Jun 29, 2019 | Backup, Business, Cyber breaches, Cybersecurity, Data, Databases, Liability, Malware, Privacy, Radio Show, Radio_Show, Security, Software As A Service
Cyber Breaches — How Far Does Your Liability Extend? It seems like we read about a major data breach occurring almost every other day. From credit card information and PIN codes stolen from some of the largest retailers in America to very personal health...
Jun 29, 2019 | Advertising, Breaches, cell phones, Cybersecurity, Hacking, iPad, Malware, Phones, Privacy, Radio Show, Radio_Show, Security, Security, Smart Phone, Software, Software Manufacturers, Tablet, Technology, Tracking
Is That App On Your SmartPhone Safe? Maybe Not! High-risk vulnerabilities are common across both Android and iOS mobile apps, with Android devices slightly more at risk than their iOS counterparts (43% vs. 38%), according to Positive Technologies’...
Jun 29, 2019 | Artificial Intelligence, Artificial Intelligence, Computers, Cybersecurity, Education, Hacking, Radio Show, Radio_Show, Security, Software, Technology
We Will Need 3.5 Million Cybersecurity Professionals by 2021 and They Won’t Come Out Of Our Colleges Unfilled cybersecurity jobs are expected to reach 1.8 million by 2022, up 20% from 1.5 million in 2015, according to the Center for Cyber Safety and...
Jun 29, 2019 | Apple, browsers, Business, cell phones, Computers, Cybersecurity, Hacking, Intel, iPad, Laptops, Microsoft, Online, Passwords, Privacy, Radio Show, Radio_Show, Security, Security, Tablet, Technology
During Travel Is Your Data Safe from Snooping Eyes? Visual hacking—when someone can see information on your screen over your shoulder without your knowledge—is a major cybersecurity threat to business travelers, especially in the GDPR era, according to a Monday...
Jun 29, 2019 | Business, Cloud, Computers, Cybersecurity, data sharing, Malware, Privacy, Radio Show, Radio_Show, Security, Security, Technology
Who Is Your Biggest Cyber Liability? Maybe It Is Not Who You Think. If a poll were taken and the top threats to our national and cybersecurity were voted on, the usual suspects would be easy to name: China, Russia, North Korea, and Iran. You’d be half right....
Jun 22, 2019 | Breaches, Computers, Cybersecurity, Data, Data Storage, Databases, Law Enforcement, Legal, Privacy, Radio Show, Radio_Show, Security, Security, Technology
When Your Vendors Become A Cyber Liability If It’s Digital, It’s Hackable Customs and Border Protection failed to keep their photographic database of vehicular traffic crossing through US border crossings safe. It involved a single lane at one...