Mar 3, 2024 | Business Email Compromise, Email, Webmail, Whaling
☕️ Imagine this: you sign up for a new newsletter, and before you know it, your inbox is flooded with marketing emails 📧. It’s annoying, right? But I solved this problem decades ago… And its free. Well, I’ve got some good news for you! There’s...
Jul 1, 2023 | Business, Cybersecurity, Data Assets, data sharing, Databases, Email, Employee Training, Employees, Fines and Penalties, Firewalls, Hybrid Office, Internet, Networking, Ransomware, Routers, Security, Technology, VPN, Webcam
The hybrid working model became increasingly popular during and since the pandemic. It has brought benefits to individuals and organizations alike, such as increased flexibility and lower overheads. It has also been beneficial for the environment by reducing...
Mar 19, 2021 | Amazon, Amazon platform, App Store, Apple, Apple, Apps, Artificial Intelligence, Attack Vectors, Backdoors, Best Practices, Big Tech, Breaches, browsers, Business, China, Computers, cyberattacks, Cybercrime, Cybersecurity, Dark Web, Email, Encryption, Exchange Server, Exchange Server, Google, Google, Government, Government, Hackers, Hacking, hacking as a service, Hacks, Homeland Security, Information Technology, Infrastructure, Intellectual Property Theft, Internet, Law Enforcement, Legal, Machine Learning, Malware, Microsoft, Microsoft, Monitoring, Nationstates, Networking, News, Patches, Patching, Phishing, Podcast, predictive algorithms, Publishing, Radio Show, Radio_Show, Ransomware, Ransomware, Russia, Security, Security, Security Alerts, Security First, Show Notes, Software, Spyware, Tech Overlords, Technology, Technology, third-world, United States, Updates, Web Tools
Read. Learn. Share. Tech Talk Show Notes March 20, 2021 U.S. Unprepared for AI Competition with China, Commission Finds The National Security Commission on Artificial Intelligence is out with its comprehensive final report recommending a path forward for...
Apr 28, 2020 | Business, Email, Features, iHeart, Security, Technology, Webmail
Using Webmail Securely Hi. Craig Peterson here with a blink into using webmail securely. The first free Webmail email services started in 1996. Remember Hotmail and Rocketmail? My friend Gary still uses Hotmail. Today, the most popular Webmail service is gmail,...
Feb 29, 2020 | Asset Management, Best Practices, Business, Cable Companies, Cloud, Cloud Vendors, Computers, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Assets, Data Brokers, data sharing, Data Storage, Databases, Domain Name Service, Email, Employees, Executives, Financial, Future Workforce, Generation-Y, Hackers, Hacking, Hacks, Incident Response, Information Technology, Insider Threat, Internet, Internet Service Providers, IoT, Jobs, Liability, Machine Learning, Malware, Malware, MFA, Nationstates, Networking, Open Source, Organized Crime, Password Managers, Passwords, Phishing, predictive algorithms, Radio Show, Radio_Show, Ransomware, Regulation, Regulatory Compliance, Security, Security, Security Assessments, Shadow-IT, Software As A Service, Technology, Technology, Unsecured, Web Tools, Zero-Day
All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not. Companies who continue to believe that they are not technology companies...
Jan 11, 2020 | Asset Management, Attack Vectors, Audit Logs, automation, Best Practices, Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Data, Data Assets, DOD, Economic Disruption, Email, Firewalls, Government, Hackers, Hacking, Hacking Tools, Homeland Security, Incident Response, Internet, Iran, Law Enforcement, Nationstates, Networking, Operating Systems, Patching, Phishing, Phishing, Policies and Procedures, Privacy, Radio Show, Radio_Show, Routers, Security, Security, Security Alerts, segmentation, Switches, Technology, Third - Party, third-world, Updates, Wiper Malware
Bomb’s will not be Iran’s retaliation – Technological hacks are more likely Microsoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and...