Apr 28, 2020 | Business, Computers, Consumer, Cyber breaches, Cybercrime, Features, Hackers, iHeart, Internet, Public, Security, Technology, Vishing
Secure Use of Computers in Public Hi. Craig Peterson here with a blink into using computers in public. Most people have their own computers nowadays, but we are using them more-and-more in public. We are plugging our devices into random USB ports to charge them....
Apr 28, 2020 | Business, Email, Features, iHeart, Security, Technology, Webmail
Using Webmail Securely Hi. Craig Peterson here with a blink into using webmail securely. The first free Webmail email services started in 1996. Remember Hotmail and Rocketmail? My friend Gary still uses Hotmail. Today, the most popular Webmail service is gmail,...
Apr 28, 2020 | Business, Features, iHeart, Internet, Patching, Security, Security Alerts, Technology, Updates
Why and When? Upgrades, Updates and Patches Hi. Craig Peterson here with a blink into understanding Upgrades, Updates, and Patches. When/How/Why’s When vendors become aware of vulnerabilities in their products, they often issue patches to fix those vulnerabilities....
Apr 28, 2020 | Credentials, Features, iHeart, Passwords
Generate strong passwords/passphrases Hi. Craig Peterson here with a blink into secure passwords. Many businesses insist that their eight character passwords are secure because they force complexity requirements, and frequent password updates. Not true. These...
Apr 28, 2020 | Business, Features, iHeart, Internet, Mobile, Mobile Phones, Patching, Security, Security Alerts, Technology, Tracking, Updates, updates and patches
You’re mobile device is safer on the road/at home if you do a few things Hi. Craig Peterson here with a blink into mobile device security. The true cost of a lost mobile device goes far beyond the cost of replacement. Totaling up the expense of lost productivity,...
Apr 27, 2020 | Asset Management, Backup, Business, Business Email Compromise, CEO, Compliance, Computers, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data Assets, Data Loss, Data Storage, Disaster Recovery, Employees, Employment, Employment, Executives, Firewalls, Hacking, Hard Disks, Hiring, Incident Response, Intellectual Property Theft, Intricate Data Systems, IT Professional, Laptops, Legacy Systems, Managed Security Services Provider (MSSP), Networking, Patching, Ransomware, Routers, Security, Security Alerts, Shadow-IT, Software As A Service, Technology, Technology, Third - Party, Updates, VPN
Overcoming the Critical Cybersecurity Talent Shortage Businesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...