 {"id":38464,"date":"2022-01-11T13:16:57","date_gmt":"2022-01-11T20:16:57","guid":{"rendered":"https:\/\/moderneuc.com\/?p=38464"},"modified":"2026-02-18T13:02:18","modified_gmt":"2026-02-18T20:02:18","slug":"cybersecurity-fundamentals","status":"publish","type":"post","link":"https:\/\/jorgep.com\/blog\/cybersecurity-fundamentals\/","title":{"rendered":"Cybersecurity Fundamentals"},"content":{"rendered":"\n<p>The last couple of years (2020 &amp; 2021) were particularly hard years for many organizations as it relate to cybersecurity.     So many attacks in so many forms ranging from internal ones focused on getting specific data \/ information to highly organized ones focused on disrupting operations all the way to state sponsored ones focus on creating disruption and Kaos across the field.     We have seen a lot in every form and it is unsettling for sure.    <\/p>\n\n\n\n<p>Now more than ever, everyone needs to have a basic understanding of cybersecurity, and how we can help protect ourselves from theft and disruption.    <\/p>\n\n\n\n<p>I just created this video that  explains the basics very well in less than 15 minutes.   It will not make you a cybersecurity expert, but it really provides a baseline overview of the why, what and how cybersecurity best practices are so important to implement.<\/p>\n\n\n\n<p>Content includes:  <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Good overview of the Types of Cyber Attacks<ul><li>Malware, Phishing, Man-in-the-Middle, DDoS, Malvertising, Ransomware<\/li><\/ul><\/li><li>Explanation of the definition of Cybersecurity <\/li><li>Explanation of Attacks and countermeasures<\/li><li>Three Pillars of your Cybersecurity defense:  <strong>People, Process &amp; Systems<\/strong><\/li><li>Difference between EDR, XDR and MDR <\/li><\/ul>\n\n\n\n<p>Video Updated to Cybersecurity Fundamental video <\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Cybersecurity Fundamentals (2022) \/ Explained Series\" width=\"720\" height=\"405\" src=\"https:\/\/www.youtube.com\/embed\/5wxHO2PGFjI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Transcript <a href=\"https:\/\/jorgep.com\/blog\/transcript-cybersecurity-fundamentals-video\/\" data-type=\"URL\" data-id=\"https:\/\/jorgep.com\/blog\/transcript-cybersecurity-fundamentals-video\/\">available here<\/a><\/p>\n\n\n\n<p>Hope this helps!  <\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"additional-resources\">Additional Resources <\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>In my search I came across multiple videos worth mentioning I used for reference and you can also review for further details &#8211;  <ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=0wuTFR_pv38&amp;t=12s\" target=\"_blank\">Cyber security fundamentals | Understanding Cybersecurity Basics&nbsp;<\/a>&nbsp;&nbsp;(14 minutes)<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=Dk-ZqQ-bfy4\" target=\"_blank\">8 Most Common Cybersecurity Threats | Types of Cyber Attacks | Cybersecurity for Beginners&nbsp;<\/a>&nbsp;(22 minutes)<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=q8KEgICjcmg\" target=\"_blank\">Top Cyber Attacks In History | Biggest Cyber Attacks Of All Time |&nbsp;<\/a>(18 minutes)<\/li><li><a href=\"https:\/\/www.youtube.com\/watch?v=SFFdbeogLFc\">What is XDR vs EDR vs MDR? Breaking down Extended Detection and Response<\/a> (8 minutes) <\/li><\/ul><ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/youtube.com\/playlist?list=PL9ooVrP1hQOGPQVeapGsJCktzIO4DtI4_\" target=\"_blank\" data-type=\"URL\" data-id=\"https:\/\/youtube.com\/playlist?list=PL9ooVrP1hQOGPQVeapGsJCktzIO4DtI4_\">A Full Cybersecurity course<\/a>:<ul><li>One full 8 hour video or 53 individual videos (longest 38 minutes)<\/li><\/ul><\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=inWWhr5tnEA\" target=\"_blank\">Cyber Security In 7 Minutes | What Is Cyber Security: How It Works? | Cyber Security<\/a>&nbsp;( 7 minutes)<\/li><li><a href=\"https:\/\/www.youtube.com\/watch?v=toenlhWsHiE&amp;t=154s\">How To Sell Cybersecurity by GreenCloud Defense<\/a> (14 