Overcoming the Critical Cybersecurity Talent Shortage

Overcoming the Critical Cybersecurity Talent Shortage

Overcoming the Critical Cybersecurity Talent Shortage Businesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...
Thank you Coronavirus – Governments Are Watching Us

Thank you Coronavirus – Governments Are Watching Us

Thank you Coronavirus – Governments Are Watching Us Quarntines are meant to help control those who are capable of infection from interacting with the general populace.  It is not meant to curtail all economic activity of the society. With this pandemic,...
Contact Tracing = Limited Privacy

Contact Tracing = Limited Privacy

Contract Tracing = Limited Privacy Inital projected models for the spread of this novel virus were designed specifically to ramp up fear. Big Tech and Governments are working on ways to try to control the spread of a pandemic that frankly is really not much worse than...
Conspiracy Theorists Grasping at 5G

Conspiracy Theorists Grasping at 5G

Conspiracy Theorists Grasping at 5G   There are always those who will believe the most phenomenal theories when they someone with scientific authority says comments on it.  That is the case with the conspiracy theory that the radiation from 5G cell towers creates...
Pandemic Customers Buy but Amazon Can’t Deliver

Pandemic Customers Buy but Amazon Can’t Deliver

Pandemic Customers Buy but Amazon Can’t Deliver With our shopping abilities deeply curtailed by this forced government self-isolation to prevent the spread of COVID-19, we have turned to those who can supply our needs through online shopping.  Turns out that for many...
Hijacked Routers – Securing Them Requires Password Reset

Hijacked Routers – Securing Them Requires Password Reset

Hijacked Routers – Securing Them Requires Password Reset Hackers have found a way to hijack user accounts and change the user settings on Linksys routers that use Smart WiFi accounts. When this is done users are now redirected them to malware sites. The Smart...
Your Zoom Account is Worth One ‘Copper’ to Hackers

Your Zoom Account is Worth One ‘Copper’ to Hackers

Your Zoom Account is Worth One ‘Copper’ to Hackers Zoom has gained popularity during this pandemic’s require shelter in their homes. However its widespread use has unveiled to many the privacy and security issues inherent in this platform. These inherent...
Can America Compete? US iPhone vs Chinese iPhone

Can America Compete? US iPhone vs Chinese iPhone

Can America Compete? US iPhone vs Chinese iPhone We should be manufacturing the products we use in America. American companies can compete with China and it actually would not be that much more expensive.  For years we have heard about the Global supply chain but when...
Tencent: The biggest name in Entertainment

Tencent: The biggest name in Entertainment

Tencent: The biggest name in Entertainment Tencent is a Chinese entertainment conglomerate who buys up every type of entertainment they can. These entertainments include movies, video games, music, comic books and even technology including messaging services that have...
Pandemics breed criminal scams and exploits

Pandemics breed criminal scams and exploits

Pandemics breed criminal scams and exploits Mules are a common way for criminals to move their merchandise or ill-gotten gains around.  Whenever there is something big in the news, you can bet that there will be criminals who will exploit it.  It has never been more...