< Back

Podcast: Cyber Sound Bytes

{
    "uuid": "3631f41e-a2ab-46fe-9720-b19da1454235",
    "slug": "cyber_sound_bytes",
    "name": "Cyber Sound Bytes",
    "description": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>",
    "external_links": null,
    "storage_url_prefix": null,
    "feed_type": {
        "id": 6,
        "label": "Generic Rss",
        "format": "rss",
        "extension": "rss",
        "enabled": true
    },
    "update_type": 0,
    "has_changes": 0,
    "auto_sync_items_by_tags": 1,
    "sync_to_website": 1,
    "import_url": null,
    "status": 0,
    "ordering": 1,
    "created_at": "2023-02-24T12:09:59.000000Z",
    "updated_at": "2024-04-29T15:59:44.000000Z",
    "deleted_at": null,
    "feed_artwork_uuid": "b64860fd-cfe8-4206-97f8-e977585de1c9",
    "feed_artwork_thumbnail_url": "https:\/\/assets.sharp-stream.com\/content\/ssvc\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
    "feed_xml_file_url": "https:\/\/feeds.sharp-stream.com\/content\/bfbs_podcasts\/feed-files\/cyber_sound_bytes.rss",
    "feed_pls_file_url": "https:\/\/feeds.sharp-stream.com\/content\/bfbs_podcasts\/feed-files\/cyber_sound_bytes.pls",
    "default_image_url": null,
    "artwork": {
        "uuid": "b64860fd-cfe8-4206-97f8-e977585de1c9",
        "name": "1677240404-cyber-soundbytes-2.png",
        "file_size": 596305,
        "thumbnail_generated": 1,
        "original_name": "cyber-soundbytes-2.png",
        "created_at": "2023-02-24T12:06:44.000000Z",
        "updated_at": "2023-02-24T12:06:44.000000Z",
        "path": "https:\/\/assets.sharp-stream.com\/content\/ssvc\/artwork\/1677240404-cyber-soundbytes-2.png",
        "thumbnail_path": "https:\/\/assets.sharp-stream.com\/content\/ssvc\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png"
    },
    "premium": [],
    "banner_artwork": null,
    "tags": [
        {
            "uuid": "d5613a5a-a8bb-4ba5-82ff-a0c24768c116",
            "name": "cybersoundbytes",
            "customer_id": 4,
            "admin_only": false,
            "created_at": "2023-02-24T12:09:59.000000Z"
        }
    ],
    "items": [
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1714401420-the_importance_of_cyber_security_training.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=46a0fd2f-cdb7-4fd0-9302-ad6a7e62dd70&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2024-04-02T14:36:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "The Importance of Cyber Security Training",
            "content": "<p><span style=\"color: rgb(0, 0, 0);\">Join us as we chat with the Training and Development Lead for Governance, Risk &amp; Compliance in Defence Digital about all things Cyber Training related.<\/span><\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1714401367-challenge_me_2024.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=42c9f83e-f070-47bc-a12b-303c7e6e93f2&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2024-02-26T15:35:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Challenge Me 2024",
            "content": "<p>Join our very own James Wood has he gives us an insight into this years Challenge Me campaign. He\u2019ll explain what it is and why we do it, keep your eyes peeled as we may be visiting your site in March 2024.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1714401305-secure_by_design_with_john_cook.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=63109020-89fd-4778-8f2e-e5b585bcf441&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2024-02-09T15:34:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Secure by Design with John Cook",
            "content": "<p>John Cook is the Head of Defence\u2019s Cyber Security Assessment and Advisory Services. Listen as he talks us through what Secure by Design is and how it is<\/p><p>being implemented.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1714401252-unauthorised_usbs_and_other_security_risks.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=7b4e8855-9454-4515-a3eb-30e1a762edf9&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2024-02-06T15:33:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Unauthorised USBs and other security risks",
            "content": "<p><span style=\"color: rgb(0, 0, 0);\">Mike Antcliffe, who is a Cyber Security Specialist, talks about all things security and how you can keep on top of your own personal online security.<\/span><\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1705594963-mfa_multi_factor_authentication.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=0c704267-da13-458b-8e2f-4dce4715e390&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2024-01-17T16:22:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "MFA (Multi-Factor Authentication)",
