Hackers Preying on Old and Decrepit Technology

Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...

Nebulous Budget and Security Concerns Affecting Cloudy Decisions

Nebulous Budget and Security Concerns Affecting Cloudy Decisions Everyone is talking about “the cloud,” and many of the more prominent forecasting firms are saying that the revenue from this technology will exceed 350 billion in the next three years....

Businesses In For Rude Awakening as CCPA Takes Full Effect

Businesses In For Rude Awakening as CCPA Takes Full Effect What use of technology do you use to give you the edge? Do you use outsourced technology platforms and services? Do you know what data you collect and where all your data is stored?  California’s...

Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone.

Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone.   The media tracked President Donald Trump’s movements during the campaign using cellphone data. Using leaked phone data to track the movements, one...
Cybercriminals return to old-school ID theft tactics

Cybercriminals return to old-school ID theft tactics

Cybercriminals return to old-school ID theft tactics   As security professionals come up with new protocols and software to protect companies and businesses implement them, hackers are finding themselves thwarted. So many of these cybercriminals are going...