Jace Randolph

Jace Randolph is a seasoned IT security professional with over 15 years of experience spanning various industries. After an unethical start as a black hat hacker, he now leverages his expertise in ethical hacking and social engineering to strengthen security for businesses. Jace is currently the Director of IT at Western Steel Buildings.

Securing Your Business in an Increasingly Connected World with Jace Randolph

Protecting company data is more challenging than ever with the proliferation of personal devices in the workplace. In this episode, Michael Moore speaks with IT security expert Jace Randolph about ethical hacking, social engineering, and the security vulnerabilities introduced by the shift to USB-C. They explore the ethical gray areas around exposing system weaknesses to improve security, securing personal devices used for work, and the need for more robust security standards. You will learn key strategies and mindsets to secure their business data in an increasingly interconnected digital world.

Securing Your Business in an Increasingly Connected World with Jace Randolph

No company is immune to hacking. Small businesses need robust security too, not just big corporations.

3 Key Takeaways

Listen To The Full Episode Below

Dissecting Popular IT Nerds
Dissecting Popular IT Nerds
224- Securing Your Business in an Increasingly Connected World with Jace Randolph
Loading
/

Episode Show Notes

Getting started in IT and ethical hacking [02:03]

Social engineering as an effective hacking technique [06:18]

Security vulnerabilities in manufacturing facilities [09:15]

The danger of using personal devices for work [14:00]

Small businesses as prime hacking targets [12:39]

Securing BYOD devices with MDMs [45:25]

Demo of hacking an iPhone with a malicious USB-C cable [43:20]

Unified connectivity leading to new vulnerabilities [38:43]

Overcoming resistance to change in IT [33:16]

Importance of learning the business side in IT [56:54]

Lack of security awareness as a key weakness [53:49]

The future of hacking and IT security [01:00:07]

Resources

QR Code