Sep 7, 2019 | Applications, Best Practices, Big Tech, Business, Consumer, Cybercrime, Cybersecurity, Data, data sharing, Employee Training, Facebook, Facebook, Google, Hacking, LinkedIn, LinkedIn, Radio Show, Radio_Show, Resources, Security, Social Media, Social Networking, Software, Software As A Service, storage, Technology, Web Tools
Companies Sharing Your Data with Their Third-Party Vendors It seems that every day there’s another news headline about how companies are using consumer data. Facebook was in the news again recently when the FTC slapped it with a $5 billion fine based on...
Sep 7, 2019 | Business, Computers, Cyber breaches, Cybercrime, Hackers, Hacking, Hacking, Home, Malware, Malware, Networking, Networking, Passwords, Radio Show, Radio_Show, Routers, Security, Security Alerts, Technology, WiFi
Security Protections Badly Needed On Routers New testing by Consumer Reports shows important differences in how routers from popular brands handle digital security. Some of the 29 routers we examined this spring and summer build in important safeguards, such as...
Sep 7, 2019 | Best Practices, Business, Computers, Cybersecurity, Data Storage, Hacking, Hacking, Hard Disks, Liability, Privacy, Radio Show, Radio_Show, Repair, Security, Security, Security Alerts, storage, Technology
Has New Storage Tech Made It Impossible To Securely Erase Old Hard Disks In the olden days, when you wanted to replace your hard drive with a bigger one, you’d run a “secure erase” on it to completely remove any personal data. This would write zeros to the entire...
Sep 7, 2019 | Best Practices, Business, Computers, Cyber breaches, Cybercrime, Cybersecurity, Hackers, Malware, Radio Show, Radio_Show, Security, Security, Security Alerts, Software Manufacturers, Technology
Why would a Salesman Dis the Product he Sells Current mass market security solutions can’t keep up with all the cybercrime exploits. It turns out that some of their salesman now know the truth about what they are representing. READ...
Sep 7, 2019 | Android, Best Practices, Business, Cell Phone, cell phones, Cybersecurity, Employees, Hacking, Hacking, iPhone, Malware, Patches, Phone, Phones, Radio Show, Radio_Show, Security, Security, Smart Phone, Technology, Updates, Zero-Day
Prices for Zero-Day Attacks – Which commands higher price Apple or Android? For the first time ever, the security exploits broker Zerodium is paying a higher price for zero-day attacks that target Android than it pays for comparable attacks targeting iOS. An...
Sep 7, 2019 | Applications, Big Tech, Business, Cloud, Cloud Vendors, Computers, Cybersecurity, Data, data sharing, Data Storage, Hacking, Malware, Radio Show, Radio_Show, Security, Security, Software As A Service, Technology
Cloud Services Have a Dark Side When It Comes To Security More than half of firms running multicloud environments have been hit with a data breach in the past year, compared with 24% of hybrid cloud organizations and 24% of single-cloud users. To gain a better...