- 17
- 59 947
Legends of IT
United States
Приєднався 1 чер 2020
Being an IT leader is not easy.
Between system issues, external support issues, people issues... it's fair to say you've got your work cut out for you.
We know. We're IT Leaders too.
During our 20+ years working with IT Leaders, we've developed the systems, tools and strategies to help them go from tired, overwhelmed and poorly resourced workaholics, into high-performing, happy, and skilled LEGENDS for their respective businesses.
This channel, was created to provide support, tools and guidance for the unspoken heroes of companies (yes, you the IT LEGEND) to EXCEL each day, and make your work life EASIER.
We release new videos each week, so be sure to 👉 SUBSCRIBE 👈, and turn your Notifications ON, so you never miss a video.
Found something super-helpful in our videos?
☑️ Leave us any feedback in the COMMENTS!
☑️ Please SHARE it with a friend or colleague who could also benefit.
☑️ JOIN the Legends of I.T. Community on Facebook HERE - groups/legendsofit
Between system issues, external support issues, people issues... it's fair to say you've got your work cut out for you.
We know. We're IT Leaders too.
During our 20+ years working with IT Leaders, we've developed the systems, tools and strategies to help them go from tired, overwhelmed and poorly resourced workaholics, into high-performing, happy, and skilled LEGENDS for their respective businesses.
This channel, was created to provide support, tools and guidance for the unspoken heroes of companies (yes, you the IT LEGEND) to EXCEL each day, and make your work life EASIER.
We release new videos each week, so be sure to 👉 SUBSCRIBE 👈, and turn your Notifications ON, so you never miss a video.
Found something super-helpful in our videos?
☑️ Leave us any feedback in the COMMENTS!
☑️ Please SHARE it with a friend or colleague who could also benefit.
☑️ JOIN the Legends of I.T. Community on Facebook HERE - groups/legendsofit
Don't Post Pictures of Your Keys Online!
KeyDecoder is an app available on the Google Play Store.
Using this app, you can take a picture of a key and measure its dimensions.
You can then take those dimensions to a locksmith and have the key RECREATED!
The app is meant for penetration testing and security enthusiasts...
But it can be illegally used by cybercriminals to recreate the key to your house or apartment!
In the video, I demo exactly how this works.
Please note: This app should NEVER be used on a key that you don't own or have not been given the authorization to duplicate.
Using this app, you can take a picture of a key and measure its dimensions.
You can then take those dimensions to a locksmith and have the key RECREATED!
The app is meant for penetration testing and security enthusiasts...
But it can be illegally used by cybercriminals to recreate the key to your house or apartment!
In the video, I demo exactly how this works.
Please note: This app should NEVER be used on a key that you don't own or have not been given the authorization to duplicate.
Переглядів: 94
Відео
Why Your Business Needs a Cybersecurity Framework
Переглядів 77Рік тому
Season 1 - Episode 7 When it comes to cybersecurity, it's simply not enough to install a bunch of tools to protect you and your business. Simply installing a bunch of these security tools without putting a cybersecurity plan in place can have a lot of negative impacts; missing critical gaps that exist in your IT infrastructure, overspending on IT tools and services, and ultimately data breaches...
The Best Way to Secure Your Business's Data
Переглядів 93Рік тому
Season 1 - Episode 5 - Part 2 Most businesses believe that cybersecurity comes down to installing a bunch of tools that help protect their computer networks and data from cybercriminals. The fact is, cybersecurity comes secondary to information security or infosec. In Part 2 of this episode, Greg Scasny, CTO of Blueshift Cyber talks about the importance of having a cybersecurity framework imple...
Stopping Cyber Attacks with Two Uncommon Methods
Переглядів 185Рік тому
Season 1 - Episode 5 - Part 1 Greg Scasny is the Chief Technology Officer of Blueshift Cyber. Blueshift Cyber is a managed SOC (security operations center) company that watches business networks 24/7/365 to monitor for cyber-attacks. Greg shares with us two rarely discussed ways to protect your business from the threat of cyber-attacks while also touching on a common misconception that many bus...
The HIPAA Police
Переглядів 91Рік тому
Season 1 - Episode 4 Brandis Kelly, President of the Technology Specialist based in Wichita, Kansas, joins me to talk about Healthcare and HIPAA Compliance. Brandis shares with us a scary threat facing medical practices today that goes beyond cybersecurity. 0:00 Cold Open 2:39 Introduction 2:54 Who Is Brandis Kelly? 4:59 Ignoring Cybersecurity 7:16 Ignoring HIPAA Compliance 10:32 Qui Tam 14:42 ...
