![Cyber Security Happy Hour Podcast](https://pbcdn1.podbean.com/imglogo/image-logo/8081498/photo2.jpg)
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https://intexit.co.uk/podcast Instagram Instagram.com/cybersechappy
Episodes
![Episode 3 Recovering from Phishing Attack](https://pbcdn1.podbean.com/imglogo/image-logo/8081498/photo2_300x300.jpg)
Tuesday May 26, 2020
Episode 3 Recovering from Phishing Attack
Tuesday May 26, 2020
Tuesday May 26, 2020
Welcome to Episode 3 of the Cyber Security Happy Hour.
I will talking about Phishing attacks, how to recognise what an attack looks like.
Furthermore, how to protect your confidential information and recover from a Phishing attack.
I would like to to hear your comments.
You can also follow us on instagram @cybersechappy.
On Facebook Cyber Security Happy Hour Podcast.
![Episode 2 IOT Device Security](https://pbcdn1.podbean.com/imglogo/image-logo/8081498/photo2_300x300.jpg)
Tuesday May 12, 2020
Episode 2 IOT Device Security
Tuesday May 12, 2020
Tuesday May 12, 2020
In the second episode, I will the talking about IOT, the advantages and disadvantages.
How to secure your IOT devices either in the home or workplace.
Please follow me on twitter: Christiexto
You can listen on https://intexit.co.uk/podcast/
I will love to hear your comments and topics suggestions.
![Episode 1 Secure Password](https://pbcdn1.podbean.com/imglogo/image-logo/8081498/photo2_300x300.jpg)
Thursday May 07, 2020
Episode 1 Secure Password
Thursday May 07, 2020
Thursday May 07, 2020
In this episode I will giving insights on secure passwords.
The different types of authentication methods and how to create secure passwords. How Cyber criminals capture and reuse passwords