Feb 19, 2021 | Access Controls, Apple, Applications, Apps, Artificial Intelligence, Attack Vectors, Authentication, Big Tech, Bitcoin, Breaches, Business, Credentials, Cryptocurrency, Cryptocurrency, Cryptomining, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Employees, Financial, Firewalls, Google, Google, Google Play Store, Government, Hackers, Hacking, Human Element, Infrastructure, Internet, Legacy Systems, Malware, Malware, Microsoft, Microsoft, Monitoring, NASA, Networking, News, Patches, Podcast, President Joe Biden, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Show Notes, Software, Technology, Technology, trojans, updates and patches, Utilities, Vulnerabilities, Windows (Microsoft), Zero Trust
Read. Learn. Share Tech Talk Show Notes February 20. 2021 Breached water plant employees used the same TeamViewer password and no firewall The Florida water treatment facility whose computer system experienced a potentially hazardous computer breach last week used an...
Mar 14, 2020 | Applications, Applications, Attack Vectors, Best Practices, Big Tech, Breaches, Compliance, Critical data, Cyber breaches, Cybercrime, Cybersecurity, Data Loss, Hackers, Hacking, industrial espionage, Insider Threat, Malware, Operating Systems, Patches, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates, Updates, Updates, Vulnerabilities
Patch As Many As You Possibly Can and Keep The Bad Guys At Bay Software updates and patches protect both your digital safety and cybersecurity. The sooner you update, the more secure you will be until the next update comes out. However, with all the cybercriminals out...
Nov 23, 2019 | anonymity, automation, Big Data, Big Tech, Big Tech, Business, Business Email Compromise, Computers, Consumer, cyberattacks, Data, data sharing, Data Storage, Databases, Encryption, Hackers, Hacking, Hacking, Hacking, Internet, Liability, Machine Learning, Monitoring, Radio Show, Radio_Show, Resources, Security, Software, Technology
Big Data, Data Brokers and Your Information Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...
Nov 9, 2019 | Anti-Virus, Best Practices, Big Data, Breaches, Business, CEO, Consumer, Cyber Insurance, cyberattacks, Cybercrime, Data, Equifax, Hackers, Hacking, Hacking, Hacking, Liability, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Updates
Equifax “Security” – Allowed Unbelievable Inept Logins and Lack of Encryption Most of us do not have a choice when it comes to sharing our data with big data credit bureaus/respositories. They simply take all our information and re-sell it making huge...
Aug 17, 2019 | Banking, Best Practices, Breaches, Business, Cyber breaches, Cybercrime, Cybersecurity, Data, Hackers, Hacking, Hacking, Hacking, Hacks, Passwords, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Technology, Under Arrest
Turns Out It Wasn’t Just Capital One Federal prosecutors say a woman charged in a massive data breach at Capital One may have hacked more than 30 other organizations. Paige Thompson, of Seattle, was arrested last month after the FBI said she obtained personal...
Aug 17, 2019 | Agencies, Equifax, FAA, Fines and Penalties, FTC, FTC, IRS, Radio Show, Radio_Show, settlement
Am I Going Crazy or Did Elizabeth Warren actually Make sense for Once Equifax’s massive 2017 data breach screwed over more than 140 million people, so it was not terribly surprising when tens of millions of people jumped at the opportunity to claim cash...