Jan 18, 2020 | Applications, Best Practices, Business, Business Email Compromise, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, Economic Disruption, Education, Employee Training, Employees, Employment, Exploits, Fines and Penalties, Government, Hackers, Hacking, Hacks, Insider Threat, Internet, Malware, MFA, Nationstates, Organized Crime, Phishing, Phishing, Phishing, Policies and Procedures, Radio Show, Radio_Show, scam, Security, Security, Smishing, Social Engineering, Social Media, Social Media, Social Networking, Technology, Threats, Tracking
Social Engineering Comes to the Forefront of Attacks We depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...
Oct 19, 2019 | Apple, Audio, Cell Phone, cell phones, Consumer, Hackers, Hacking, Hacking, Internet, iOS, iPhone, Jailbreak, Malware, Mobile, Mobile Phones, Phone, Radio Show, Radio_Show, Security, Security, Smart Phone, Technology
Fake iPhone Jailbreak Site leads to Advertising Click Fraud Jailbreaking your iPhone is never a good idea. The Apple ecosystem comes embedded with security foremost in mind, and if a problem does occur, the resolution is quick, and the patches sent to devices....
Jul 27, 2019 | Audio, cell phones, iOS, iPhone, Mobile, Phone, Radio Show, Radio_Show, Smart Phone, Tablet, Technology
Do you *HEART* Your iPhone? Historically, iPhone users have proven a loyal bunch with relatively few of them ditching their handsets and opting for alternative brands. That seems to be changing, however, with a survey released last week finding that iPhone loyalty has...
Mar 5, 2019 | As Featured On, WTAG
Who Should Store Our Health Records – Can You Trust Online Reviews: AS HEARD ON: WTAG: [03-05-19] http://traffic.libsyn.com/cptt/2019-00-00-AS_HEARD-2019-03-05-wtag-who_should_store_our_health_records-can_you_trust_online_reviews.mp3 DOWNLOAD TRANSCRIPT...