The SMB protocol: what you need to know before using it #cybersecurity #cyberqueen

The SMB protocol: what you need to know before using it #cybersecurity #cyberqueen

HomeCyber QueenThe SMB protocol: what you need to know before using it #cybersecurity #cyberqueen
The SMB protocol: what you need to know before using it #cybersecurity #cyberqueen
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
SUBSCRIBE: https://www.youtube.com/@cyber.queen_

The famous SME! How it works?

SMB is a protocol that allows computers to share files and resources,

but it is also a common target for cybercriminals.

In recent years, we have witnessed major cyber incidents like
Wanting to cry,
Petya/NotPetya,
TrickBot which exploited the vulnerabilities of SMEs!

Some ways to secure SMB include using strong passwords, disabling SMBv1 (an older, less secure version of SMB), and configuring firewalls to block unauthorized SMB traffic.

Love and save this one for later

Stay safe ️
Your Cybersecurity Bestie!
@cyber.queen_

#shortswithcamilla #cybersecurity #SMB #WannaCry #Petya #NotPetya #TrickBot #securityawareness #technology #cybersecuritytraining #womenintech #womeninstem #techtutorials #easytutorial

ethical hackinghow to check a hacked phoneprotect your phonehow to hackwhen hackers meetwhen 2 hackers meethow to tell if your phone is hackedkali linuxhow to become an ethical hackerblack hat hackerethical hacking coursewhite hat hackerhow to become a hackerlearn hackingkali linux hacking tutorialinstallation of kali linuxethics tutorials hacking for beginnerswhat is ethical hacking

Please take the opportunity to connect and share this video with your friends and family if you find it useful.