Feb 22, 2020 | anonymity, Attack Vectors, Business, Compliance, cyberattacks, Cybersecurity, Internet, Iran, Nationstates, Networking, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Third - Party, Threats, Updates, VPN, VPN
Iranian Hackers Exploit VPNs Worldwide Last year major companies that make VPN servers were found to have security holes in them and now it appears according to a recent report that government cyber hackers from Iran have been exploiting these publicly announced...
Feb 22, 2020 | Applications, Audit Logs, Biological Viruses, Biological Warfare, Business, Compliance, Coronavirus, Covid-19, cyberattacks, Disaster Recovery, Employees, Government, HR, Incident Response, Internet, Market Value, Policies and Procedures, Radio Show, Radio_Show, Security, Technology
IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus Whenever there is a big story in the News you will find Cybercriminals willing and eager to exploit people using keywords and topics from news stories. With all the stories about the Coronavirus that...
Feb 22, 2020 | Applications, Applications, Best Practices, Big Tech, Business, Chrome Browser, Compliance, Cyber Liability, cyberattacks, Cybercrime, Employees, Extensions, Google, Google, Hacking, Internet, Location Data, Patching, Policies and Procedures, Radio Show, Radio_Show, records, Regulatory Compliance, Security, Security, Security Alerts, Technology, Threats, Tracking, Updates
Be Careful of Extensions on Chrome – Many found to Upload Your Private Data. Many companies provide extensions or plug-ins for the very popular Chrome browser. Unfortunately, some of these companies are shady and have ulterior motives that include grabbing your...
Feb 22, 2020 | Applications, Best Practices, Business, Cloud, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, data sharing, Data Storage, Hacking, Hacking, Hacks, Intellectual Property Theft, Internet, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, scam, Security, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Sharp Increase in Exposed Records by Third-Party Applications Businesses are finding themselves at severe risk from Third-party applications and services. Vetting of these services and restrictions on what data they can access is the primary reason. Cybercriminals...
Feb 15, 2020 | Applications, Best Practices, Business, CEO, Compliance, credential stealing, Hacking, Internet, Intricate Data Systems, Legacy Systems, Patching, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Frameworks, Security, Security, Security Alerts, Shadow-IT, Software, Software As A Service, Software Manufacturers, Technology, Third - Party, third-world, Threats, Updates
Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession. And they carry them everywhere. Yes, I am talking about their cellphones. On these devices, they can download 1000’s of apps. These apps allow them to create...
Feb 15, 2020 | Applications, Attack Vectors, Business, Business Email Compromise, Compliance, Corporate Reputation, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, CyberTraining, Employees, Executives, Extortion, Hacking, Hacks, Human Element, ID Theft, Incident Response, Intellectual Property Theft, Internet, Intricate Data Systems, Market Value, News, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Regulatory Compliance, Security, Security Alerts, Social Engineering, Technology, third-world, Updates
Ransomware rings adapt to business declarations by Revealing Stolen Data Did you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world. Even the most prepared organization have found themselves...