Mar 14, 2020 | Biological Viruses, Business, Cisco, Cisco, Coronavirus, Covid-19, Government, Internet, Quarantine, Quarantine, Radio Show, Radio_Show, Security, Technology, WebEx
Webex Communications Keep Businesses Operating During Quarantines Seasonal Flu or a Covid-19 quarantine may sideline employees this year. To keep productivity up, you may need to conduct business remotely. One of the biggest challenges to remote work for companies is...
Mar 7, 2020 | Best Practices, Business, Business Email Compromise, Compliance, Cybercrime, Cybersecurity, CyberTraining, Employees, Employees, Executives, Executives, Extortion, Financial, Hackers, Hacking, Human Element, Inattention, Insider Threat, Internet, Nationstates, Organized Crime, Phishing, Policies and Procedures, Privacy, Radio Show, Radio_Show, Security, Security, Social Engineering, Technology
Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites No matter how big you are –, you can be a victim. Business email compromise can happen to anyone, and it only takes a single moment of inattention for it to work. To carry out a...
Mar 7, 2020 | Access Controls, Anonymity, Applications, Best Practices, Business, Compliance, Critical data, Data Loss, DNS over HTTPS (DoH), Domain Name Service, Employees, Executives, Filtering, Internet, Intricate Data Systems, Patching, Policies and Procedures, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Technology, Technology, TOR, Updates
DNS over HTTPS (DoH) is not the Panacea the Marketers Are Leading you to Believe Mozilla Firefox is promoting its new DNS over HTTPS (DoH) as a privacy-preserving method, but in reality, it is changing how DNS works. Its not the magical user privacy cure but marketing...
Mar 7, 2020 | Access Controls, Asset Management, Best Practices, Business, Compliance, credential stealing, credentials, Critical data, Cyber Liability, cyberattacks, Data Assets, Employees, Hacking, Human Element, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Legacy Systems, Operating Systems, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Regulatory Compliance, Security, Security, Security Alerts, Technology, Technology, Third - Party, Updates
Cryptocurrencies and Insurance Increases Ransomware Profitability Ransomware is rising like a phoenix from the ashes again. Companies are paying enormous ransoms in cryptocurrencies and insurance companies paying out claims, which in turn is adding to the rise in...
Feb 29, 2020 | Applications, Applications, Asset Management, Attack Vectors, Audit Logs, audit logs, Best Practices, Big Tech, Business, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Data Storage, Employees, Executives, Hackers, Hacking, industrial espionage, Organized Crime, Patches, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates
Businesses in Danger: Data Transfer between Cloud Apps The cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data. I constantly have to explain to...
Feb 29, 2020 | Attack Vectors, Best Practices, Cloud, Compliance, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Employees, Hacking, Hacking, industrial espionage, Intellectual Property Theft, Liability, Malware, misconfigured environments, Patching, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Frameworks, Security, Security, Security Alerts, Technology, Third - Party, Updates
Liability belongs to You: Misconfigured Clouds and Security Companies that were sold on Cloud Services as a cost-effective solution to maintaining a corporate server with specialized software were ill-equipped to understand all of the technological security...