
Cybersecurity and Virtualization with Benjamin Gairrett - Part 3
06/07/21 • 29 min
You may be surprised by the target of a recent data breach. Hint: The platform has approximately 2.6 billion users (and you may be one of them). Benjamin Gairrett, IT Support Manager at the Authority, shares this recent cyber-attack, ways you can find out if you were affected, and more in part three of this three-part podcast episode!
In this episode, Benjamin discusses
- More cyber-attacks!
- The handling of a recent network outage due to fiber connection damage
- Ways to start a career in information technology within 9-1-1
Ben refers to:
- Have I Been Pwned to check if you have been affected by any kind of data breach
- Ars Technica is a great technology website
- Another great information technology and security website by Brian Krebs aka the “James Bond of tech stuff” Krebs on Security
You may be surprised by the target of a recent data breach. Hint: The platform has approximately 2.6 billion users (and you may be one of them). Benjamin Gairrett, IT Support Manager at the Authority, shares this recent cyber-attack, ways you can find out if you were affected, and more in part three of this three-part podcast episode!
In this episode, Benjamin discusses
- More cyber-attacks!
- The handling of a recent network outage due to fiber connection damage
- Ways to start a career in information technology within 9-1-1
Ben refers to:
- Have I Been Pwned to check if you have been affected by any kind of data breach
- Ars Technica is a great technology website
- Another great information technology and security website by Brian Krebs aka the “James Bond of tech stuff” Krebs on Security
Previous Episode

Cybersecurity and Virtualization with Benjamin Gairrett - Part 2
Did you know that the first few rings when you place a call are fake?! While your call is being routed and connected, that ring-back tone is to let you know that something is happening behind the scenes. Dive deeper into how 9-1-1 works and more in part two of this three-part podcast!
In this episode Benjamin discusses:
- The biggest points of cyber vulnerability for an organization and what users can do to increase online security
- The difference between Hypertext transfer protocol (HTTP) vs. Hypertext Transfer Protocol Secure (HTTPS) and the truth behind them
- How to implement good Internet browsing habits
- The pros and cons of password keepers
- Updates to our newly implemented 9-1-1 system
- How 9-1-1 works and how 9-1-1 is working towards obtaining z-axis coordinate information
- Cell phone tower design/technology
- 9-1-1 texting capabilities
Benjamin refers to:
- ANI/ALI (Automatic Number Identification/Automatic Location Identification)
- Voice over Internet Protocol (VOIP) systems
- Wireless Phase I and Wireless Phase II information and data sources
- Demarcation points of call delivery
- TTY (text telephone), video relay, and language line use and services
Next Episode

A Belated Introduction of Host, Amanda Lindgren, with Benjamin Gairrett and Claire Linné
Meet your host, Amanda Lindgren! Amanda has been in 9-1-1 for eight years and has worked as a call taker, dispatcher, and public educator. She’s been able to apply her marketing background to her current role to bring public education programs to a new level. In this podcast episode, Amanda discusses:
- Her experiences in a variety of roles
- Growth in communication and learning how to overcome weaknesses in our individual communication style
- Adaptability to education programs during the pandemic and recent achievements
- How perspectives influence others
- Perfectionism and productivity. Her favorite line: "Not good enough but good for now."
Amanda references:
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/9-1-1-weight-in-gold-234536/cybersecurity-and-virtualization-with-benjamin-gairrett-part-3-26271147"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to cybersecurity and virtualization with benjamin gairrett - part 3 on goodpods" style="width: 225px" /> </a>
Copy