Feb 15, 2020 | Access Controls, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, Business, Business Email Compromise, China, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Storage, Economic Disruption, Employees, Executives, Extortion, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Intricate Data Systems, Legacy Systems, Malware, Managed Services Provider (MSP), Market Value, Nationstates, News, Patching, Phishing, Policies and Procedures, Radio Show, Regulatory Compliance, Security, Security Alerts, Smishing, Social Engineering, Technology, Third - Party, third-world, Updates, Vishing
Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government. They target military sub-contractors and sub-sub-contractors, universities,...
Feb 1, 2020 | Business, Government, Incident Response, Intricate Data Systems, Patching, Radio Show, Radio_Show, Ransomware, Security, Security Alerts, Skyrocketing Ransoms, Social Engineering, Technology, Updates
Downtime and Costs Double as Ransomware Attacks Hit Larger Businesses New and sophisticated ransomware attacks are being perpetrated on all types of businesses including large companies and government entities. This deep pocket targets are driving the costs up by...