Nov 9, 2019 | anonymity, Applications, Audit Logs, audit logs, automation, Big Tech, Business, Cloud Vendors, Code-Breaking, Computers, Consumer, credentials, Cyber breaches, Data, Data Storage, Databases, Elections, Elections, Encryption, Government, Hackers, Hacking, Hard Disks, Internet, Legal, Machine Learning, Malware, Nationstates, Networking, Online Voting, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Updates, Voting Technology
Online Voting is a Disaster waiting to Happen If it is connected it can be hacked. The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...
Nov 9, 2019 | Android, Android, applications, Applications, Applications, Biography, Business, Cars, Coding, Consumer, Hacking, Hacking, Hacks, Internet, iOS, iPhone, Mapping, Mobile, Mobile Phones, Navigation, Patches, Patching, Phone, Phones, Radio Show, Radio_Show, safety, Security, Security Alerts, Smart Phone, Software Manufacturers, Technology, Third-Party, Tracking, Travel, Updates, vehicles
Powerful Apps allow Control for…. Ever! Many companies are creating apps and they are powerful. They are convenient and offer ease of use to their product lines. However, they may not have concidered the implications when not used in the manner that they...
Nov 9, 2019 | Applications, Best Practices, Business, gadgets, Hacks, Infosec, Internet, IoT, Liability, Networking, Patches, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, segmentation, Software, Technology, Third-Party, Updates, Updates
Oops —- We Designed Technology to be Unpatchable IoT or Internet of Things devices are becoming more and more popular. It seems that all types of items we never considered to require connectivity are now connected to the internet. They are constantly passing...
Nov 9, 2019 | ARPA, Business, Computers, Data, data sharing, Future Workforce, Government, Internet, Legacy, Military, Multitasking, Networking, Networking, Open Source, Projects, Radio Show, Radio_Show, Technology, Utilities
Technology idea that started 50 years ago but we rely on today It has taken 50 years to bring the network we know today as the internet to this point. In October 1969 the Advanced Research Projects Agency designed a network that research investigators could...
Nov 9, 2019 | Applications, Applications, Artificial Intelligence, Audit Logs, audit logs, automation, Best Practices, bluetooth, Business, cameras, cyberattacks, Cybercrime, Cybersecurity, Encryption, gadgets, Hackers, Hacking, Hacking, Health, Hospital, Infosec, Internet, IoT, Liability, Malware, Mobile Phones, Patches, Patching, Privacy, privacy, Radio Show, Radio_Show, safety, Security, Security, Security, Security, Security Alerts, segmentation, Smart Home, Software, Technology, Third-Party, Updates, Updates
Cybercrime is Zeroing in on Healthcare Organizations It seems that almost everything today is connected and more connections to the internet are made daily. One industry where this is more problematic is Healthcare. Why? Medical data is worth big bucks — up to...
Nov 9, 2019 | Anti-Virus, Best Practices, Big Data, Breaches, Business, CEO, Consumer, Cyber Insurance, cyberattacks, Cybercrime, Data, Equifax, Hackers, Hacking, Hacking, Hacking, Liability, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Updates
Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption Most of us do not have a choice when it comes to sharing our data with big data credit bureaus/respositories. They simply take all our information and re-sell it making huge...
Nov 1, 2019 | Business, Computers, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Hacking, industrial espionage, Intellectual Property Theft, Privacy, Radio Show, Radio_Show, safety, Security, Security, spying, Technology, Tracking
Little Inexpensive Devices Can Remove Sensitive Data Who has access to your offices? I am sure you are familiar with those little USB drives that are almost flat, to be undetectable when installed. Well, these under $20 devices can be connected in computers...
Nov 1, 2019 | Business, Hacking, Internet, Password Managers, Passwords, Privacy, Radio Show, Radio_Show, safety, Security
Common Password Vulnerabilities and How to Avoid Them There are a couple of interesting articles this week discussing one of my favorite subjects because it can make a significant impact on your security stance. Breaches that could result in data loss are the...
Nov 1, 2019 | Business, China, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Dark Web, Government, Hackers, Hacking, Hacking, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Nationstates, News, North Korea, Organized Crime, Privacy, Radio Show, Radio_Show, Regulation, Russia, safety, Security, spying, Surveillance, Technology
Cyber Cold War Right on Our Door Step Nation-State sponsored cybercrime is on the upswing. China, as an example, has an entire cyber army that it dispatches to US university programs and US businesses as well as to third party providers world-wide who offer...
Nov 1, 2019 | BBC, Big Tech, Business, Censorship, Government, Internet, Networking, News, Politics, Privacy, Radio Show, Radio_Show, safety, spying, Surveillance, Technology, Tracking
International News Hits the Dark Web Privacy is paramount, and it is one reason that the US government designed and implemented the TOR project. Now there is another reason, and that is preventing censorship of thought. That is the main reason that major...