Proceeds from Cybercriminal Activity Results in Charges Against an Atlanta Criminal Gang

Proceeds from Cybercriminal Activity Results in Charges Against an Atlanta Criminal Gang

Proceeds from Cybercriminal Activity Results in Charges Against an Atlanta Criminal Gang Cybercriminals are not smart enough to outsmart the Federal Government especially when they get greedy.  For 24 members of an Atlanta cybercrime gang involved in fraud and money...
Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations.  Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...
Big Tech Stomps All Over Small Businesses

Big Tech Stomps All Over Small Businesses

Big Tech Stomps All Over Small Businesses Are small tech companies being squeezed by tech giants?  You bet and it has happened numerous times. Sometimes they announce a big product or service, never planning to ever bring it to market.  They drive excitement for their...

Businesses In For Rude Awakening as CCPA Takes Full Effect

Businesses In For Rude Awakening as CCPA Takes Full Effect What use of technology do you use to give you the edge? Do you use outsourced technology platforms and services? Do you know what data you collect and where all your data is stored?  California’s...

Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone.

Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone.   The media tracked President Donald Trump’s movements during the campaign using cellphone data. Using leaked phone data to track the movements, one...
Big Data, Data Brokers and Your Information

Big Data, Data Brokers and Your Information

Big Data, Data Brokers and Your Information   Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...