Jan 11, 2020 | Access Controls, Applications, Asset Management, Attack Vectors, Audit Logs, audit logs, Business, Compliance, Computers, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Storage, Hackers, Hacking, Incident Response, Intellectual Property Theft, Malware, Patching, Security, Security Alerts, Third - Party, Updates
Metrics Can Not Adequately Describe The Pain of Cybercrime How can you measure the effect of a cybersecurity incident on your company? Knowing the number of records involved and the costs incurred by the event, but it can not give you a complete picture because there...
Jan 11, 2020 | Anti-Virus, Applications, Attack Vectors, Best Practices, Business, Computers, Cybercrime, Cybersecurity, Data, Hackers, Hacking, Incident Response, Internet, Legacy, Legacy Systems, Malware, Passwords, Patches, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Compliance, Security, Security, Security Assessments, Software, Technology, Updates, Vulnerabilities, Zero-Day
Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...
Jan 11, 2020 | Amazon, Applications, Asset Management, Attack Vectors, Big Tech, Business, Cloud, Compliance, Cyber Liability, Cybersecurity, Data Assets, Encryption, Fines and Penalties, Google, Governance, Incident Response, Microsoft, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Third - Party, Updates
Nebulous Budget and Security Concerns Affecting Cloudy Decisions Everyone is talking about “the cloud,” and many of the more prominent forecasting firms are saying that the revenue from this technology will exceed 350 billion in the next three years....
Jan 11, 2020 | Asset Management, Attack Vectors, Audit Logs, automation, Best Practices, Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Data, Data Assets, DOD, Economic Disruption, Email, Firewalls, Government, Hackers, Hacking, Hacking Tools, Homeland Security, Incident Response, Internet, Iran, Law Enforcement, Nationstates, Networking, Operating Systems, Patching, Phishing, Phishing, Policies and Procedures, Privacy, Radio Show, Radio_Show, Routers, Security, Security, Security Alerts, segmentation, Switches, Technology, Third - Party, third-world, Updates, Wiper Malware
Bomb’s will not be Iran’s retaliation – Technological hacks are more likely Microsoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and...
Jan 11, 2020 | Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Backup, Business, CEO, Cloud, Cloud Provide, Cloud Vendors, Compliance, Computers, Cyber breaches, Cyber Insurance, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data, Data Assets, data sharing, Data Storage, Databases, Employees, Fines and Penalties, Government, Hacking, Hacking, Incident Response, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Machine Learning, Malware, Managed Security Services Provider (MSSP), Microsoft, Networking, Operating Systems, Patching, predictive algorithms, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates, Vulnerabilities
Cloud Migration Considerations to Take into Account Deciding to move to business technology services to “the Cloud” is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest...
Jan 4, 2020 | 2FA, Attack Vectors, Audit Logs, audit logs, Business, Business Email Compromise, credential stealing, credentials, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Elections, Elections, Email, Employees, Encryption, Hackers, Hacking, Hacking, Hacking Tools, Intellectual Property Theft, Internet, Nationstates, Patching, Radio Show, Radio_Show, Russia, safety, Security, Security Alerts, spying, Technology, Third - Party, third-world, Updates, Voting Technology
Did the Russians get Anywhere close to Hacking our 2016 Election? Like with most of the hacks, it all begins the same way, unpatched vulnerable systems, and untrained personnel. That is all it takes for an opportunistic criminal or nation-state hacker to gain...