Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...
Oct 12, 2019 | Business, Consumer, Cybercrime, Encryption, Government, Hackers, Hacking, Home, Malware, Nationstates, Networking, Networking, NSA, NSA, Organized Crime, Radio Show, Radio_Show, Security, Technology, VPN, VPN
Popular VPNs Are Vulnerable To Exploit Out of all the topics that my listeners inquire about, none is more prevalent than VPNs and VPN security. Unlike what the advertisements seem to indicate (like Norton VPN advertisements you’ve heard on the radio), a VPN is...
Oct 12, 2019 | anonymity, Cybercrime, Hackers, Hacking, Privacy, Radio Show, Radio_Show, spying
Maintaining Privacy Means Obfuscating Online Security Answers Why does your neighbor next door list his home as Nairobi, Kenya? You know he not only does not live there and probably could not even locate it on a map. It is what is known as social media...
Oct 5, 2019 | Apple, Business, Cyber breaches, cyberattacks, Cybercrime, Gaming, Google, Hackers, Hacking, Hacking, iPad, Radio Show, Radio_Show, Tablet, Technology
Popular Game Breaches Personally Identifiable Information of 218 Million People Do you like to play games on your smartphone or tablet? Word games, crosswords, and word searches and other social brain challenge games are quite popular but none so much as Words...
Oct 5, 2019 | Agencies, Anti-Virus, Applications, Business, credentials, Cybercrime, Cybersecurity, DHS, Exploits, Government, Hackers, Hacking, Kapersky, Malware, Radio Show, Radio_Show, Russia, Security Alerts, spying, Technology
Fortune 500 Companies and Government Agencies Still Using Vulnerable Anti-Virus Products It has been two years since a Binding Operational Directive was issued by the Department of Homeland Security to all Federal executive branch departments and agencies directing...
Sep 27, 2019 | Business, Business Email Compromise, Cell Phone, cell phones, CEO, Cyber breaches, Cybercrime, Email, Employees, Hackers, Hacking, Hacking, iPad, iPhone, Malware, Phishing, Radio Show, Radio_Show, Security, Smart Phone, Tablet
Spearphishing Mobile Devices of Executives Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...