Nov 9, 2019 | Applications, Applications, Artificial Intelligence, Audit Logs, audit logs, automation, Best Practices, bluetooth, Business, cameras, cyberattacks, Cybercrime, Cybersecurity, Encryption, gadgets, Hackers, Hacking, Hacking, Health, Hospital, Infosec, Internet, IoT, Liability, Malware, Mobile Phones, Patches, Patching, Privacy, privacy, Radio Show, Radio_Show, safety, Security, Security, Security, Security, Security Alerts, segmentation, Smart Home, Software, Technology, Third-Party, Updates, Updates
Cybercrime is Zeroing in on Healthcare Organizations It seems that almost everything today is connected and more connections to the internet are made daily. One industry where this is more problematic is Healthcare. Why? Medical data is worth big bucks — up to...
Nov 1, 2019 | Business, Computers, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Hacking, industrial espionage, Intellectual Property Theft, Privacy, Radio Show, Radio_Show, safety, Security, Security, spying, Technology, Tracking
Little Inexpensive Devices Can Remove Sensitive Data Who has access to your offices? I am sure you are familiar with those little USB drives that are almost flat, to be undetectable when installed. Well, these under $20 devices can be connected in computers...
Nov 1, 2019 | Business, Hacking, Internet, Password Managers, Passwords, Privacy, Radio Show, Radio_Show, safety, Security
Common Password Vulnerabilities and How to Avoid Them There are a couple of interesting articles this week discussing one of my favorite subjects because it can make a significant impact on your security stance. Breaches that could result in data loss are the...
Nov 1, 2019 | Business, China, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Dark Web, Government, Hackers, Hacking, Hacking, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Nationstates, News, North Korea, Organized Crime, Privacy, Radio Show, Radio_Show, Regulation, Russia, safety, Security, spying, Surveillance, Technology
Cyber Cold War Right on Our Door Step Nation-State sponsored cybercrime is on the upswing. China, as an example, has an entire cyber army that it dispatches to US university programs and US businesses as well as to third party providers world-wide who offer...
Nov 1, 2019 | BBC, Big Tech, Business, Censorship, Government, Internet, Networking, News, Politics, Privacy, Radio Show, Radio_Show, safety, spying, Surveillance, Technology, Tracking
International News Hits the Dark Web Privacy is paramount, and it is one reason that the US government designed and implemented the TOR project. Now there is another reason, and that is preventing censorship of thought. That is the main reason that major...
Oct 26, 2019 | automation, Equipment, Military, Radio Show, Radio_Show, Robotics, safety, Science, Technology, Transportation, vehicles, Warfare
Military Equipment — the Future is On our Door Step Autonomous Military Vehicles are under development as part of the Army Futures Command Next-Generation Combat Vehicle program. Four companies have been selected to build non-developmental prototypes. The hope...