Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...
Jan 18, 2020 | Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, Computers, credentials, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Economic Disruption, Employees, Government, Hackers, Hacking, Hacking, Intellectual Property Theft, Internet, Iran, Nationstates, Passwords, Patching, Phishing, Radio_Show, safety, Security, Security Alerts, spying, Technology, Third - Party, third-world, Updates, Updates, Vulnerabilities, Wiper Malware
Cyber War isn’t Coming It is already Here! Wars today are less likely to be kinetic, and it is safe to assume that the primary mode of retaliation from Iran will be a cyber attack. Iran wants to bring down the U.S., and the fastest way to do that is to damage us...
Jan 11, 2020 | Anti-Virus, Applications, Attack Vectors, Best Practices, Business, Computers, Cybercrime, Cybersecurity, Data, Hackers, Hacking, Incident Response, Internet, Legacy, Legacy Systems, Malware, Passwords, Patches, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Compliance, Security, Security, Security Assessments, Software, Technology, Updates, Vulnerabilities, Zero-Day
Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...
Dec 19, 2019 | Business, Chrome Browser, credentials, Google, Internet, Passwords, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates
Chrome 79 will continuously scan your passwords against public data breaches Best practices dictate that you should use a different password for every website, application, or program. However, many do not do this, and it is why cybercriminals can run rampant...