Navigating the Next Wave of Cyber Threats

May 06

In this episode of "Technology Simplified – Tech Talk Everyone Can Understand," Tina Forrest, Director of Cybersecurity and Compliance at IT Voice, provides invaluable insights into staying safe in today's ever-changing cybersecurity landscape.


Welcome to Technology Simplified, Tech Talk everyone can understand. In this episode, we had the opportunity to hear from Tina Forrest, Director of Cybersecurity and Compliance at IT Voice, as she discussed the evolving cybersecurity landscape and the top threats for 2024. Tina emphasized the importance of a layered approach to security and highlighted the significance of user education, policies, and the use of security appliances to mitigate risks. Let's delve into the key takeaways from the insightful discussion. 

The Human Element in Cybersecurity 

Tina emphasized the crucial role of employees in cybersecurity, referring to them as the "best defense" against cyber threats. She highlighted the importance of training employees to recognize unusual behavior in their computer systems and report any suspicious activity. This human firewall approach can significantly contribute to early threat detection and mitigation. 

Signs to Watch Out For 

Tina also shared some examples of signs that end-users should be aware of, including: 

  • Misspelled URLs or links in emails 
  • Misspelled names and bad grammar in business emails 
  • Unexpected pop-ups or redirects while browsing 

These signs can serve as early indicators of potential cyber threats and should be taken seriously by employees. 

The Rise of Ransomware and Other Threats 

The discussion shed light on the alarming increase in ransomware attacks, with a 94% rise compared to the previous year. Tina emphasized that ransomware is expected to cost an estimated $265 billion by 2031, making it a significant concern for businesses. She also highlighted the top attack methods, including phishing, malicious attachments, remote access to RDP, and the emerging threat of drive-by downloading. 

The Importance of a Layered Approach 

Tina emphasized the need for a layered approach to cybersecurity, comparing it to bulletproof glass with multiple layers of protection. She stressed the significance of utilizing tools such as EDR (Extended Detection and Response), Managed Detection and Response, and good password management to strengthen the overall security posture. 

Best Practices for Staying Safe 

In the ever-changing cybersecurity landscape, Tina recommended the following best practices: 

  • Continuous user education and training 
  • Implementation of specific policies and sanctions for repeat offenders 
  • Utilization of security appliances and tools for threat detection and response 
  • Adoption of a layered approach to security, including backups and disaster recovery measures 

Industry-Specific Considerations 

Tina also highlighted the importance of considering industry-specific compliances, such as HIPAA, and the need to ensure data encryption to reduce the risk of fines and data breaches. 


As cyber threats continue to evolve, businesses must prioritize cybersecurity and adopt a proactive approach to mitigate risks. By implementing a layered approach to security, providing comprehensive user education, and adhering to industry-specific compliances, organizations can strengthen their defenses against cyber threats. 

At IT Voice, we understand the critical importance of cybersecurity and are dedicated to helping businesses stay safe in the face of evolving threats. If you have any questions or topics you'd like us to cover in future episodes, feel free to reach out to us on social media or through our website. Stay vigilant and stay safe in the digital world.