Mar 7, 2020 | Access Controls, Anonymity, Applications, Best Practices, Business, Compliance, Critical data, Data Loss, DNS over HTTPS (DoH), Domain Name Service, Employees, Executives, Filtering, Internet, Intricate Data Systems, Patching, Policies and Procedures, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Technology, Technology, TOR, Updates
DNS over HTTPS (DoH) is not the Panacea the Marketers Are Leading you to Believe Mozilla Firefox is promoting its new DNS over HTTPS (DoH) as a privacy-preserving method, but in reality, it is changing how DNS works. Its not the magical user privacy cure but marketing...
Jan 25, 2020 | Advertising, Amazon, Apple, Big Tech, Business, Copyright, Financial, Google, Internet, Legal, M&A, Marketing, Marketing Manipulation, Microsoft, Microsoft, R&D, Radio Show, Radio_Show, Technology
Big Tech Stomps All Over Small Businesses Are small tech companies being squeezed by tech giants? You bet and it has happened numerous times. Sometimes they announce a big product or service, never planning to ever bring it to market. They drive excitement for their...
Jan 4, 2020 | Advertising, Applications, Attack Vectors, brain development, Brain Fitness, Business, cyberattacks, Cybercrime, Cybersecurity, Data, Exploits, Facebook, Google, Hackers, Hacking, Hacks, Health, Infosec, iOS, Malware, Mental Fatigue, Mobile, Mobile Phones, Nationstates, Patching, Ransomware, Security, Security Alerts, spying, Tracking, Updates, Vulnerabilities
Pesky Apps That You Need To Delete ASAP Not all Apps are Good Apps… Depressive Apps. With everyone curating an unrealistic, heavily manufactured, idealized version of their lives, we all start to believe other people’s lives are so much better than...
Jun 15, 2019 | Apple, Facebook, Marketing, Monitoring, Passwords, Privacy, Radio Show, Radio_Show, Security, Software, Technology, Tracking, Web Tools
Multiple Logins The Bane of Modern Online Life In our online lives today, it seems like every time you turn around, you are required to sign in to something, create an account for something to use their services. Every app seems to require its specific login. Google...
May 26, 2018 | Internet, Radio Show, Security
What You Need to Know About GDPR Breach Disclosure, Response Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when...