Jan 11, 2020 | Access Controls, Applications, Asset Management, Attack Vectors, Audit Logs, audit logs, Business, Compliance, Computers, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Storage, Hackers, Hacking, Incident Response, Intellectual Property Theft, Malware, Patching, Security, Security Alerts, Third - Party, Updates
Metrics Can Not Adequately Describe The Pain of Cybercrime How can you measure the effect of a cybersecurity incident on your company? Knowing the number of records involved and the costs incurred by the event, but it can not give you a complete picture because there...
Jan 11, 2020 | Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Backup, Business, CEO, Cloud, Cloud Provide, Cloud Vendors, Compliance, Computers, Cyber breaches, Cyber Insurance, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data, Data Assets, data sharing, Data Storage, Databases, Employees, Fines and Penalties, Government, Hacking, Hacking, Incident Response, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Machine Learning, Malware, Managed Security Services Provider (MSSP), Microsoft, Networking, Operating Systems, Patching, predictive algorithms, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates, Vulnerabilities
Cloud Migration Considerations to Take into Account Deciding to move to business technology services to “the Cloud” is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest...
Jan 4, 2020 | 2FA, Attack Vectors, Audit Logs, audit logs, Business, Business Email Compromise, credential stealing, credentials, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Elections, Elections, Email, Employees, Encryption, Hackers, Hacking, Hacking, Hacking Tools, Intellectual Property Theft, Internet, Nationstates, Patching, Radio Show, Radio_Show, Russia, safety, Security, Security Alerts, spying, Technology, Third - Party, third-world, Updates, Voting Technology
Did the Russians get Anywhere close to Hacking our 2016 Election? Like with most of the hacks, it all begins the same way, unpatched vulnerable systems, and untrained personnel. That is all it takes for an opportunistic criminal or nation-state hacker to gain...
Dec 19, 2019 | Applications, Audit Logs, Best Practices, Business, cell phones, credentials, Employees, Employees, Intellectual Property Theft, Internet, Malware, Mobile Phones, Patching, Radio Show, Radio_Show, Regulatory Compliance, safety, Security, Security, Security Alerts, spying, Technology, Updates
Business Computers Should Only Be Used For Business If an employer provides you with equipment, they expect that the computer to be used for work and work only. Many times there will be software installed on these devices that monitors your activities and...
Dec 19, 2019 | Applications, Attack Vectors, Business, Business Email Compromise, credential stealing, credentials, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Financial, Government, Hackers, Hacking, Hacking, Hacking, hacking as a service, Incident Response, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Malware, Nationstates, Networking, Operating Systems, Organized Crime, Password Managers, Passwords, Patching, Phishing, Radio Show, Radio_Show, Ransomware, Security, Security Alerts, Software As A Service, Technology, third-world, Updates, Windows (Microsoft)
Lessons We Failed To Learn and Therefore Are Doomed To Repeat It seems as every year gets worse and worse when it comes to Cyber Breaches and Cyberattacks. Compared to 2018 were have had 33% more breaches this year. They are, after all of our data, personally...
Dec 7, 2019 | Business, Business Email Compromise, Cyber Insurance, Cybercrime, Cybersecurity, Databases, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Patching, Radio Show, Radio_Show, Ransomware, safety, Security, Security Alerts, Technology, Updates
Protecting Company Assets and Cybersecurity Insurance Cybercriminals are carrying out more sophisticated attacks on businesses than ever before and that required companies to spend more trying to protect their data and intellectual property. One of the pieces...