            "content": "<p>This podcast talks through all things MFA, why it is important and why we want to use it.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1705594913-data_protection.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=81a39a14-6520-42a4-b970-086c20689a81&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2023-12-13T16:21:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Data Protection",
            "content": "<p>The importance of protecting defence data in the digital world including tips on how to protect your personal data with our guest Ian Henderson.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1699609840-are_smart_devices_dangerous.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=f1e3150b-d4d4-4419-9435-905288e53e13&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2023-10-31T09:50:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Are smart devices dangerous?",
            "content": "<p>October is Cyber Awareness Month, and we at Cyber Confident have been focusing 'On the Horizon'.<\/p><p>In this podcast, host Ben Cook caught up with Will from the UK National Authority for Counter Eavesdropping (NACE) to discuss all things IoT (Internet of Things).<\/p><p>How do hackers infiltrate our personal devices? Is Alexa really always listening? Tune in to find out more!<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1695743447-securing_our_supply_chain.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=5a366734-6e93-4924-bd6b-b2af83b7f686&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2023-08-31T15:50:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Securing Our Supply Chain",
            "content": "<p>Whilst you may not personally interact with it on a daily basis, almost every business out there has some form of supply chain that they utilise. This could be for catering, cleaning, equipment, consultancy, or any other internal or external supplier. This opens up businesses to different security risks that need mitigating.<\/p><p>In this episode, host Ben Cook talk to Sally, the leader of the supply chain risk team within Defence Equipment and Support (DE&amp;S) Digital.<\/p><p>DE&amp;S procure equipment and services for the UK armed forces, giving Sally first-hand experience of the risks within the supply chain, and what we can do to secure it.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1686816532-diversifying_cyber.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=199b0758-d254-4e28-b871-a703a97b21bd&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2023-06-15T08:08:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Diversifying Cyber",
            "content": "<p>Cyber is becoming a more diverse field every day, with perceptions being changed as more knowledge becomes available, and more people start to talk about diversifying the industry. People like this month\u2019s guest, Lisa Ventura.<\/p><p>Lisa is the founder of Cyber Security Unity, and a clear advocate around a variety of issues within cyber, including mental health, imposter syndrome, equality, and diversity. In this episode, she speaks to our host Ben Cook, about her experiences within the cyber field as a neurodivergent person and how we can look to make the field a more diverse, appealing, and unified place for all by combatting some of these issues.<\/p><p>For more information following the podcast, check out the Cyber Security Unity website below.<\/p><p><a href=\"https:\/\/csu.org.uk\/\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>https:\/\/csu.org.uk\/<\/strong><\/a><\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1686322673-front_liners_through_the_eyes_of_a_champion.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=1943abac-804b-4af1-8854-38f2cdbdbbe7&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2023-06-06T09:00:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Front Liners: through the eyes of a champion",
            "content": "<p><span style=\"color: rgb(29, 29, 31);\">This June sees the return of Front Liners, Cyber Confident's annual gameshow. But what does that actually mean, and what happened in the 2022 edition?<\/span><\/p><p><span style=\"color: rgb(29, 29, 31);\">In this episode host Ben Cook invites the winner of Front Liners 2022, Capt Elaine Gibbs of the British Army, to share her perspective on all things Front Liners. Why did she enter last year? What was her favourite part of the experience? And why should YOU participate this year? Hear all about it from the champion herself by listening in...<\/span><\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1686322430-victoria_to_algeria_the_story_of_a_stolen_laptop.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=0966e519-c096-4ae2-9f56-1d6d2302bc24&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2023-04-25T09:00:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Victoria to Algeria - the story of a stolen laptop",
