May 16, 2020 | Applications, Biological Viruses, Business, Coronavirus, Covid-19, Education, Internet, Internet Infrastructure, Quarantine, Radio Show, Radio_Show, Remote Learning, Remote-Work, Security, Security, Stress Test, Technology, telecommuting
Internet Backbone Holding its Own with Increase of Remote Work and Virtual Schooling Stay at home orders have forced a majority of the US population home to work and educate their children. That means a lot of time being spent on the internet, working, learning, and...
May 9, 2020 | Business, Children, Education, Elementary School, Family, Grade School, High School, High School, Radio Show, Radio_Show, Remote Learning, Robotics, Science, Technology, Technology, Toys
Calling Future Engineers – Dyson Provides Free Experiments for Kids Engineers at Dyson, along with the James Dyson Foundation has created and released engineering and science experiments for you to use. It is a free set of 44 different creative learning projects...
Mar 28, 2020 | Amazon Prime, AppleTV, Business, Covid-19, DisneyPLus, Europe, European Union, HULU, Internet, Internet Infrastructure, Netflix, Pandemic, Quarantine, Radio Show, Radio_Show, Remote Learning, Remote Work, Security, Social Distancing, Streaming Entertainment, Stress Test, Technology
EU Government Ask Streaming Content Companies to Reduce Quality The internet infrastructure is undergoing a major stress test. With a majority of businesses under social distancing requirements, they had no choice but to have their employees work remotely from their...
Feb 29, 2020 | Applications, Best Practices, Big Tech, Business, COPPA, Data Aggregator, Data Brokers, data sharing, Education, Elementary School, Future Workforce, Google, Google, Grade School, High School, High School, Information Technology, Internet, Legal, Liability, Location Data, Machine Learning, predictive algorithms, Psychology, Radio Show, Radio_Show, Resources, School Districts, Schools and Colleges, Security, Security, Software Manufacturers, Technology, Tracking
Big Tech taking Advantage of Our Kids Technology costs money. The sooner that everyone learns this the safer we will be. There is no way to offer technology services for free you will pay some way. For many that cost comes through the loss of private information....
Jan 18, 2020 | Applications, Best Practices, Business, Business Email Compromise, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, Economic Disruption, Education, Employee Training, Employees, Employment, Exploits, Fines and Penalties, Government, Hackers, Hacking, Hacks, Insider Threat, Internet, Malware, MFA, Nationstates, Organized Crime, Phishing, Phishing, Phishing, Policies and Procedures, Radio Show, Radio_Show, scam, Security, Security, Smishing, Social Engineering, Social Media, Social Media, Social Networking, Technology, Threats, Tracking
Social Engineering Comes to the Forefront of Attacks We depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...