Feb 22, 2020 | Applications, applications, Automotive, Best Practices, Business, Cell Phone, Corporate Reputation, Ford, Hacking, Mobile, Patching, Phone, Phones, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Smart Phone, Technology, Third - Party, Updates
Automotive Apps originally designed for Personal Owners cause headaches for rental agencies. Automotive companies designed apps to assist their car owners to easily access some of the features of their automobiles. However, during the design process, they failed to...
Feb 22, 2020 | Best Practices, Business, Business Email Compromise, Corporate Reputation, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Employees, Financial, Hackers, Human Element, Intellectual Property Theft, Nationstates, Networking, Organized Crime, Patching, Phishing, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Threats, Updates, Vulnerabilities
1.77 Billion – That is how much Businesses lost last year to Business Email Compromises One of the most significant cybersecurity dangers to Businesses is known as Business Email Compromise attacks. These types of attacks are carried out by cybercriminals and...
Feb 22, 2020 | Attack Vectors, Best Practices, Cyber Liability, Cybercrime, Cybersecurity, Elections, Government, Hackers, Hacking, Internet, logging, Malware, Mobile, Mobile Phones, Online Voting, Politics, Privacy, Radio Show, Radio_Show, Security, Security, Technology, Tracking, Voting Apps, Voting Technology, Vulnerabilities
Four States Use A Flaw Filled Mobile Voting App Creating a secure voting application is near to impossible. WIth hackers right on the tails of technology working to thwart every advantage, it will be a long while until we can create an app that could assure the...
Feb 22, 2020 | anonymity, Attack Vectors, Business, Compliance, cyberattacks, Cybersecurity, Internet, Iran, Nationstates, Networking, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Third - Party, Threats, Updates, VPN, VPN
Iranian Hackers Exploit VPNs Worldwide Last year major companies that make VPN servers were found to have security holes in them and now it appears according to a recent report that government cyber hackers from Iran have been exploiting these publicly announced...
Feb 22, 2020 | Applications, Audit Logs, Biological Viruses, Biological Warfare, Business, Compliance, Coronavirus, Covid-19, cyberattacks, Disaster Recovery, Employees, Government, HR, Incident Response, Internet, Market Value, Policies and Procedures, Radio Show, Radio_Show, Security, Technology
IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus Whenever there is a big story in the News you will find Cybercriminals willing and eager to exploit people using keywords and topics from news stories. With all the stories about the Coronavirus that...
Feb 22, 2020 | Applications, Applications, Best Practices, Big Tech, Business, Chrome Browser, Compliance, Cyber Liability, cyberattacks, Cybercrime, Employees, Extensions, Google, Google, Hacking, Internet, Location Data, Patching, Policies and Procedures, Radio Show, Radio_Show, records, Regulatory Compliance, Security, Security, Security Alerts, Technology, Threats, Tracking, Updates
Be Careful of Extensions on Chrome – Many found to Upload Your Private Data. Many companies provide extensions or plug-ins for the very popular Chrome browser. Unfortunately, some of these companies are shady and have ulterior motives that include grabbing your...