Feb 8, 2020 | Applications, Audit Logs, Business, CEO, Cloud, Compliance, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Databases, Disaster Recovery, Executives, Foreign Currency Exchange, Hackers, Hacking, Incident Response, Internet, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Security, Technology
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You? We have all heard about Ransomware and the toll it can take on businesses of all sizes. The rate of attacks has doubled in Q4, and the...
Feb 8, 2020 | Applications, Big Tech, Business, Cloud, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, Malware, Microsoft, Microsoft, Nationstates, Radio Show, Radio_Show, Russia, Security, Security Alerts, Technology, third-world, Windows (Microsoft)
“Evil Corp” really does exist, and it’s distributing malware using Microsoft Excel Yes, there is an Evil Corp, and it is a Russian backed group of Cybercriminals. They are busy weaponizing Microsoft’s popular spreadsheet package, Excel, so that it...
Feb 8, 2020 | Apple, Apple, Attack Vectors, Best Practices, Big Tech, Business, Computers, Corporate Reputation, Cybersecurity, Data Assets, Data Storage, Exploits, FBI, Government, Hacking, Internet, iOS, Mobile, Mobile Phones, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Security First, Surveillance, Technology
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups. Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Feb 8, 2020 | Best Practices, Business, CEO, Corporate Reputation, Cybercrime, Cybersecurity, Economic Disruption, Employees, Executives, Executives, Extortion, Hackers, Hacking, ID Theft, industrial espionage, Internet, Nationstates, Organized Crime, Radio Show, Radio_Show, Security, Security, Technology, third-world, Uncategorized
Our Personal and Brand Reputations are At-Risk By Nation-States Nation-States are no longer interested in just disrupting our politics. Not much money in that. With armies of cybercriminals, nation-states are going after our businesses with the goal of economic...
Feb 8, 2020 | Applications, Attack Vectors, Best Practices, Business, Cloud, Compliance, Cyber Liability, Data Storage, Databases, Hacking, Internet, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, spying, Technology, Third - Party, Third-Party, Updates
Do You Use Trello? Search turns up massive trove of private data Do you use Trello? It is an excellent collaboration platform that I use with my team. It can be an excellent tool for project collaboration. However, it must get set up correctly if you want to...
Feb 1, 2020 | Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, DeepFake, Employees, Employees, Hackers, Hacking, Hacking, HR, Human Element, Identity Theft, industrial espionage, Insider Threat, Internet, Malware, Malware, MFA, Patching, Phishing, Phishing, Psychology, Radio Show, Radio_Show, Security, Security Alerts, Social Engineering, Technology
Most Businesses Attacked By Business Email Compromise Last Year 2019 was the year for Business Email Compromises also known as BEC attacks. In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....