Feb 15, 2020 | Applications, Attack Vectors, Business, Business Email Compromise, Compliance, Corporate Reputation, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, CyberTraining, Employees, Executives, Extortion, Hacking, Hacks, Human Element, ID Theft, Incident Response, Intellectual Property Theft, Internet, Intricate Data Systems, Market Value, News, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Regulatory Compliance, Security, Security Alerts, Social Engineering, Technology, third-world, Updates
Ransomware rings adapt to business declarations by Revealing Stolen Data Did you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world. Even the most prepared organization have found themselves...
Feb 15, 2020 | Access Controls, Applications, Attack Vectors, Audit Logs, audit logs, automation, Business, Compliance, credentials, Cyber breaches, Data, data sharing, Elections, Elections, Government, Internet, Intricate Data Systems, Malware, News, Online Voting, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, Voting Apps, Voting Technology
The security mistakes made by the Iowa Democratic Party in creating their App Last week there was a caucus in Iowa. Caucuses by their very nature are prone to manipulation and miscounting. Then you add in the fact that the party chose to use a new technology that was...
Feb 15, 2020 | Access Controls, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, Business, Business Email Compromise, China, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Storage, Economic Disruption, Employees, Executives, Extortion, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Intricate Data Systems, Legacy Systems, Malware, Managed Services Provider (MSP), Market Value, Nationstates, News, Patching, Phishing, Policies and Procedures, Radio Show, Regulatory Compliance, Security, Security Alerts, Smishing, Social Engineering, Technology, Third - Party, third-world, Updates, Vishing
Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government. They target military sub-contractors and sub-sub-contractors, universities,...
Feb 8, 2020 | Applications, Audit Logs, Business, CEO, Cloud, Compliance, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Databases, Disaster Recovery, Executives, Foreign Currency Exchange, Hackers, Hacking, Incident Response, Internet, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Security, Technology
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You? We have all heard about Ransomware and the toll it can take on businesses of all sizes. The rate of attacks has doubled in Q4, and the...
Feb 8, 2020 | Applications, Big Tech, Business, Cloud, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, Malware, Microsoft, Microsoft, Nationstates, Radio Show, Radio_Show, Russia, Security, Security Alerts, Technology, third-world, Windows (Microsoft)
“Evil Corp” really does exist, and it’s distributing malware using Microsoft Excel Yes, there is an Evil Corp, and it is a Russian backed group of Cybercriminals. They are busy weaponizing Microsoft’s popular spreadsheet package, Excel, so that it...
Feb 8, 2020 | Applications, Attack Vectors, Best Practices, Business, Cloud, Compliance, Cyber Liability, Data Storage, Databases, Hacking, Internet, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, spying, Technology, Third - Party, Third-Party, Updates
Do You Use Trello? Search turns up massive trove of private data Do you use Trello? It is an excellent collaboration platform that I use with my team. It can be an excellent tool for project collaboration. However, it must get set up correctly if you want to...