Feb 1, 2020 | Best Practices, Biometrics, Business, Cyber breaches, cyberattacks, Data Brokers, Data Storage, Databases, Facial Recognition, Facial Recognition, False Positives, Hacking, Hacking, ID Theft, Internet, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Social Networking, Technology, Unsecured
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption Facial Recognition is not a perfect technology and still needs some time before being widely used in societal applications until we get our hands around the issues of privacy, safety and...
Jan 25, 2020 | anonymity, Business, Employees, Employment, Hacking, HR, Internet, Location Data, Monitoring, Monitoring, Privacy, Radio Show, Radio_Show, Security, spying, Surveillance, Technology, Tracking
What Does Your Employer Know About Your Daily Activities How much does your employer know about your personal life? Maybe more than you realize. When you use your personal devices to access company servers they can log your activities. Then they can track when you log...
Jan 25, 2020 | Attack Vectors, audit logs, Best Practices, Big Tech, Business, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Hacking, Legacy Systems, Microsoft, Microsoft, Microsoft, Operating Systems, Patching, Privacy, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Technology, Updates, Windows 7, Zero-Day
No Security for Windows 7 After Today Are you using Windows 7? Did you know some of the largest firms in the country (even large financial institutions) are still using it? Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...
Jan 18, 2020 | Access Controls, Applications, Attack Vectors, automation, Business, CEO, Coding, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Storage, Hackers, Hacking, Hacking, Internet, Patching, Radio Show, Radio_Show, safety, Security, Security Alerts, spying, Technology, Third - Party, Updates
A Lesson to Learn – If it is Connected It can Be Hacked I remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product...
Jan 18, 2020 | Business, Cable Companies, Cable Haunt, Computer Repair, Cyber Liability, Firewalls, Hacking, Internet, Internet Service Providers, Networking, Patching, Radio Show, Radio_Show, Reference Code, Routers, safety, Security, Security Alerts, spying, Updates, Vulnerabilities
Routers and Firewalls with Broadcom Chipsets Are Vulnerable Have you heard of the router/firewall critical vulnerability called Cable Haunt? Well, for 200 million worldwide users, this could soon be a nightmare come true. Cable Haunt allows a hacker to compromise the...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...