            "content": "<p><span style=\"color: rgb(29, 29, 31);\">In the age of technology, the vast majority of us carry around at least one device, whether for work, for personal use, or both. These devices are unfortunately easy to lose or misplace and are a high value target for those with malicious intent, making theft a very real risk. Have you ever considered what happens to a device when it is stolen?<\/span><\/p><p><span style=\"color: rgb(29, 29, 31);\">In this episode, host Ben Cook invites Ed Cummings, a senior feature writer for the Daily Telegraph, to discuss what exactly happened when his laptop was stolen whilst attending a work event. Alongside hearing the tale of his laptop woes, Ed also shares with us some of his tips for protecting the data on your device, helping to reduce the risks that can occur if your device is ever stolen or lost.<\/span><\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1686321973-to_trust_or_to_challenge_you_decide.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=dd00294b-208d-4fc5-a272-b5d734ab6fef&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2023-03-06T10:00:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "To Trust or to Challenge? You decide.",
            "content": "<p><span style=\"color: rgb(29, 29, 31);\">When it's your job to break into places, how do you know who to trust? Or more importantly, how should others know when to trust an unfamiliar face or someone demonstrating suspicious behaviour?<\/span><\/p><p><span style=\"color: rgb(29, 29, 31);\">In this episode, host Ben Cook talks to Bridget Sargeng, an ethical hacker from Norway. With part of her job being to break into systems and sites, she's seen many people conduct both constructive challenges, and fail to challenge at all. Constructive challenges help to protect your workplace, so who better to get some tips from, than the person who might be trying to sneak in?<\/span><\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677251332-how_ethical_hackers_protect_defence.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=63a19e7d-50df-4606-bccd-d009b097bd69&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2023-02-10T15:07:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "How ethical hackers protect Defence",
            "content": "<p>For many people, the word 'hacker' is synonymous with trouble - they are the people you want to avoid and will do anything to protect yourself and your technology from. But contrary to popular belief, some types of hackers can be good. Ethical hackers in particular are growing in popularity as a way to check how secure your systems really are.<\/p><p>In this episode we are joined by Richard Smith and Peter Lillington from the Ministry of Defence Vulnerability Research Project. They share with us some details about what their Bug Bounty programmes are, and how they use these ethical hackers to protect Defence and discover potential vulnerabilities.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677251243-tracking_your_fitness_securely.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=056b61fb-354c-49cd-a217-a7c7ef833ffd&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2023-01-11T15:06:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Tracking Your Fitness Securely",
            "content": "<p>For many of us, the start of the new year means looking at setting new resolutions and goals, many of which are centred around health and fitness. This often means turning to one of the many available fitness tracking apps to help monitor our progress. Whilst these can be a really useful tool in helping you to stay positive on your journey, if used incorrectly, they can also pose a risk to your safety.<\/p><p>In this episode we are joined by RAF Physical Training Instructor Sargeant Jonny Watkins. He shares with us his tips on staying safe whilst using various fitness apps and devices and how to keep up to date with new emerging technologies.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677251066-securing_your_online_network.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=17268cb0-1c6d-47f3-9a57-d84b2905c2f0&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2022-12-05T15:03:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Securing your online network",
            "content": "<p>The vast majority of people now have some form of online network, be that their social media presence, or an online business. But how many of us know how to keep it secure? In this episode of Cyber Sound Bytes, Jess Sands, the founder of the Milspo Network, shares with us her insight into keeping the Milspo network secure, and how she navigates her business around the many cyber threats out there.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677250956-detangling_the_dark_web.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=7cc07949-d6ac-46d3-80f4-a061c9e71f7b&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2022-02-18T15:01:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Detangling the Dark Web",
