Listen "Is Your Business REALLY Cyber Secure?"
Episode Synopsis
In this episode of Unlocked 403, Becks dives deep into the ever-evolving world of B2B cybersecurity, discussing key strategies businesses need to adopt to protect their networks and data. From the infamous Blue Screen of Death (BSOD) to the intricacies of kernel access and Falcon sensors, this episode unpacks critical topics for IT professionals and decision-makers alike.
Joining Becks is Michal Jankech, VP of SMB, MSP, and Enterprise Segment at ESET, a global leader in cybersecurity solutions. Michal shares his expert insights on how companies of all sizes can fortify their defenses, adapt to emerging threats, and leverage cutting-edge technologies to stay ahead of the curve.
Follow Michal Jankech:
LinkedIn
Topics:
(00:00) - Intro
(00:53) - How did you get into cybersecurity?
(03:10) - Difference between B2C & B2B in cybersecurity
(04:45) - Biggest cybersecurity challenges for businesses
(07:14) - Human factor
(09:40) - Awareness VS Solution
(11:45) - Crowdstrike incident
(13:51) - Was it a security incident?
(15:15) - Crowdstrike and Microsoft
(18:06) - Consequences of the Kernel access limitations
(19:33) - Is built-in security enough?
(21:44) - Business-security tips
(24:47) - Train your users!
(25:14) - What about prevention?
(27:08) - Useful resources to stay updated
(29:04) - TOP 3 tips to stay safe online
(30:45) - Outro
Connect With Us:
X | Instagram | TikTok | Facebook | LinkedIn | Youtube
Our Main Site | WeLiveSecurity | Corporate Blog
Joining Becks is Michal Jankech, VP of SMB, MSP, and Enterprise Segment at ESET, a global leader in cybersecurity solutions. Michal shares his expert insights on how companies of all sizes can fortify their defenses, adapt to emerging threats, and leverage cutting-edge technologies to stay ahead of the curve.
Follow Michal Jankech:
Topics:
(00:00) - Intro
(00:53) - How did you get into cybersecurity?
(03:10) - Difference between B2C & B2B in cybersecurity
(04:45) - Biggest cybersecurity challenges for businesses
(07:14) - Human factor
(09:40) - Awareness VS Solution
(11:45) - Crowdstrike incident
(13:51) - Was it a security incident?
(15:15) - Crowdstrike and Microsoft
(18:06) - Consequences of the Kernel access limitations
(19:33) - Is built-in security enough?
(21:44) - Business-security tips
(24:47) - Train your users!
(25:14) - What about prevention?
(27:08) - Useful resources to stay updated
(29:04) - TOP 3 tips to stay safe online
(30:45) - Outro
Connect With Us:
X | Instagram | TikTok | Facebook | LinkedIn | Youtube
Our Main Site | WeLiveSecurity | Corporate Blog
More episodes of the podcast Unlocked 403 | Cybersecurity Podcast
How Social Engineering Really Works
15/10/2025
Is Your Phone Spying on You?
31/07/2025
Why Is Your Data Worth So Much?
30/06/2025
How to get into Cybersecurity
03/06/2025
Can We Counter Online Disinformation?
30/04/2025
AI's Biggest Surprises and Trends
28/02/2025
What is Penetration Testing?
31/01/2025
Unwrapping Christmas Scams
13/12/2024
How to keep children safe online?
30/09/2024
Influencing the influencers
28/08/2024
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.