Jan 28, 2024 | Anti-Virus, Microsoft
Welcome back, folks! It’s time to talk about something crucial in this digital world we live in: keeping our beloved Windows safe from those pesky cybercriminals. With so many security options out there, it can be a real head-scratcher trying to figure out which...
Feb 19, 2023 | Anti-Virus, Ask Craig, Backdoors, Data Loss, Disaster Recovery, WGAN, WGIR, WTAG
The internet is a double-edged sword – on the one hand, it provides us with vast amounts of information, entertainment, and resources at our fingertips. Still, on the other, it is also home to many threats like viruses, malware, spyware, and other forms of malicious...
Mar 5, 2021 | Access Controls, anonymity, Attack Vectors, Best Practices, Big Tech, Breaches, Business, Chromebook, Coinseed, Compliance, CPU, CPU, credentials, Cryptocurrency, Cyber Liability, Cybersecurity, Google, Government, Hacking, Internet, Malware, News, Passwords, Patching, Podcast, Radio Show, Radio_Show, Security, Security, Show Notes, Social Media, Social Media, Social Networking, SolarWinds, Technology, Updates, Vulnerabilities, WhatsApp, Zero Trust
Read. Learn. Share. Tech Talk Show Notes March 6, 2021 Embracing a Zero Trust Security Model As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the...
Feb 26, 2021 | Advertising, Anti-Virus, Apple, Apple, Automation, Automotive, Best Practices, Big Tech, Biological Viruses, browsers, Business, cell phones, Chrome, Chrome Browser, Computers, Coronavirus, Covid-19, Cyber breaches, Cybercrime, CyberTraining, Electric Grid, Employee Training, Employees, Encryption, Energy, Environment, Google, Google, Government, Hackers, Hacking, Hacks, Internet, MacBook, Malware, Malware, News, Phishing, Phishing, Podcast, Privacy, Radio Show, Radio_Show, Security, Security, Show Notes, Smishing, Spyware, Sustainable fuels, Technology, trojans, Vishing, Zero-Day
Read. Learn. Share Tech Talk Show Notes February 27, 2021 This Basic Math Shows How Wind Energy Failures Contributed To Texas’s Deadly Power Loss Why did Texas lose power? Math — apolitical, non-ideological, and sometimes cruel math. During such an extreme cold for...
Dec 4, 2020 | Agencies, Amazon, Amazon platform, Anti-Virus, Attack Vectors, Best Practices, Big Tech, cyberattacks, Facial Recognition, Google, Government, Incident Response, Information Technology, Internet, IRS, Malware, Radio Show, Radio_Show, Ransomware, School Districts, Security, Show Notes, Technology, Third-Party resellers
Tech Talk Show Notes November 29 – December 5, 2020 Gaming Over the Holidays? 7 Important Security Tips It’s the most wonderful time of the year for hackers to target home gamers. Gamers are typically on the younger side and more trusting and comfortable...
Apr 18, 2020 | Anti-Virus, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Big Tech, browsers, Business, Cloud, Cloud, Compliance, Computers, Cyber breaches, Cyber Insurance, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Loss, Data Storage, Databases, Domain Name Service, Incident Response, industrial espionage, Information Technology, Internet, Internet Infrastructure, Networking, Patches, Patching, Privacy, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, Updates, Updates, Web Tools
Time to Invest in Cybersecurity Every company no matter the size is at high risk for a cyberattack. With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime. Much...
Page 1 of 5123...5...NEXT»Last »