Jan 18, 2020 | Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, Computers, credentials, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Economic Disruption, Employees, Government, Hackers, Hacking, Hacking, Intellectual Property Theft, Internet, Iran, Nationstates, Passwords, Patching, Phishing, Radio_Show, safety, Security, Security Alerts, spying, Technology, Third - Party, third-world, Updates, Updates, Vulnerabilities, Wiper Malware
Cyber War isn’t Coming It is already Here! Wars today are less likely to be kinetic, and it is safe to assume that the primary mode of retaliation from Iran will be a cyber attack. Iran wants to bring down the U.S., and the fastest way to do that is to damage us...
Jan 11, 2020 | Business, cyberattacks, Cybercrime, Cybersecurity, Government, Hackers, Hacking, Intellectual Property Theft, Iran, Nationstates, Patching, Radio Show, Radio_Show, Security, Security Alerts, Updates, Vulnerabilities, Wiper Malware
Zeroing In On our Industrial Control Systems The country of Iran has been recruiting and training an army of cyberhackers and developing digital tools that can disruptively sabatoge entire computer networks. Now they are focusing their efforts on SCADA systems often...
Jan 11, 2020 | Anti-Virus, Applications, Attack Vectors, Best Practices, Business, Computers, Cybercrime, Cybersecurity, Data, Hackers, Hacking, Incident Response, Internet, Legacy, Legacy Systems, Malware, Passwords, Patches, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Compliance, Security, Security, Security Assessments, Software, Technology, Updates, Vulnerabilities, Zero-Day
Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...
Jan 11, 2020 | Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Backup, Business, CEO, Cloud, Cloud Provide, Cloud Vendors, Compliance, Computers, Cyber breaches, Cyber Insurance, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data, Data Assets, data sharing, Data Storage, Databases, Employees, Fines and Penalties, Government, Hacking, Hacking, Incident Response, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Machine Learning, Malware, Managed Security Services Provider (MSSP), Microsoft, Networking, Operating Systems, Patching, predictive algorithms, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates, Vulnerabilities
Cloud Migration Considerations to Take into Account Deciding to move to business technology services to “the Cloud” is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest...
Jan 4, 2020 | Advertising, Applications, Attack Vectors, brain development, Brain Fitness, Business, cyberattacks, Cybercrime, Cybersecurity, Data, Exploits, Facebook, Google, Hackers, Hacking, Hacks, Health, Infosec, iOS, Malware, Mental Fatigue, Mobile, Mobile Phones, Nationstates, Patching, Ransomware, Security, Security Alerts, spying, Tracking, Updates, Vulnerabilities
Pesky Apps That You Need To Delete ASAP Not all Apps are Good Apps… Depressive Apps. With everyone curating an unrealistic, heavily manufactured, idealized version of their lives, we all start to believe other people’s lives are so much better than...
Dec 19, 2019 | Anti-Virus, Attack Vectors, Business, Cybersecurity, Firewalls, Internet, Malware, Networking, Radio Show, Radio_Show, Security, Signature-Based, Technology, VPN, Vulnerabilities
Signature Anti-Virus does not adequately protect you from today’s Malware Today’s malware acts much differently and can disguise itself more effectively than previous generations of malware. The designs of most anti-virus do not take that into...