Jan 4, 2020 | 2FA, Attack Vectors, Audit Logs, audit logs, Business, Business Email Compromise, credential stealing, credentials, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Elections, Elections, Email, Employees, Encryption, Hackers, Hacking, Hacking, Hacking Tools, Intellectual Property Theft, Internet, Nationstates, Patching, Radio Show, Radio_Show, Russia, safety, Security, Security Alerts, spying, Technology, Third - Party, third-world, Updates, Voting Technology
Did the Russians get Anywhere close to Hacking our 2016 Election? Like with most of the hacks, it all begins the same way, unpatched vulnerable systems, and untrained personnel. That is all it takes for an opportunistic criminal or nation-state hacker to gain...
Jan 4, 2020 | Advertising, Applications, Attack Vectors, brain development, Brain Fitness, Business, cyberattacks, Cybercrime, Cybersecurity, Data, Exploits, Facebook, Google, Hackers, Hacking, Hacks, Health, Infosec, iOS, Malware, Mental Fatigue, Mobile, Mobile Phones, Nationstates, Patching, Ransomware, Security, Security Alerts, spying, Tracking, Updates, Vulnerabilities
Pesky Apps That You Need To Delete ASAP Not all Apps are Good Apps… Depressive Apps. With everyone curating an unrealistic, heavily manufactured, idealized version of their lives, we all start to believe other people’s lives are so much better than...
Jan 4, 2020 | anonymity, Applications, Big Tech, Big Tech, Biometrics, Business, Employees, Facial Recognition, Hacking, Hacking, Internet, Location Data, Radio Show, Radio_Show, safety, Security, spying, Technology
Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone. The media tracked President Donald Trump’s movements during the campaign using cellphone data. Using leaked phone data to track the movements, one...
Dec 19, 2019 | Applications, Attack Vectors, Business, Business Email Compromise, credential stealing, credentials, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Financial, Government, Hackers, Hacking, Hacking, Hacking, hacking as a service, Incident Response, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Malware, Nationstates, Networking, Operating Systems, Organized Crime, Password Managers, Passwords, Patching, Phishing, Radio Show, Radio_Show, Ransomware, Security, Security Alerts, Software As A Service, Technology, third-world, Updates, Windows (Microsoft)
Lessons We Failed To Learn and Therefore Are Doomed To Repeat It seems as every year gets worse and worse when it comes to Cyber Breaches and Cyberattacks. Compared to 2018 were have had 33% more breaches this year. They are, after all of our data, personally...
Dec 7, 2019 | Attack Vectors, Consumer, Hacking, Hacking, Internet, IoT, Malware, Pet Monitoring, Privacy, Psychology, Radio Show, Radio_Show, safety, Security, Security Alerts, Smart Speakers, spying, Technology, Zero-Day
Peeping on Toms Many of us have a lovable tomcat who stays at home while we are at work. We all love our pets! Now taking care of them is getting even easier with the advent of an assortment of digital and technological devices. This sector is growing...
Dec 7, 2019 | Business, Business Email Compromise, Cyber Insurance, Cybercrime, Cybersecurity, Databases, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Patching, Radio Show, Radio_Show, Ransomware, safety, Security, Security Alerts, Technology, Updates
Protecting Company Assets and Cybersecurity Insurance Cybercriminals are carrying out more sophisticated attacks on businesses than ever before and that required companies to spend more trying to protect their data and intellectual property. One of the pieces...