Feb 8, 2020 | Applications, Big Tech, Business, Cloud, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, Malware, Microsoft, Microsoft, Nationstates, Radio Show, Radio_Show, Russia, Security, Security Alerts, Technology, third-world, Windows (Microsoft)
“Evil Corp” really does exist, and it’s distributing malware using Microsoft Excel Yes, there is an Evil Corp, and it is a Russian backed group of Cybercriminals. They are busy weaponizing Microsoft’s popular spreadsheet package, Excel, so that it...
Feb 8, 2020 | Apple, Apple, Attack Vectors, Best Practices, Big Tech, Business, Computers, Corporate Reputation, Cybersecurity, Data Assets, Data Storage, Exploits, FBI, Government, Hacking, Internet, iOS, Mobile, Mobile Phones, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Security First, Surveillance, Technology
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups. Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Feb 8, 2020 | Best Practices, Business, CEO, Corporate Reputation, Cybercrime, Cybersecurity, Economic Disruption, Employees, Executives, Executives, Extortion, Hackers, Hacking, ID Theft, industrial espionage, Internet, Nationstates, Organized Crime, Radio Show, Radio_Show, Security, Security, Technology, third-world, Uncategorized
Our Personal and Brand Reputations are At-Risk By Nation-States Nation-States are no longer interested in just disrupting our politics. Not much money in that. With armies of cybercriminals, nation-states are going after our businesses with the goal of economic...
Feb 8, 2020 | Applications, Attack Vectors, Best Practices, Business, Cloud, Compliance, Cyber Liability, Data Storage, Databases, Hacking, Internet, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, spying, Technology, Third - Party, Third-Party, Updates
Do You Use Trello? Search turns up massive trove of private data Do you use Trello? It is an excellent collaboration platform that I use with my team. It can be an excellent tool for project collaboration. However, it must get set up correctly if you want to...
Feb 1, 2020 | Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, DeepFake, Employees, Employees, Hackers, Hacking, Hacking, HR, Human Element, Identity Theft, industrial espionage, Insider Threat, Internet, Malware, Malware, MFA, Patching, Phishing, Phishing, Psychology, Radio Show, Radio_Show, Security, Security Alerts, Social Engineering, Technology
Most Businesses Attacked By Business Email Compromise Last Year 2019 was the year for Business Email Compromises also known as BEC attacks. In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....
Feb 1, 2020 | Access Controls, Anti-Virus, Applications, Attack Vectors, Audit Logs, Best Practices, Business, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Disaster_Preparedness, Hackers, Hacking, Hacking, Incident Response, Legacy Systems, Liability, Malware, Monitoring, Operating Systems, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Updates, Zero-Day
Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure. Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered. That means that they were not designed...
Feb 1, 2020 | Best Practices, Biometrics, Business, Cyber breaches, cyberattacks, Data Brokers, Data Storage, Databases, Facial Recognition, Facial Recognition, False Positives, Hacking, Hacking, ID Theft, Internet, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Social Networking, Technology, Unsecured
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption Facial Recognition is not a perfect technology and still needs some time before being widely used in societal applications until we get our hands around the issues of privacy, safety and...
Feb 1, 2020 | Business, Government, Incident Response, Intricate Data Systems, Patching, Radio Show, Radio_Show, Ransomware, Security, Security Alerts, Skyrocketing Ransoms, Social Engineering, Technology, Updates
Downtime and Costs Double as Ransomware Attacks Hit Larger Businesses New and sophisticated ransomware attacks are being perpetrated on all types of businesses including large companies and government entities. This deep pocket targets are driving the costs up by...
Feb 1, 2020 | Attack Vectors, Audio-Visual Data, Best Practices, Biometrics, Business, Corporate Reputation, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, CyberTraining, DeepFake, Employees, Employees, Executives, Extortion, Hackers, Hacking, Hacking, Human Element, Impersonation, Incident Response, industrial espionage, Internet, Market Value, Marketing Manipulation, Patching, Radio Show, Radio_Show, records, scam, Security, Security, Security Alerts, Social Engineering, Technology, Updates
Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations. Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...
Feb 1, 2020 | Applications, Audit Logs, Business, Compliance, Cybersecurity, Data Assets, Databases, Fines and Penalties, Government, Hacking, Incident Response, industrial espionage, Legislation, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Compliance, Regulatory Frameworks, Security, Security Alerts, Security Assessments, Technology, Updates
Regulatory Compliance: The Perception and The Reality Regulatory compliance. We have all heard the term and for many business owners, the way to handle it is to stick their head in the sand and stay out of the spotlight. Why? It is complicated and expensive and they...