May 16, 2020 | Applications, Best Practices, Business, Collaboration Tools, Encryption, Human Element, Internet, Internet Infrastructure, M&A, Marketshare, Messaging, Radio Show, Radio_Show, Security, Security, Security Alerts, Stress Test, Technology, Technology, Zoom
Encryption Wars: Collaboration Services Acquire to Compete for Marketshare The pandemic laid bare the vulnerabilities are some popular business collaboration platforms. Usage of these platforms surged during the coronavirus pandemic as more businesses began to rely...
May 9, 2020 | Aftereffects, Biological Viruses, Business, Coronavirus, Covid-19, Covid-19, Pandemic, Quarantine, Radio Show, Radio_Show, Real Estate, Security, Technology
The Diminished Necessity for Office Real Estate for Post-COVID Businesses For a majority of the population, this pandemic introduced a massive change in the way we work. Telecommuting previously frowned upon by executives is now commonplace. Although not planned, the...
May 2, 2020 | Applications, Business, Data, Hospital, Internet, IoMT, Medical, Radio Show, Radio_Show, Security, Technology
Medical IoT Prone to Security Challenges Hospitals are busy places, and anytime they can save time or make something more natural, they try to do so. Medical device companies are adding applications and creating real products to solve medical issues. Medical IoT...
Apr 18, 2020 | Best Practices, Business, Consumer, CoronaVirus, Covid-19, Cybercrime, Hackers, Hacking, Identity Theft, Internet, Online, Pandemic, Phishing, Privacy, Quarantine, Radio Show, Radio_Show, Retail, Sales, scam, Security, Security, Shopping, Social Distancing, Technology
Payment Card Skimming is Up during Pandemic forced Online Shopping During the pandemic people have basically stopped going to the local malls to shop and this has forced an increase the number of purchases they make on-line. Well guess what cybercriminals are not...
Apr 18, 2020 | Best Practices, Business, Computers, Expose Client Functions, File Deletion, Hewlett Packard, Radio Show, Radio_Show, Security, Security, Software, Software Manufacturers, Support Assistant Utility, Technology, Vulnerabilities
HP Computers Vulnerable to Attack Have you purchased an HP Computer for you home or business? Turns out that their pre-installed Support Assistant Utility is quite insecure by design. It is capable of exposing 250 client functions and is filled with vulnerabilities...