The Best Home Security Device Money Can Buy
Переглядів 54 тис.2 роки тому
Season 1 - Episode 3 According to statistics from 2019, the average IoT device gets attacked just 5 minutes after connecting to the internet. More importantly, 98% of all IoT device traffic is unencrypted. This includes thermostats, smart speakers, smart TVs, industrial controller units, medical devices used in surgery... In this week's episode, I go solo and review what I believe to be the mos...
IT People Are Not Cybersecurity People
Переглядів 2922 роки тому
IT People Are Not Cybersecurity People
TLDW: Just a drawn-out Infomercial.
You can select your vpn location in from many services...including opera vpn for free
I connected my purple as the DHCP server and my router/modem in bridge mode. In the first 24 hours alone through geofence etc. it blocked 1000s of flows from mainland china and Russia. Using the build in VPN additionally on my phones and pc’s adds the additional anonymous benefits. Next thing I gotta do is separate all IOT devices into a group. additionally using the Beta user function to build user groups that one can with one click mange very easily. Once all that is done it will be a very rebut system I would recommend to anyone.
Cool
For that price, you could just get a ubiquity router. You lost me at wifi.
In your review, you said the family protect feature is not that advanced. Could you give example(s) of other products with parental control options that are advanced? Having issue with VPNs and proxies being used to circumvent current parental controls. I've been using Circle, but while Circle has some protection for this, they have not been keeping site list sufficiently up to date and you are not able create your own list of IP addresses to block. I was hoping Firewalla would be better solution for this.
a promitive device with a firewall for 320+ bucks. Is it really the "best"?
I’ve had my Gold Plus for about a week now. Very happy with its performance so far. There’s nothing in its class, or price range, that offers a similar feature set, such as 2.5Gb interfaces. The nearest I saw were the Check Point 6200 & 6400 boxes, which are $18K, and $23K specifically. The only annoyance during setup was I used my iPad to do it, which only uses WiFi, and the setup required an initial Bluetooth connection to the firewall. Because my network wasn’t configured yet, my wireless wasn’t working, so it couldn’t authorise the app. After no luck tethering it to my iPhone for some reason, I think it eventually timed out, and allowed the initial configuration to complete. Something to aware of for new users.
This is helpful. Thanks.
My router offers all that security and I only paid about $150. I don’t see the benefit of spending the extra money.
I will try one on your recommendation! Which access point to you recommend? Thank you!!!
I don't know why people are foaming at the mouth over this thing. There are hundreds of products that do a much better job. What makes Firewalla so damn popular? I don't understand... Is it simply just good marketing? Do they pay you guys to push their toy this hard?
Pretty cool idea but the port speed would kill my 8 Gig fiber connection.
virgin media in UK does not allow port forwarding. so that means I cannot use it as vpn server
What are the alternatives to this as that price and being US only (if I’m correct) aren’t appealing to a U.K. based user?
this reads like an ad / sponsored video. the problem is you don't provide the caveats to the things that you say the device can do and leads people to believe this is a 100% solution. none of the dns blocking will work for those using dns over https
Is there a web interface?
Just got my Firewall purple to keep a techie stalker away from my life streams w ddosing, and away from our home by somehow bypassing express VPN and getting my actual IP. (Yea, I’m sure not streaming might help. Except this guy has been into me LONG before I was streaming. I first blocked him on my flop phone) Stalking 10 years. No more.
Did it work?
google "firewalla vulnerabilities" Yikes! Not interested in something like this as my edge router/firewall
I am not sure I like Firewalla, reading a lot of complaints in their blogs that they have many CVE's on their hardware but aren't patching it. Wonder where their devices are flashed/built as well (do they have everything manufactured/flashed in China like Cisco and Juniper do?)
Of for gods sake, stop with the scare sell. You sound like an insurance salesman. Honestly way over the top. Gave up long before you told me anything about the product
Great review... time to review the Gold 🤓
Good video, but you mentioned there are not robust parental controls that other devices offer. This is the boat I’m in. What are these caveats and limitations???
Dude's just another paid bad actor. ONE of the worst infomercials I've seen yet. Firewalla Gold Plus is the best Firewalla has to offer- not this. What a clown...Legends of IT?🤣
First and last video. Your format is very odd… I’ll have to find another demo for this device.
Love it! 😂
I’m about to change my “old” AmplifiHD mesh router and I wanted to try this router. But the price for Europe is outrageous! Until the price will drop at decent level probably I will choose another Amplifi product. It’s a little expensive but at least I can buy it with a credit card.
Great podcast. Leia is in my neck of the woods. I loved the information she shared.
Thanks Greg! Leia really knows her stuff! I'm happy to discuss cyber compliance and documentation with her any time!
