Nov 23, 2019 | Blogging, Business, Consumer, Employees, Employment, Facebook, Google, Hacking, Identity Theft, Imposter Sites, Internet, LinkedIn, Radio Show, Radio_Show, Security, Technology
Hiring and Issues with Scam Online Applications With the economy buzzing along and employment at a full time high — finding workers for seasonal part time employment is getting harder and harder. However, these employers are now having to compete with...
Nov 23, 2019 | Banking, Banking, Big Tech, Big Tech, Business, Cashless, Facebook, Facebook, Financial, Gifts, Internet, Online, Radio Show, Radio_Show, Shopping, Social Networking, Technology
Another “Pay–ment” System Introduced Contactless payment solutions are becoming quite popular and now Facebook will be launching their version, Facebook Pay. Although not used like the current other contactless systems, you will be able to use it on all their...
Nov 23, 2019 | Advertising, Android, Big Tech, Black Friday, Business, Cell Phone, Cyber Monday, Cybercrime, Financial, Gifts, Hackers, Hacking, Hacking, Internet, iPhone, Liability, Online, Passwords, Patching, Phishing, Phone, Phones, Privacy, Radio Show, Radio_Show, Retail, Security, Security Alerts, Shopping, Smart Phone, Technology, Updates
Hand in Hand On Black Friday — Shopping and Privacy Black Friday is almost upon us! The day that retailers finally able to move from a red accounting register on to the black and it is always met with sales and loss leaders (great prices but not for the...
Nov 23, 2019 | Advertising, Black Friday, Business, Consumer, credentials, Cyber Monday, Cybercrime, Family, Gifts, Identity Theft, Imposter Sites, Internet, Online, Patching, Phishing, Phishing, Phones, Radio Show, Radio_Show, Retail, Security, Security Alerts, Updates
Imposter Retailers Outnumber Legitimate Ones Are you ready for the extreme online shopping season! While you can purchase items online anytime, holiday e-commerce sales reached $126 billion last year with Cyber Monday online purchases generating $7.9 billion...
Nov 16, 2019 | 2FA, Best Practices, Business, Computers, credentials, Cyber breaches, cyberattacks, Cybersecurity, Employees, Employees, Hacking, Hacking, hardware token, Internet, Laptops, Malware, MFA, Phishing, Radio Show, Radio_Show, Security, Security, Technology
Best Practices in Authentication Still Mostly Ignored By Businesses How do cybercriminals breach into corporate systems? They use many tactics but on of the easiest is through the use of compromised credentials. The problems is that these are real valid credentials...
Nov 9, 2019 | Best Practices, Business, Computer Repair, Contractors, Cybersecurity Professional, CyberTraining, Employees, Employees, Employment, Future Workforce, Internet, IT Professional, Psychology, Radio Show, Radio_Show, Security, Security, Stress, Technology
Job Dissatisfaction is prominent among IT Security Professionals Many Cybersecurity professionals love a challenge. They do not enjoy the doldrums of make work security. They long for excitement and challenging work. They are in demand so it is not suprising...