Oct 19, 2019 | cyberattacks, Cybercrime, Cybersecurity, Email, Encryption, Government, Hacking, Internet, Nationstates, News, Online, Organized Crime, Privacy, Radio Show, Radio_Show, Security, Technology
Standing our Ground on Encryption – without it, we will lose all Privacy! According to the US Consitution, we have the right to be secure in our persons, houses, and papers. Unlike 1787 when they wrote the constitution, today, “our papers” are digitally...
Oct 12, 2019 | Business, Business Email Compromise, cyberattacks, Cybersecurity, Email, Email, Employees, Hacking, Radio Show, Radio_Show, Security
Sophisticated Email Attacks Against Businesses Are Up Exponentially The top tactic preferred by cybercriminals is the use of what is known as Impersonation fraud or more commonly as Business email compromise (BEC). Since these rarely involve malware, it is...
Oct 5, 2019 | Apple, Business, Cyber breaches, cyberattacks, Cybercrime, Gaming, Google, Hackers, Hacking, Hacking, iPad, Radio Show, Radio_Show, Tablet, Technology
Popular Game Breaches Personally Identifiable Information of 218 Million People Do you like to play games on your smartphone or tablet? Word games, crosswords, and word searches and other social brain challenge games are quite popular but none so much as Words...
Sep 27, 2019 | Business, Business Email Compromise, Cell Phone, cell phones, CEO, Cyber breaches, Cybercrime, Email, Employees, Hackers, Hacking, Hacking, iPad, iPhone, Malware, Phishing, Radio Show, Radio_Show, Security, Smart Phone, Tablet
Spearphishing Mobile Devices of Executives Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...
Sep 27, 2019 | Advertising, browsers, Computer Repair, Computers, Consumer, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Radio Show, Radio_Show, Remote Repair, Repair, scam, Senior
“Technology Help” Cybercriminals Scam Seniors into Paying Thousands Computers began during our seasoned citizens lifetime. They did not grow up with them, and this places them at a distinct disadvantage when it comes to their level of understanding. Senior citizens...
Sep 27, 2019 | Audit Logs, Business, Coding, cyberattacks, Cybercrime, Cybersecurity, data sharing, Databases, Governance, Hacking, Nationstates, Organized Crime, Radio Show, Radio_Show, Security, Security Alerts, Technology
Audit Logs May Help You Make Your Case — If You Have Them Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...