Do You Use Trello? Search turns up massive trove of private data

Do You Use Trello? Search turns up massive trove of private data

Do You Use Trello? Search turns up massive trove of private data Do you use Trello? It is an excellent collaboration platform that I use with my team. It can be an excellent tool for project collaboration.    However, it must get set up correctly if you want to...
Most Businesses Attacked By Business Email Compromise Last Year

Most Businesses Attacked By Business Email Compromise Last Year

Most Businesses Attacked By Business Email Compromise Last Year 2019 was the year for Business Email Compromises also known as BEC attacks.  In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....
Keeping Legacy Software Safe

Keeping Legacy Software Safe

Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure.  Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered.  That means that they were not designed...
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption

Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption

Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption Facial Recognition is not a perfect technology and still needs some time before being widely used in societal applications until we get our hands around the issues of privacy, safety and...
Downtime and Costs Double as Ransomware Attacks Hit Larger Businesses

Downtime and Costs Double as Ransomware Attacks Hit Larger Businesses

Downtime and Costs Double as Ransomware Attacks Hit Larger Businesses New and sophisticated ransomware attacks are being perpetrated on all types of businesses including large companies and government entities.  This deep pocket targets are driving the costs up by...
Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations.  Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...