            "content": "<p>For many of us the Dark Web seems like a mysterious and dangerous place. In this episode of Cyber Sounds Bytes Symon Kendall from South Wales Police shares his opinions and experiences dealing with the Dark Web aiming to debunk the myths that we may believe.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677250899-play_safe_online.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=18e4e594-27fb-487d-87e8-096086e837a7&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2022-01-11T15:00:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Play Safe Online",
            "content": "<p>Online gaming is a fun and exciting way to pass the time and connect with friends, and other gamers around the world. But, due to the popularity of online gaming, many cyber criminals prey on innocent players, making them vulnerable to cyber attack. In this episode we speak to Gordon Jones, chair of Royal Navy esports to hear his experiences of online gaming and get some top tips on how to play safe online.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677250743-a_year_on_the_cyber_front_line.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=1f0d7165-05b6-4562-a56f-704bc84e7132&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2021-10-22T13:57:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "A year on the cyber front line",
            "content": "<p>In this episode, head of the MOD Cyber Awareness, Behaviour and Culture project Simon Pavitt sits down with Cyber Confident spokesperson CeCe to discuss all things Cyber Awareness Month! CeCe talks about her experience as a female in cyber, some of the main tactics that cyber criminals prey upon and the importance of strong cyber security behaviours.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677250499-the_behavioural_science_behind_cyber_security.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=5731c693-c3a8-4c28-bd28-a13ae6a00905&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2021-10-05T13:52:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "The Behavioural Science Behind Cyber Security",
            "content": "<p>Did you know 95% of cyber attacks are due to human error? In this episode we are joined by Behavioural Scientist Libby Mayfield to discuss the human factors behind cyber security.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677250282-stay_cyber_confident_whilst_out_and_about.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=768dac2d-d240-4961-9966-3959f80bdb29&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2021-07-12T13:50:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Stay Cyber Confident Whilst Out and About",
            "content": "<p>As lockdown measures are easing, it is likely that many of us will be returning to our normal workplace setting. Since it's been so long, we may have forgotten the key cyber security behaviours that were once second nature.<\/p><p>In this episode John Cranmer, senior information and cyber security manager from HS2 gives his personal experiences and top tips on how to stay cyber confident whilst out and about.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677250152-the_link_between_social_engineering_and_hypnosis.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=e16e84fb-8810-474b-a5c9-a2b9067e9b80&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2021-05-14T13:48:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "The Link between Social Engineering and Hypnosis",
            "content": "<p>What is social engineering and how is it similar to hypnosis? Here we delve into the many types of attacks malicious actors will try via social engineering with top tips on how to keep safe from them. Listen to Graham Webber from Ministry of Defence to find out more. Don't forget to contact <a href=\"mailto:[email protected]\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>[email protected]<\/strong><\/a> for any queries.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677250055-secret_information_at_war.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=118c173f-382d-4013-8f6d-161e55ae800e&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2021-04-19T13:46:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Secret Information at War",
            "content": "<p>When at war, information becomes a key factor in the fight. Just how does the Government handle this whilst keeping enemies at bay? Listen to this episode to find out how from the Cabinet Office. For more information, reach out to the team at <a href=\"mailto:[email protected]\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>[email protected]<\/strong><\/a>.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677249698-whos_tracking_your_digital_footprint.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=62a2060b-4358-4192-a8a3-845522ccc3b9&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2021-03-15T14:41:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Who's Tracking your Digital Footprint?",