I know ignorance is bliss and all. But seriously. It doesn't take long to learn a bit about basic setup and install for PF sense and you might just learn enough to. The thing about custom router software... you have complete control over the device, firmware, packages that do so much more than 1 limited device and... can handle any connection speed you could possibly want. Expansion is the goal and it's expansion without added security risk if configure right. understand...you aren't secure with any all in one device and should have the ability to add or modify things on a deeper level to suite the hole you travel down. You can go to far, understand NO device is secure against a direct attack if it's a hands on threat actor. But... you can create way more restrictions for a threat to trip up. Watch any top UA-cam that talks wifi hacks/pen testing/networking in general. You'll probably shit the bed and then find it fascinating enough to make a hobby out of it if your like me.
Instant subscribe, love seeing new techno wizards coming into the UA-cam space. As a long time support person who's recently moved into network administration I love this device and the niche it fills. There's so many products out there and none bring this feature set coupled with the ease of use. Sure we can configure PFSense to do anything we want, but it's difficult to setup due to its configuration options. This device really brings the simplicity that I can actually recommend this to friends who know I'm a phonecall away to explain something, but don't have to spend hours trying to figure out configs.
I found out about Google's data sharing with the CCP's state owned television company through the logs on my Firewalla.
Great point, Ross. There are solutions to this issue. Also great remediation recommendations. Another thought is to move up to SSO via SAML.
Excellent short Ross! Vulnerability Assessments are critical for businesses today. If I not mistaken, you offer your clients a vulnerability assessment platform that has incredible reporting for the customer to use to clearly defined the risk and the remediation steps. Is that right, Ross?😊
What irons you got in the background?
Just another thinly disguised informercial with a bunch of anonymous "experts" singing its praises in the comments section.
Great analogy, Ross!
I think I should just get a raspberry pie
If there's ever a place I could be that I'm not gonna get in trouble, it's gonna be at FTX. - Kevin O'Leary.
Dude no wonder you have only 277 subscribers, you have literally NO IDEA what you are talking about. Try to learn first before pushing out a video like this. Shameful to IT community.
This may be a silly question as I'm new to this whole thing. If I connect this directly to my cable internet modem and then connect my ethernet switch to that and then connect my wifi router to my switch as well as all my ethernet wires and outlets to my switch as well. Will my wifi security cameras and all my home automation devices have difficulty connecting to my wifi router??
I believe you would need to put your wireless router into Access Point (AP) mode, that can be done from the admin settings page on the wireless router.
Great job gents! My MSSP is a large client of Blueshift Cyber and we highly recommend it to all our MSP clients to encourage their customers to begin with it NOW. The core of the situation is, when a compromise or concern of a compromise takes place, the amount of centralized, organized, deduplicated and analyzed data in place for the timeline before and during the compromise often exponentially decreases the time to remediation. This reduction in time to remediation is real dollars in cost avoidance. We've more regularly seen cases where, "if you can't prove it didn't happen, you must assume it did and at the worst possible scenario and pay the associated fines." Organizations don't consider the fact they frequently can't defend the storyline of the attack and they are therefore paying out 4x to 8x in fines,fees and remediation costs. If they just had a SOAR platform, properly configured with tight integration between their other security stack products, they would have just an inconvenient experience vs. a very, very bad day.
Here is the link to this episode: ua-cam.com/video/mpVkDlj-Uxs/v-deo.html
now I'm interested
This video felt like a very long infomercial
good job
I am the 100th subscriber. LOL
Opnsense and call it a day, this thing is going to start charging monthly fees, theres a lot of info to help protect our kids on reddit alm of this is free
I've been using Firewalla's products for over 2 years now. No monthly fees. I agree that people could implement something on their own that 'could' do some of what this does, but that requires knowledge and time. There are certainly pros and cons for the Firewalla, but I don't see cost as a con here and I am very anti-subscription. It would take a lot of effort to implement and manage capabilities like those Firewalla has developed. How much is your time worth? And there is a team behind it that are constantly pushing out updates at no additional cost. When you also consider the fact that similar hardware for the DIY approach can cost in the range of $150-$350, the realized savings diminishes significantly while the potential for incorrectly implementing it is higher.
Great job! As an MSSP that provides our clients Blueshift, I can say that in our evaluations of a multitude of SOAR/SIEM platforms before choosing Blueshift, we noticed a considerably shorter well time with Blueshift than any of the other platforms we tested. We now provide it at scale. Great job Ross and Greg!
Thank you Jason!
Is this better that pfsence?
Different. I use both of them.
It's clear that you live alone sir.
Oh how WRONG you are. 😂