Mar 7, 2020 | Access Controls, Asset Management, Best Practices, Business, Compliance, credential stealing, credentials, Critical data, Cyber Liability, cyberattacks, Data Assets, Employees, Hacking, Human Element, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Legacy Systems, Operating Systems, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Regulatory Compliance, Security, Security, Security Alerts, Technology, Technology, Third - Party, Updates
Cryptocurrencies and Insurance Increases Ransomware Profitability Ransomware is rising like a phoenix from the ashes again. Companies are paying enormous ransoms in cryptocurrencies and insurance companies paying out claims, which in turn is adding to the rise in...
Mar 7, 2020 | Applications, Attack Vectors, Audit Logs, Best Practices, Business, Business Email Compromise, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Critical data, Cyber Insurance, Cyber Liability, Cybercrime, Cybersecurity, Hacking, Internet, Malware, misconfigured environments, Patching, Policies and Procedures, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Security Assessments, SecurityThing, Technology, Technology, Third - Party, trojans, Updates
Are you Secure — Depends on Many Things If a business owner asks a cybersecurity specialist if they are secure, it will be tough for them to give them a straight and honest answer without delving into their systems and business operations. Most companies...
Mar 7, 2020 | Anti-Virus, Attack Vectors, Best Practices, Business, Cyber Liability, Cybercrime, Data Loss, Data Storage, Executives, Exploits, Hacking, Hacking, Hacking Tools, Internet, Operating Systems, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, scam, Security, Security, Security Alerts, Security Assessments, Security Services, Technology, Updates
You Don’t Have Much Time To Stop An Attack How much time do you have to secure your systems from a zero-day infection? Would it surprise you to learn that it is less than 72 hours? It is true. Locking down your systems from new vulnerabilities is essential. But just...
Mar 7, 2020 | Artificial Intelligence, Asset Management, Attack Vectors, Best Practices, Biometrics, Business, CEO, Clearview AI, credential stealing, Critical data, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Databases, Executives, Facial Recognition, Facial Recognition, Hackers, Hacking, Hacking, Hacks, Images, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Nationstates, Online, Organized Crime, Patches, Patching, Patents, Photo Database, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, third-world, Updates, Updates
Hackers Target Large Databases It was only a matter of time! The tiny start-up Clearview AI developed an algorithm that utilized a three billion image database that could end your ability to walk down the street anonymously. They provided it to worldwide law...
Feb 29, 2020 | Applications, Best Practices, Big Tech, Business, COPPA, Data Aggregator, Data Brokers, data sharing, Education, Elementary School, Future Workforce, Google, Google, Grade School, High School, High School, Information Technology, Internet, Legal, Liability, Location Data, Machine Learning, predictive algorithms, Psychology, Radio Show, Radio_Show, Resources, School Districts, Schools and Colleges, Security, Security, Software Manufacturers, Technology, Tracking
Big Tech taking Advantage of Our Kids Technology costs money. The sooner that everyone learns this the safer we will be. There is no way to offer technology services for free you will pay some way. For many that cost comes through the loss of private information....
Feb 29, 2020 | Business, compromised machines, Corporate Reputation, Critical data, Cryptocurrency, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data, Data Assets, Databases, Disaster Recovery, Financial, Hacking, Malware, Malware, Radio Show, Radio_Show, Ransomware, Security, Security, Technology, Technology, trojans, Zero-Day
Businesses Beware: Ransomware is on the rise, again Companies are under attack from Ransomware gangs and are paying a high price. Cybercriminals who were surreptitiously using business computing resources to mine cryptocurrencies have found that with the huge drop in...