Feb 29, 2020 | Applications, Applications, Asset Management, Attack Vectors, Audit Logs, audit logs, Best Practices, Big Tech, Business, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Data Storage, Employees, Executives, Hackers, Hacking, industrial espionage, Organized Crime, Patches, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates
Businesses in Danger: Data Transfer between Cloud Apps The cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data. I constantly have to explain to...
Feb 29, 2020 | Attack Vectors, Best Practices, Business, Cloud, Cloud Vendors, Compliance, Corporate Reputation, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Databases, Fines and Penalties, Hackers, Hacking, Legal, Liability, Market Value, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Technology, Third - Party, Third-Party, Threats, Unsecured, Updates
Businesses Must Understand The Intricacies of Cloud Security It does not matter the size of the organization or the complexity of the operations businesses have been sold on the idea that “the cloud” is the answer. For MGM Resorts they found out that the data they...
Feb 15, 2020 | Applications, Best Practices, Business, CEO, Compliance, credential stealing, Hacking, Internet, Intricate Data Systems, Legacy Systems, Patching, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Frameworks, Security, Security, Security Alerts, Shadow-IT, Software, Software As A Service, Software Manufacturers, Technology, Third - Party, third-world, Threats, Updates
Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession. And they carry them everywhere. Yes, I am talking about their cellphones. On these devices, they can download 1000’s of apps. These apps allow them to create...
Jan 11, 2020 | Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Backup, Business, CEO, Cloud, Cloud Provide, Cloud Vendors, Compliance, Computers, Cyber breaches, Cyber Insurance, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data, Data Assets, data sharing, Data Storage, Databases, Employees, Fines and Penalties, Government, Hacking, Hacking, Incident Response, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Machine Learning, Malware, Managed Security Services Provider (MSSP), Microsoft, Networking, Operating Systems, Patching, predictive algorithms, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates, Vulnerabilities
Cloud Migration Considerations to Take into Account Deciding to move to business technology services to “the Cloud” is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest...
Dec 19, 2019 | Backup, Business, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, Data Storage, Fines and Penalties, Government, Hacking, Hacking, hacking as a service, Hacks, Incident Response, Insider Threat, Internet, Malware, Networking, Patching, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Are You At Risk from Your Outsourced Software Provider The “Cloud” is the eponymous name given for a computer server that belongs to another person or company that you have no control over. There are many companies who offer computing services to...