Chapter

Office Security Assessment
listen on Spotify
42:04 - 50:14 (08:10)

The speaker follows an individual in an office building to assess their security infrastructure, noting exposed network ports and employees who left their computers unlocked. They also take photos of whiteboards, paperwork, and file names to help determine the sensitivity of the information found.

Clips
The hosts talk about how they found computers that were left unsecured and open at their desks and how this could lead to security breaches.
42:04 - 44:00 (01:56)
listen on Spotify
Security
Summary

The hosts talk about how they found computers that were left unsecured and open at their desks and how this could lead to security breaches. They mention that the network team should find a more secure way to check for network access and how they took photos of themselves pretending to plug in a device, being careful not to overstep any boundaries.

Chapter
Office Security Assessment
Episode
125: Jeremiah
Podcast
Darknet Diaries
The speaker describes tailgating and port scanning in a corporate building, noting potential security risks such as exposed network ports and sensitive information left in view.
44:00 - 50:14 (06:13)
listen on Spotify
Security Measures
Summary

The speaker describes tailgating and port scanning in a corporate building, noting potential security risks such as exposed network ports and sensitive information left in view. The gathering of information on potentially sensitive programs further emphasizes the importance of proper security measures in organizations.

Chapter
Office Security Assessment
Episode
125: Jeremiah
Podcast
Darknet Diaries