Jul 27, 2019 | Data, Encryption, Government, Monitoring, Privacy, Radio Show, Radio_Show, Regulation, Security, Technology
Encrypting Your Data – Reward or Risk? Attorney General William Barr said Tuesday that increased encryption of data on phones and computers and encrypted messaging apps are putting American security at risk. Barr’s comments at a cybersecurity conference...
Jul 27, 2019 | Business, CEO, Cybercrime, CyberTraining, Employees, Hackers, Hacking, LinkedIn, LinkedIn, Organized Crime, Radio Show, Radio_Show, Smart Phone, Social Networking, Technology
Business leaders use Social Media, too. And LinkedIn is now being used to attack us on an unprecedented scale. But this is different. Social Media is no longer about tweens, teens, and college students. It’s at the point now where most adults find it hard to...
Jul 20, 2019 | Blogging, Business, Cybercrime, Cybersecurity, CyberTraining, data sharing, Email, Employees, Facebook, Facebook, Generation-Y, Google, Hackers, Hacking, Internet, LinkedIn, LinkedIn, Malware, Monitoring, Pinterest, Privacy, Radio Show, Radio_Show, Social Media, Social Networking, Technology, Tracking, Twitter, Twitter, YouTube
Are you or your employees giving away the keys to your kingdom? The magnetism of Social Media If you have teens and you will understand the magnetism that social media seems to have over them. However, it is not only teens, but almost our entire society is...
Jul 6, 2019 | 2FA, Best Practices, Breaches, Business, Cloud, Internet, O365, Radio Show, Radio_Show, Security, Software Manufacturers, Technology
O365 Non-Security – again The US Cybersecurity and Infrastructure Security Agency (CISA) has become the latest government body to plead with admins to implement security best practices on Microsoft’s Office 365 platform. The UK’s National...
Jun 29, 2019 | 2019, browsers, Business, Computers, Cybersecurity, Hacking, Internet, News, Radio Show, Radio_Show, Security, Technology
Be Careful What You Browse — Drive-By Malware on the Rise An ongoing operation that’s installing ransomware and other malware on the computers of unsuspecting website visitors is one of the most potent drive-by attack campaigns researchers have seen in...
Jun 29, 2019 | 2019, Breaches, Business, Computers, Government, Internet, News, Radio Show, Radio_Show, Security, Technology
Are You Ready? Iranian Cyber Counter Attacks U.S. businesses should get ready for a barrage of digital retaliation from Iran after the Trump administration launched a cyber attack against the Islamic Republic’s rocket and missile launching systems, current, and...