Jan 21, 2024 | Computers, Critical data, Cyber Liability, Data Loss, Hacking
Knock, knock! Who’s there? It’s your unnerving digital space screaming for a clean-up, cluttered with old data and forgotten files – reminiscent of that messy drawer we all have. If this goodbye seems more overwhelming than bidding farewell to an...
Aug 27, 2023 | Business, Critical data, Data Loss, Disaster Recovery, Hacking, Intellectual Property Theft
Protect Your Small Business from Cyber Threats Small businesses face increasing cyber threats in today’s digital age, and whether they are doing enough to combat these threats is complex. I’ve found small businesses are often at a higher risk for cyberattacks...
Feb 19, 2023 | Anti-Virus, Ask Craig, Backdoors, Data Loss, Disaster Recovery, WGAN, WGIR, WTAG
The internet is a double-edged sword – on the one hand, it provides us with vast amounts of information, entertainment, and resources at our fingertips. Still, on the other, it is also home to many threats like viruses, malware, spyware, and other forms of malicious...
Apr 9, 2021 | Agencies, Android, Android, App Store, Apple, Apple, Apps, Apps, Attack Vectors, Automation, Automotive, Best Practices, Big Data, Big Tech, Business, Cloud, Cloud Vendors, Computers, Contractors, Cryptocurrency, Cryptocurrency, cyberattacks, Cybercrime, Data Aggregator, Data Brokers, Data Loss, data sharing, Databases, Demonetize, Facebook, Facebook, Financial, Google, Google, Google Play Store, Government, Government, Hackers, Hacking, Hacking, Homeland Security, ID Theft, Internet, iPad, Malicious Insider, Malware, Malware, Mobile, Mobile Phones, Networking, News, NFTs, Patching, Phone, Pixel, Podcast, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Show Notes, Spyware, Surveillance, Tablet, Technology, Technology, Third-Party, United States, Unsecured, Updates, Valuations, vehicles, VPN, VPN, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes April 11, 2021 DHS Preparing to Use Private Contractors to “Scour Public Data and Social Media” To Compile Dissident Citizens for Watch List and No Fly Lists The U.S. Department of Homeland Security is now getting ready to...
Jan 8, 2021 | Agencies, Amazon, Amazon platform, Attack Vectors, Big Tech, Coronavirus, Covid-19, cyberattacks, Cybersecurity, Data Loss, Facial Recognition, False Positives, Government, Hacking, Hacking, Malware, Malware, Microsoft, Microsoft, Microsoft, Radio Show, Radio_Show, Security, Security, Show Notes, Surveillance, Tech Overlords, Third-Party resellers
Tech Talk Show Notes January 3-9, 2021 DDoS Attacks Spiked, Became More Complex in 2020 The large-scale shift to remote work and the increased reliance on online services as the result of the global pandemic this year gave threat actors new opportunities to use...
May 2, 2020 | Access Controls, Business, Corporate Reputation, Cybercrime, Cybersecurity, Dark Web, Data Loss, Employees, Exploits, Hacking Tools, Inside Information, Internet, Malicious Insider, Marketplace, Radio Show, Radio_Show, Security, Technology
Malicious Insiders Monetize Their Knowlege Using Dark Web Have you considered that you may have those inside your business who would do you harm? Cybercrime is no longer for hackers. The dark web has provided an outlet for information supplied by insiders to raise...