Mar 21, 2020 | Best Practices, Biological Viruses, Business, cell phones, Cisco, Cloud, Cloud Vendors, Computers, Coronavirus, Covid-19, Cybersecurity, Data Assets, Internet, News, Patching, Privacy, Quarantine, Radio Show, Radio_Show, Remote Work, Remote-Work, Security, Security, Security Alerts, Technology, Technology, Unsecured Devices, Updates, WebEx
Security Must Be In Place Prior to Remote Work One of the biggest problems facing companies during this coronavirus pandemic is that they do not have the proper and robust enough security to support remote-work. Many companies do not completely understand the...
Mar 21, 2020 | Backup, Business, Compliance, Computers, Corporate Reputation, credentials, Critical data, Cyber Liability, cyberattacks, Data Loss, Data Storage, Employees, Firewalls, Government, Intellectual Property Theft, Internet, Malware, Networking, News, Patching, Quarantine, Radio Show, Radio_Show, Remote-Work, Routers, Security, Security Alerts, Technology, Unsecured Devices, Updates, VPN
Your Employer Says Go Home and Work — Now what? For many companies and their employees, this widespread hysteria over this coronavirus pandemic has taken everyone by surprise. Remote work might have been a consideration but now is not an option but a...
Feb 15, 2020 | Applications, Attack Vectors, Business, Business Email Compromise, Compliance, Corporate Reputation, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, CyberTraining, Employees, Executives, Extortion, Hacking, Hacks, Human Element, ID Theft, Incident Response, Intellectual Property Theft, Internet, Intricate Data Systems, Market Value, News, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Regulatory Compliance, Security, Security Alerts, Social Engineering, Technology, third-world, Updates
Ransomware rings adapt to business declarations by Revealing Stolen Data Did you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world. Even the most prepared organization have found themselves...
Feb 15, 2020 | Access Controls, Applications, Attack Vectors, Audit Logs, audit logs, automation, Business, Compliance, credentials, Cyber breaches, Data, data sharing, Elections, Elections, Government, Internet, Intricate Data Systems, Malware, News, Online Voting, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, Voting Apps, Voting Technology
The security mistakes made by the Iowa Democratic Party in creating their App Last week there was a caucus in Iowa. Caucuses by their very nature are prone to manipulation and miscounting. Then you add in the fact that the party chose to use a new technology that was...
Feb 15, 2020 | Attack Vectors, CDC, CoronaVirus, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Hackers, Hacking, Internet, Nationstates, News, Organized Crime, Phishing, Radio Show, Radio_Show, Security, Security Alerts, Social Engineering, Technology, third-world, WHO
Coronavirus bringing out opportunistic Hackers Whenever there is something in the news we find cybercriminals willing to exploit it in some way. Currently, the big news is the Coronavirus that is spreading from Wuhan, China. We have seen email malware being spread...
Feb 15, 2020 | Access Controls, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, Business, Business Email Compromise, China, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Storage, Economic Disruption, Employees, Executives, Extortion, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Intricate Data Systems, Legacy Systems, Malware, Managed Services Provider (MSP), Market Value, Nationstates, News, Patching, Phishing, Policies and Procedures, Radio Show, Regulatory Compliance, Security, Security Alerts, Smishing, Social Engineering, Technology, Third - Party, third-world, Updates, Vishing
Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government. They target military sub-contractors and sub-sub-contractors, universities,...