Dec 7, 2019 | Attack Vectors, Business, Hacking, Incident Response, Internet, Radio Show, Radio_Show, Security, Technology
January’s Coming – Do You Have An Incident Response Plan If you have a Massachusetts based business or do business in the State of Massachusetts there are some big changes coming your way in January 2020. Last year Massachusetts instituted some changes to...
Dec 7, 2019 | Business, Cell Phone, cell phones, Cellular Services, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, iPhone, Mobile Phones, Phone, Radio Show, Radio_Show, Security, Smart Phone, T-Mobile, Technology
Call 611 Now — Hackers Breach 1M Cellular Customers Cybercriminals will go after anyone who has an expolitable vulnerability. Businesses must work to protect themselves and must put into place an incident response plan along with a disaster recovery plan...
Dec 7, 2019 | Biometrics, Business, credential stealing, Employees, Facial Recognition, Radio Show, Radio_Show, Security, Technology
The Convenience of Facial Recogition is not All Its Cracked Up to Be As technologies advance many of them are sold to us as a convenience. Nowhere is this more evident as in the whole face recognition for security arena. Think about how much trouble companies...
Nov 30, 2019 | Business, Hospital, Internet, Medical Research, Medicine, predictive algorithms, Radio Show, Radio_Show, Security, Security, Technology
Is Machine Learning pushing Healthcare or Healthcare pulling in Machine Learning The healthcare industry is rapidly utilizing the advancements in machine learning to evaluate and aid humans in processing the vast and complex medical datasets and then analyze...
Nov 30, 2019 | Best Practices, Business, China, Cyber breaches, Cybersecurity, Data, Economic Disruption, Hacking, Internet, Iran, Nationstates, North Korea, password spraying, Phishing, Phishing, Phishing, Privacy, Radio Show, Radio_Show, Russia, Security, Security, Security, Software, Technology, Vulnerabilities
Nation-State Cybecriminals and Economic Disruption Nation-state cybercriminals from Russia, China, North Korea, and Iran are attacking all parts of US society. They are attacking anything and everything that will disrupt our economy. They will attack our...
Nov 30, 2019 | Agencies, Business, China, Cybercrime, DARPA, DOD, Drones, Government, Hackers, Hacking, Hacking, Internet, Iran, Machine Learning, Military, Monitoring, Nationstates, Patching, Privacy, Projects, Radio Show, Radio_Show, Russia, Security, Security Alerts, Software Manufacturers, Technology, third-world, Threats, Updates, Warfare
The Road To Machine Learning Wars How we fight wars is changing and changing in a big way. With the advancement of technology, conducting our battles will be done with speed and accuracy unavailable today, and we will be facing wars driven by machine learning...
Nov 30, 2019 | Attack Vectors, Best Practices, Business, iMessage, Internet, iPhone, Mobile, Phone, Privacy, Radio Show, Radio_Show, Security, Security, SMS, Technology, Text Messages, Threats
Privacy, Security and SMS How many times a day do you send text messages? Do you even think about security when you do so? Most people don’t consider that all information contained within them is not private. That means that your short messages might be read...
Nov 30, 2019 | Business, Data, Data Storage, Incident Response, Internet, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Security, Technology, Vulnerabilities
Upping your Incident Response Game — New Regulations coming If you are a business and you have data on any Massachusetts resident or do business in Massachusetts, coming in early January, there are new data collection requirements with which you will need...
Nov 30, 2019 | Business, Computers, Cyber breaches, cyberattacks, Cybercrime, Data Storage, Employees, Firewalls, Hackers, Hacking, Hacking, Hacking, Insider Threat, Intellectual Property Theft, Internet, Malware, Malware, Networking, Networking, Patching, Privacy, Radio Show, Radio_Show, Routers, Security, Security Alerts, segmentation, Technology, Updates, Vulnerabilities
Why Zero Trust Is the Answer to Internet Everywhere Connections Everyone everywhere has a mobile device, and connections to the internet are available whenever we want it. In our connected world, it means that keeping your businesses secure means fighting a...
Nov 30, 2019 | Anti-Virus, Best Practices, Big Tech, Business, Consumer, credentials, Cyber breaches, Cybercrime, Employees, Employment, Hackers, Hacking, Identity Theft, Insider Threat, Radio Show, Radio_Show, Security, Security, Technology, Vulnerabilities
Cybercriminals return to old-school ID theft tactics As security professionals come up with new protocols and software to protect companies and businesses implement them, hackers are finding themselves thwarted. So many of these cybercriminals are going...