            "content": "<p>A digital footprint is&nbsp;a&nbsp;term used to describe&nbsp;the&nbsp;data that\u2019s left behind whenever a person uses a digital service.&nbsp;It\u2019s normal to have&nbsp;a digital footprint, and everyone is likely to have one.&nbsp;However, if it's not protected properly, it can leave you vulnerable to attacks. Remember, once something is shared online, it can be there forever.<\/p><p>Hear from John at National Cyber Security Centre (NCSC) on how to keep your digital footprint safe.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677249579-keep_you_and_your_family_safe_online.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=a0a246d2-d0ca-48b3-9f1f-5eb7ab952c12&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2022-02-25T14:37:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Keep You and Your Family Safe Online",
            "content": "<p>We're all spending time online more than ever before, especially with the help of social media. But, sharing too much information on the internet can leave us vulnerable.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677249258-how_to_secure_your_passwords.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=08d5d510-e652-4aa6-bd5b-b9f596605b26&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2021-02-09T14:33:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "How to Secure your Passwords",
            "content": "<p>Everyone loves new things, from clothes, to gadgets to experiences! But no one thinks about renewing their passwords, or even making sure they're unique to one another. Listen to Enoch Agyepong from Airbus Cyber Consultancy UK to find out why it's important to not only have strong passwords but how to create them.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677249142-catch_the_phish.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=7f5a9b3a-84a1-4340-aeab-8421b299b525&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2021-01-28T14:30:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Catch the Phish",
            "content": "<p>Phishing is the most successful and dangerous of all cyber-attacks with 1 in every 3 data breaches were estimated to be caused by phishing! So what is phishing and what's so bad about them? Find out here with Rhiannon Buckler, South Wales regional cyber prevent and protect police officer.<\/p>",
            "downloadable": 0,
            "new_episode": false
        },
        {
            "enclosure": {
                "url": "https:\/\/aod.sharp-stream.com\/content\/bfbs_podcasts\/storage\/1677248998-why_am_i_a_cyber_target.mp3?aw_0_1st.ri=sharpstream&aw_0_1st.organization=sharpstream&awEpisodeId=bced99c6-e06e-4396-b60c-71f08008e7d5&awCollectionId=3631f41e-a2ab-46fe-9720-b19da1454235&providerId=bfbs_podcasts"
            },
            "isoDate": "2021-01-11T14:21:00.000000Z",
            "series": [
                "cybersoundbytes"
            ],
            "series_title": "Cyber Sound Bytes",
            "itunes": {
                "image": "https:\/\/assets.sharp-stream.com\/content\/bfbs_podcasts\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
                "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>"
            },
            "title": "Why am I a Cyber Target?",
            "content": "<p>What is a digital footprint and how can this make me a target for cyber attack? Listen to this episode with Christine Maxwell, Directorate of Cyber Defence and Risk, and Sqn Rich C, Capability Development Desk Officer for UK Strat Com.<\/p>",
            "downloadable": 0,
            "new_episode": false
        }
    ],
    "itunes_detail": {
        "id": 1853,
        "type": "episodic",
        "summary": "<p>Want to know more about cyber security but it all seems too techy? We've broken it down for you. Listen to our episodes to help you be Cyber Confident.<\/p>",
        "language": "en-gb",
        "copyright": "@ bfbs 2024",
        "managing_editor": "[email protected] (Josella Waldron)",
        "webmaster": "[email protected] (Josella Waldron)",
        "publish_date": "2023-02-24T12:11:00.000000Z",
        "itunes_category_id": 18,
        "itunes_subcategory_id": 156,
        "image_url": "https:\/\/assets.sharp-stream.com\/content\/ssvc\/artwork\/thumbnails\/1677240404-cyber-soundbytes-2.png",
        "author": "[email protected] (Josella Waldron)",
        "explicit": "clean",
        "docs": null,
        "link": null,
        "new_feed_url": "https:\/\/feeds.sharp-stream.com\/content\/bfbs_podcasts\/feed-files\/cyber_sound_bytes.rss",
        "owner_name": "BFBS Radio",
        "owner_email": "[email protected]",
        "created_at": "2023-02-24T12:10:48.000000Z",
        "updated_at": "2024-02-21T09:10:32.000000Z"
    },
    "bfbs_id": "podcast_3631f41e-a2ab-46fe-9720-b19da1454235",
    "new_episode": false,
    "_id": 265230
}