Jan 21, 2024 | Computers, Critical data, Cyber Liability, Data Loss, Hacking
Knock, knock! Who’s there? It’s your unnerving digital space screaming for a clean-up, cluttered with old data and forgotten files – reminiscent of that messy drawer we all have. If this goodbye seems more overwhelming than bidding farewell to an...
Jan 7, 2024 | Compliance, Corporate Reputation, Critical data, Cyber Liability, MFA, Passwords
🔐 Before your business falls victim to a cyber attack, let me share with you the essential Cybersecurity First-Aid Kit that every small business owner needs. So grab your coffee and listen up because I’m about to equip you with the knowledge and tools you need...
Jan 29, 2023 | Baby Boom, Cyber breaches, Cyber Liability, Cybercrime, Generation-Z, Malicious Insider, Networking
Generation Z is the least cyber secure because they are the most tech-savvy generation and the least experienced in cyber security. As a result, they are more likely to take risks online, such as clicking on suspicious links or downloading unknown files and are less...
Mar 5, 2021 | Access Controls, anonymity, Attack Vectors, Best Practices, Big Tech, Breaches, Business, Chromebook, Coinseed, Compliance, CPU, CPU, credentials, Cryptocurrency, Cyber Liability, Cybersecurity, Google, Government, Hacking, Internet, Malware, News, Passwords, Patching, Podcast, Radio Show, Radio_Show, Security, Security, Show Notes, Social Media, Social Media, Social Networking, SolarWinds, Technology, Updates, Vulnerabilities, WhatsApp, Zero Trust
Read. Learn. Share. Tech Talk Show Notes March 6, 2021 Embracing a Zero Trust Security Model As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the...
Apr 27, 2020 | Asset Management, Backup, Business, Business Email Compromise, CEO, Compliance, Computers, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data Assets, Data Loss, Data Storage, Disaster Recovery, Employees, Employment, Employment, Executives, Firewalls, Hacking, Hard Disks, Hiring, Incident Response, Intellectual Property Theft, Intricate Data Systems, IT Professional, Laptops, Legacy Systems, Managed Security Services Provider (MSSP), Networking, Patching, Ransomware, Routers, Security, Security Alerts, Shadow-IT, Software As A Service, Technology, Technology, Third - Party, Updates, VPN
Overcoming the Critical Cybersecurity Talent Shortage Businesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...
Apr 4, 2020 | Anti-Virus, Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, compromised machines, Critical data, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Firewalls, Hackers, Hacking, Hacking, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Legacy Systems, Malware, Monitoring, Nationstates, Networking, Organized Crime, Patching, Phishing, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Routers, Security, Security Alerts, Smishing, Surveillance, Technology, Technology, trojans, Updates, Vishing, VPN
How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Page 1 of 7123...5...NEXT»Last »