Aug 3, 2019 | Best Practices, Business, CEO, Cloud Vendors, Computers, CyberTraining, Legal, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Assessments
SMB Cyber Security and Audits. The Why’s, the How’s, and the steps… Why? To maintain your company’s “security hygiene.” To identify critical weaknesses in your cybersecurity protection measures To Keep in Compliance with Industry...
Jul 30, 2019 | Elections, Podcast, WGIR
Elections are Coming – How Will Computers, Technology, and Big Data Affect Them and more on NH Today July 29th, 2019 WGIR-AM Related Articles: This psychologist claims Google search results unfairly steer voters to the left. Conservatives love him — More...
Jul 27, 2019 | Best Practices, Business, Cloud, Cloud Vendors, Computers, Cybersecurity, Internet Service Providers, Networking, Radio Show, Radio_Show, Security, Security, Technology
Are Your Cloud Vendors Paying Attention to Security? Cloud adoption is on the rise: According to International Data Corporation (IDC)’s “Nine Ways to Maximize the Value of Cloud Contracts,” 52 percent of all companies are currently using cloud-based delivery...
Jul 22, 2019 | Business, CEO, CEO Security Intelligence Brief, Cloud, Cyber breaches, Radio Show, Radio_Show
July 2019 – CEO Security Intelligence Brief Third Parties are either directly or indirectly responsible for 63% of all cyber attacks. The costliest threats to small and medium businesses involve data leaving the organization via third-party providers....
Jul 14, 2019 | Business, Cybersecurity, CyberTraining, Email, Email, Employees, Hacking, Radio Show, Radio_Show, Security
Someone’s Phishing for You! Black Hats are out there casting a line for you and hoping to land their “Phish” This type of social engineering relies on a simple human trait – trust. By playing on this trust, they can manipulate you into falling for their...