Dec 7, 2019 | Android, Attack Vectors, Business, Cybercrime, Internet, Jailbreak, Mobile Phones, Patching, Phones, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, updates and patches, Vulnerabilities
Apple:1 Android:120 Android is not Android is not Android. That means that there are many many versions of the operating system that must be updated and it is why most Android devices are sorely out of date with security patches and operating system updates. ...
Dec 7, 2019 | Anti-Virus, Attack Vectors, Consumer, Family, FBI, Government, Hacking, Identity Theft, Internet, Monitoring, Radio Show, Radio_Show, safety, Security, Surveillance, Technology, TV
Smart TVs, Security and the FBI Did you go out on Black Friday and pick up a new television for the family? Chance are it was a “Smart TV.” Many TV manufacturers have jumped on the internet connected bandwagon to produce more convenience by including one-stop...
Nov 30, 2019 | Best Practices, Business, China, Cyber breaches, Cybersecurity, Data, Economic Disruption, Hacking, Internet, Iran, Nationstates, North Korea, password spraying, Phishing, Phishing, Phishing, Privacy, Radio Show, Radio_Show, Russia, Security, Security, Security, Software, Technology, Vulnerabilities
Nation-State Cybecriminals and Economic Disruption Nation-state cybercriminals from Russia, China, North Korea, and Iran are attacking all parts of US society. They are attacking anything and everything that will disrupt our economy. They will attack our...
Nov 30, 2019 | Business, Data, Data Storage, Incident Response, Internet, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Security, Technology, Vulnerabilities
Upping your Incident Response Game — New Regulations coming If you are a business and you have data on any Massachusetts resident or do business in Massachusetts, coming in early January, there are new data collection requirements with which you will need...
Nov 30, 2019 | Business, Computers, Cyber breaches, cyberattacks, Cybercrime, Data Storage, Employees, Firewalls, Hackers, Hacking, Hacking, Hacking, Insider Threat, Intellectual Property Theft, Internet, Malware, Malware, Networking, Networking, Patching, Privacy, Radio Show, Radio_Show, Routers, Security, Security Alerts, segmentation, Technology, Updates, Vulnerabilities
Why Zero Trust Is the Answer to Internet Everywhere Connections Everyone everywhere has a mobile device, and connections to the internet are available whenever we want it. In our connected world, it means that keeping your businesses secure means fighting a...
Nov 30, 2019 | Anti-Virus, Best Practices, Big Tech, Business, Consumer, credentials, Cyber breaches, Cybercrime, Employees, Employment, Hackers, Hacking, Identity Theft, Insider Threat, Radio Show, Radio_Show, Security, Security, Technology, Vulnerabilities
Cybercriminals return to old-school ID theft tactics As security professionals come up with new protocols and software to protect companies and businesses implement them, hackers are finding themselves thwarted. So many of these cybercriminals are going...