Apr 4, 2020 | Applications, Attack Vectors, Business, Internet, Mobile, Mobile Phones, Phishing, Phone, Privacy, Radio Show, Radio_Show, Security, Technology, updates and patches
3 Mobile Security Problems That Most Security Teams Haven’t Fixed Yet Workplaces continue to expand beyond the walls of the traditional office building and out into unsecured environments, increasingly relying on mobile devices. But as mobile usage increases, so...
Mar 28, 2020 | Applications, Big Tech, Biological Viruses, Business, Computers, Coronavirus, Covid-19, data sharing, FDA, Google, Google, Government, Internet, Internet Infrastructure, Quarantine, Radio Show, Radio_Show, Scalability, Security, Software As A Service, Technology
Inability to Scale Plagues Google’s Pandemic Information and Diagnostic Site The entire Covid-19 pandemic has caused every business to question its capabilities whether from a business continuity standpoint or a complete re-imagining of its business practices. Some...
Mar 14, 2020 | Applications, Applications, Attack Vectors, Best Practices, Big Tech, Breaches, Compliance, Critical data, Cyber breaches, Cybercrime, Cybersecurity, Data Loss, Hackers, Hacking, industrial espionage, Insider Threat, Malware, Operating Systems, Patches, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates, Updates, Updates, Vulnerabilities
Patch As Many As You Possibly Can and Keep The Bad Guys At Bay Software updates and patches protect both your digital safety and cybersecurity. The sooner you update, the more secure you will be until the next update comes out. However, with all the cybercriminals out...
Mar 14, 2020 | Apple, Apple, Applications, Applications, Apps, Big Tech, Business, Congress, Court Challenges, Data, Data Assets, Data Records, data sharing, Data Storage, Databases, Dragnet, FBI, GeoFence Warrants, Google, Government, Internet, Legislation, Location Data, Radio Show, Radio_Show, Security, Security First, Technology
Have Your Phone — It Might Get You Questioned About A Crime! You come home from a long day at work and sit down at your computer to check your email to find an email from Google’s legal investigations support team informing you that local police were demanding...
Mar 7, 2020 | Access Controls, Anonymity, Applications, Best Practices, Business, Compliance, Critical data, Data Loss, DNS over HTTPS (DoH), Domain Name Service, Employees, Executives, Filtering, Internet, Intricate Data Systems, Patching, Policies and Procedures, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Technology, Technology, TOR, Updates
DNS over HTTPS (DoH) is not the Panacea the Marketers Are Leading you to Believe Mozilla Firefox is promoting its new DNS over HTTPS (DoH) as a privacy-preserving method, but in reality, it is changing how DNS works. Its not the magical user privacy cure but marketing...
Mar 7, 2020 | Applications, Attack Vectors, Audit Logs, Best Practices, Business, Business Email Compromise, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Critical data, Cyber Insurance, Cyber Liability, Cybercrime, Cybersecurity, Hacking, Internet, Malware, misconfigured environments, Patching, Policies and Procedures, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Security Assessments, SecurityThing, Technology, Technology, Third - Party, trojans, Updates
Are you Secure — Depends on Many Things If a business owner asks a cybersecurity specialist if they are secure, it will be tough for them to give them a straight and honest answer without delving into their systems and business operations. Most companies...