Aug 24, 2019 | automation, bluetooth, Business, Cyber breaches, Cybercrime, Hackers, Hacking, Hacking, Health, Infosec, Internet, IoT, Legal, Liability, Medical Technology, Patents, Radio Show, Radio_Show
Security First Mindset evades Medical Devices leaving them Vulnerable “Everything with a powerpoint is probably connected, or will be shortly,” says Christopher Neal, chief information security officer (CISO) of Ramsay Health Care....
Aug 24, 2019 | Best Practices, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Radio Show, Radio_Show, Security, Technology
What is More Destructive a Nuclear Weapon or Cyber Attack People around the world may be worried about nuclear tensions rising, but I think they’re missing the fact that a major cyberattack could be just as damaging – and hackers are already laying the...
Aug 24, 2019 | Applications, Best Practices, Business, Cybercrime, Cybersecurity, Hackers, Liability, Malware, Patches, Radio Show, Radio_Show, Security, Security, Technology, Updates
Missing Updates on Applications Creates Vulnerabilities Avast’s PC Trends Report 2019 found that users are making themselves vulnerable by not implementing security patches and keeping outdated versions of popular applications on their PCs. The applications...
Aug 24, 2019 | Business, credentials, Cyber breaches, Cybercrime, Cybersecurity, Hacking, Hacking, Passwords, Radio Show, Radio_Show, Security, Technology
Your Login Credentials are Keys to the Kingdom for Hackers A recent study published by Google estimates that 1.5% of all login credentials used across the web have been compromised in data breaches and are vulnerable to credential stuffing attacks. Google has...
Aug 24, 2019 | Best Practices, Biometrics, Business, Code-Breaking, Consumer, Cybercrime, Cybersecurity, Databases, Encryption, Hacking, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Technology
You Can Change Your Password but You Can’t Change Your Fingerprints The biggest known biometric data breach to date was reported recently when researchers managed to access a 23-gigabyte database of more than 27.8m records including fingerprint and facial...
Aug 24, 2019 | Best Practices, Business, CEO, Computers, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Surveillance
Employee Privacy vs Network Security: The Matchup PRACTICALLY all governments and industry regulators now demand that companies secure their enterprise networks to protect their systems and data. In responses, companies are doing everything in their capacity to...