\"_blank\">cybersecurity</a>&nbsp;on&nbsp;<a href=\"http://siliconrepublic.com/\" rel=\"noopener noreferrer\" target=\"_blank\">SiliconRepublic.com</a>.</p><p>— BH Consulting have published some advice on what to do if you suspect your phone has been hacked:&nbsp;<a href=\"https://bhconsulting.ie/what-to-do-if-you-suspect-your-personal-mobile-has-been-hacked/\" rel=\"noopener noreferrer\" target=\"_blank\">https://bhconsulting.ie/what-to-do-if-you-suspect-your-personal-mobile-has-been-hacked/</a></p><p>— Brian previously spoke to Silicon Republic about Ireland’s preparedness for cyberattacks:&nbsp;<a href=\"https://www.siliconrepublic.com/enterprise/ireland-cybersecurity-cyberattacks-resilience-prepared-brian-honan\" rel=\"noopener noreferrer\" target=\"_blank\">https://www.siliconrepublic.com/enterprise/ireland-cybersecurity-cyberattacks-resilience-prepared-brian-honan</a></p><p>— You can read all about the case of the San Bernardino shooter’s iPhone here:&nbsp;<a href=\"https://www.theverge.com/2021/4/14/22383957/fbi-san-bernadino-iphone-hack-shooting-investigation\" rel=\"noopener noreferrer\" target=\"_blank\">https://www.theverge.com/2021/4/14/22383957/fbi-san-bernadino-iphone-hack-shooting-investigation</a></p><p>— And learn more about tech-facilitated abuse from our episode on the subject:&nbsp;<a href=\"https://pod.fo/e/1856ea\" rel=\"noopener noreferrer\" target=\"_blank\">https://pod.fo/e/1856ea</a></p><p><br></p><p>You can find us @fortechssakepod on your platform of choice or let us know what you think via&nbsp;<a href=\"mailto:fortechssakepod@gmail.com\" rel=\"noopener noreferrer\" target=\"_blank\">fortechssakepod@gmail.com</a>.</p>","author_name":"Elaine Burke & Kelly Earley"}