Jan 8, 2021 | Agencies, Amazon, Amazon platform, Attack Vectors, Big Tech, Coronavirus, Covid-19, cyberattacks, Cybersecurity, Data Loss, Facial Recognition, False Positives, Government, Hacking, Hacking, Malware, Malware, Microsoft, Microsoft, Microsoft, Radio Show, Radio_Show, Security, Security, Show Notes, Surveillance, Tech Overlords, Third-Party resellers
Tech Talk Show Notes January 3-9, 2021 DDoS Attacks Spiked, Became More Complex in 2020 The large-scale shift to remote work and the increased reliance on online services as the result of the global pandemic this year gave threat actors new opportunities to use...
Dec 4, 2020 | Agencies, Amazon, Amazon platform, Anti-Virus, Attack Vectors, Best Practices, Big Tech, cyberattacks, Facial Recognition, Google, Government, Incident Response, Information Technology, Internet, IRS, Malware, Radio Show, Radio_Show, Ransomware, School Districts, Security, Show Notes, Technology, Third-Party resellers
Tech Talk Show Notes November 29 – December 5, 2020 Gaming Over the Holidays? 7 Important Security Tips It’s the most wonderful time of the year for hackers to target home gamers. Gamers are typically on the younger side and more trusting and comfortable...
May 9, 2020 | Attack Vectors, Business, compromised machines, Cybercrime, Internet, Lockbit, Radio Show, Radio_Show, Ransomware, Security, Technology
Unique Ransomware Variants are Actively Propogating Ransomware is up and getting more and more popular as a mechanism for cybercriminals to make money. There are many strains of ransomware out available to cybercriminals. One current variant in use is called...
Apr 18, 2020 | Anti-Virus, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Big Tech, browsers, Business, Cloud, Cloud, Compliance, Computers, Cyber breaches, Cyber Insurance, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Loss, Data Storage, Databases, Domain Name Service, Incident Response, industrial espionage, Information Technology, Internet, Internet Infrastructure, Networking, Patches, Patching, Privacy, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, Updates, Updates, Web Tools
Time to Invest in Cybersecurity Every company no matter the size is at high risk for a cyberattack. With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime. Much...
Apr 4, 2020 | Anti-Virus, Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, compromised machines, Critical data, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Firewalls, Hackers, Hacking, Hacking, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Legacy Systems, Malware, Monitoring, Nationstates, Networking, Organized Crime, Patching, Phishing, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Routers, Security, Security Alerts, Smishing, Surveillance, Technology, Technology, trojans, Updates, Vishing, VPN
How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Apr 4, 2020 | Applications, Attack Vectors, Business, Internet, Mobile, Mobile Phones, Phishing, Phone, Privacy, Radio Show, Radio_Show, Security, Technology, updates and patches
3 Mobile Security Problems That Most Security Teams Haven’t Fixed Yet Workplaces continue to expand beyond the walls of the traditional office building and out into unsecured environments, increasingly relying on mobile devices. But as mobile usage increases, so...