Feb 1, 2020 | Business, Government, Incident Response, Intricate Data Systems, Patching, Radio Show, Radio_Show, Ransomware, Security, Security Alerts, Skyrocketing Ransoms, Social Engineering, Technology, Updates
Downtime and Costs Double as Ransomware Attacks Hit Larger Businesses New and sophisticated ransomware attacks are being perpetrated on all types of businesses including large companies and government entities. This deep pocket targets are driving the costs up by...
Feb 1, 2020 | Applications, Audit Logs, Business, Compliance, Cybersecurity, Data Assets, Databases, Fines and Penalties, Government, Hacking, Incident Response, industrial espionage, Legislation, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Compliance, Regulatory Frameworks, Security, Security Alerts, Security Assessments, Technology, Updates
Regulatory Compliance: The Perception and The Reality Regulatory compliance. We have all heard the term and for many business owners, the way to handle it is to stick their head in the sand and stay out of the spotlight. Why? It is complicated and expensive and they...
Feb 1, 2020 | anonymity, Applications, Applications, apps, Attack Vectors, audit logs, Best Practices, Business, CEO, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Executives, Executives, Extortion, Hackers, Hacking, Hacking, Internet, Location Data, Malware, Monitoring, Phishing, Phishing, Phone, Phones, privacy, Radio Show, Radio_Show, Security, Security, Smart Phone, Software, Surveillance, Technology, third-world, Video
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack Who are you hiring? Did you do your due diligence? I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince. ...
Jan 25, 2020 | anonymity, Business, Employees, Employment, Hacking, HR, Internet, Location Data, Monitoring, Monitoring, Privacy, Radio Show, Radio_Show, Security, spying, Surveillance, Technology, Tracking
What Does Your Employer Know About Your Daily Activities How much does your employer know about your personal life? Maybe more than you realize. When you use your personal devices to access company servers they can log your activities. Then they can track when you log...
Jan 25, 2020 | Big Tech, Biometrics, Business, Data, Databases, Facial Recognition, Location Data, Monitoring, Privacy, Radio Show, Radio_Show, Security, Software, Software Manufacturers, Technology, Tracking
Privacy Gone: Tech Start-up Has Huge Facial Recognition Database What if I told you that there was a biometric artificial intelligence program that might end privacy as we know it… would you believe me? What if I told you that the company that developed it was...
Jan 25, 2020 | Apple, Apple, Best Practices, Big Tech, Business, FBI, Government, iOS, iPhone, Phone, Privacy, Radio Show, Radio_Show, Security, Security, Security First, Smart Phone, Technology
Security First, Apple Stands Ground on iPhone Encryption The Apple iPhone platform is based on security first. It is designed to be secure and private. To do that they use a proprietary encryption system. While there have been private companies who have tried to...