minutes) <\/li><li><a href=\"https:\/\/www.youtube.com\/watch?v=ydO5y0pleK0\">Dell Technologies Managed Detection and Response &#8211; YouTube<\/a><\/li><li><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/video-hub\/microsoft-defender-extended-detection-and-response-xdr\/ba-p\/1832092\">Microsoft Defender | Extended Detection and Response (XDR) &#8211; Microsoft Tech Community<\/a><\/li><li><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\">Zero Trust Model &#8211; Modern Security Architecture | Microsoft Security<\/a><\/li><li><a href=\"https:\/\/mindmajix.com\/cyber-security-frameworks\">List of Cybersecurity Frameworks (mindmajix.com)<\/a><\/li><li><a href=\"https:\/\/www.extrahop.com\/company\/blog\/2017\/dwell-time-new-security-metric\/\">Dwell Time In Security | ExtraHop<\/a><\/li><\/ul><\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The last couple of years (2020 &amp; 2021) were particularly hard years for many organizations as it relate to cybersecurity. So many attacks in so many forms ranging from internal ones focused on getting specific data \/ information to highly organized ones focused on disrupting operations all the way to state sponsored ones focus on&#8230;<\/p>\n","protected":false},"author":2,"featured_media":369994,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[681,441],"tags":[700,709,727,742],"class_list":["post-38464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-moderneuc2","category-tech-talk","tag-cybersecurity","tag-explained-video-series","tag-mdr","tag-moderneuc1"],"taxonomy_info":{"category":[{"value":681,"label":"ModernEUC"},{"value":441,"label":"Tech Talk"}],"post_tag":[{"value":700,"label":"Cybersecurity"},{"value":709,"label":"Explained Video Series"},{"value":727,"label":"MDR"},{"value":742,"label":"ModernEUC"}]},"featured_image_src_large":["https:\/\/jorgep.com\/blog\/wp-content\/uploads\/2022\/01\/featureImage-CyberSecurityFundamentals.jpg",740,321,false],"author_info":{"display_name":"Jorge Pereira","author_link":"https:\/\/jorgep.com\/blog\/author\/jorge\/"},"comment_info":0,"category_info":[{"term_id":681,"name":"ModernEUC","slug":"moderneuc2","term_group":0,"term_taxonomy_id":691,"taxonomy":"category","description":"","parent":0,"count":261,"filter":"raw","cat_ID":681,"category_count":261,"category_description":"","cat_name":"ModernEUC","category_nicename":"moderneuc2","category_parent":0},{"term_id":441,"name":"Tech Talk","slug":"tech-talk","term_group":0,"term_taxonomy_id":451,"taxonomy":"category","description":"","parent":0,"count":670,"filter":"raw","cat_ID":441,"category_count":670,"category_description":"","cat_name":"Tech Talk","category_nicename":"tech-talk","category_parent":0}],"tag_info":[{"term_id":700,"name":"Cybersecurity","slug":"cybersecurity","term_group":0,"term_taxonomy_id":710,"taxonomy":"post_tag","description":"","parent":0,"count":29,"filter":"raw"},{"term_id":709,"name":"Explained Video Series","slug":"explained-video-series","term_group":0,"term_taxonomy_id":719,"taxonomy":"post_tag","description":"","parent":0,"count":8,"filter":"raw"},{"term_id":727,"name":"MDR","slug":"mdr","term_group":0,"term_taxonomy_id":737,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":742,"name":"ModernEUC","slug":"moderneuc1","term_group":0,"term_taxonomy_id":752,"taxonomy":"post_tag","description":"","parent":0,"count":284,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/38464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/comments?post=38464"}],"version-history":[{"count":1,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/38464\/revisions"}],"predecessor-version":[{"id":518787,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/38464\/revisions\/518787"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/media\/369994"}],"wp:attachment":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/media?parent=38464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/categories?post=38464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/tags?post=38464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}