Feb 29, 2020 | Applications, Applications, Asset Management, Attack Vectors, Audit Logs, audit logs, Best Practices, Big Tech, Business, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Data Storage, Employees, Executives, Hackers, Hacking, industrial espionage, Organized Crime, Patches, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates
Businesses in Danger: Data Transfer between Cloud Apps The cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data. I constantly have to explain to...
Feb 22, 2020 | Applications, applications, Automotive, Best Practices, Business, Cell Phone, Corporate Reputation, Ford, Hacking, Mobile, Patching, Phone, Phones, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Smart Phone, Technology, Third - Party, Updates
Automotive Apps originally designed for Personal Owners cause headaches for rental agencies. Automotive companies designed apps to assist their car owners to easily access some of the features of their automobiles. However, during the design process, they failed to...
Feb 22, 2020 | Applications, Audit Logs, Biological Viruses, Biological Warfare, Business, Compliance, Coronavirus, Covid-19, cyberattacks, Disaster Recovery, Employees, Government, HR, Incident Response, Internet, Market Value, Policies and Procedures, Radio Show, Radio_Show, Security, Technology
IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus Whenever there is a big story in the News you will find Cybercriminals willing and eager to exploit people using keywords and topics from news stories. With all the stories about the Coronavirus that...
Feb 22, 2020 | Applications, Applications, Best Practices, Big Tech, Business, Chrome Browser, Compliance, Cyber Liability, cyberattacks, Cybercrime, Employees, Extensions, Google, Google, Hacking, Internet, Location Data, Patching, Policies and Procedures, Radio Show, Radio_Show, records, Regulatory Compliance, Security, Security, Security Alerts, Technology, Threats, Tracking, Updates
Be Careful of Extensions on Chrome – Many found to Upload Your Private Data. Many companies provide extensions or plug-ins for the very popular Chrome browser. Unfortunately, some of these companies are shady and have ulterior motives that include grabbing your...
Feb 22, 2020 | Applications, Best Practices, Business, Cloud, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, data sharing, Data Storage, Hacking, Hacking, Hacks, Intellectual Property Theft, Internet, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, scam, Security, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Sharp Increase in Exposed Records by Third-Party Applications Businesses are finding themselves at severe risk from Third-party applications and services. Vetting of these services and restrictions on what data they can access is the primary reason. Cybercriminals...
Feb 15, 2020 | Applications, Best Practices, Business, CEO, Compliance, credential stealing, Hacking, Internet, Intricate Data Systems, Legacy Systems, Patching, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Frameworks, Security, Security, Security Alerts, Shadow-IT, Software, Software As A Service, Software Manufacturers, Technology, Third - Party, third-world, Threats, Updates
Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession. And they carry them everywhere. Yes, I am talking about their cellphones. On these devices, they can download 1000’s of apps. These apps allow them to create...