Dec 4, 2020 | Agencies, Amazon, Amazon platform, Anti-Virus, Attack Vectors, Best Practices, Big Tech, cyberattacks, Facial Recognition, Google, Government, Incident Response, Information Technology, Internet, IRS, Malware, Radio Show, Radio_Show, Ransomware, School Districts, Security, Show Notes, Technology, Third-Party resellers
Tech Talk Show Notes November 29 – December 5, 2020 Gaming Over the Holidays? 7 Important Security Tips It’s the most wonderful time of the year for hackers to target home gamers. Gamers are typically on the younger side and more trusting and comfortable...
Apr 18, 2020 | Anti-Virus, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Big Tech, browsers, Business, Cloud, Cloud, Compliance, Computers, Cyber breaches, Cyber Insurance, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Loss, Data Storage, Databases, Domain Name Service, Incident Response, industrial espionage, Information Technology, Internet, Internet Infrastructure, Networking, Patches, Patching, Privacy, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, Updates, Updates, Web Tools
Time to Invest in Cybersecurity Every company no matter the size is at high risk for a cyberattack. With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime. Much...
Apr 4, 2020 | Anti-Virus, Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, compromised machines, Critical data, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Firewalls, Hackers, Hacking, Hacking, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Legacy Systems, Malware, Monitoring, Nationstates, Networking, Organized Crime, Patching, Phishing, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Routers, Security, Security Alerts, Smishing, Surveillance, Technology, Technology, trojans, Updates, Vishing, VPN
How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Mar 21, 2020 | Anti-Virus, Attack Vectors, Biological Viruses, Business, CoronaVirus, Coronavirus, Government, Internet, Malware, News, Phishing, Radio Show, Radio_Show, Security, Signature-Based, Technology, Zero-Day
Malware Infecting PC’s of Those Just Wanting More Coronavirus Infection Information Cybercriminals are constantly changing their tactics and creating new ways to spread their malware to hack and exploit users. With the coronavirus acting as a pandemic and spreading...
Mar 7, 2020 | Anti-Virus, Attack Vectors, Best Practices, Business, Cyber Liability, Cybercrime, Data Loss, Data Storage, Executives, Exploits, Hacking, Hacking, Hacking Tools, Internet, Operating Systems, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, scam, Security, Security, Security Alerts, Security Assessments, Security Services, Technology, Updates
You Don’t Have Much Time To Stop An Attack How much time do you have to secure your systems from a zero-day infection? Would it surprise you to learn that it is less than 72 hours? It is true. Locking down your systems from new vulnerabilities is essential. But just...
Feb 1, 2020 | Access Controls, Anti-Virus, Applications, Attack Vectors, Audit Logs, Best Practices, Business, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Disaster_Preparedness, Hackers, Hacking, Hacking, Incident Response, Legacy Systems, Liability, Malware, Monitoring, Operating Systems, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Updates, Zero-Day
Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure. Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered. That means that they were not designed...