Dec 19, 2019 | Backup, Business, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, Data Storage, Fines and Penalties, Government, Hacking, Hacking, hacking as a service, Hacks, Incident Response, Insider Threat, Internet, Malware, Networking, Patching, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Are You At Risk from Your Outsourced Software Provider The “Cloud” is the eponymous name given for a computer server that belongs to another person or company that you have no control over. There are many companies who offer computing services to...
Dec 19, 2019 | Applications, Audit Logs, Best Practices, Business, cell phones, credentials, Employees, Employees, Intellectual Property Theft, Internet, Malware, Mobile Phones, Patching, Radio Show, Radio_Show, Regulatory Compliance, safety, Security, Security, Security Alerts, spying, Technology, Updates
Business Computers Should Only Be Used For Business If an employer provides you with equipment, they expect that the computer to be used for work and work only. Many times there will be software installed on these devices that monitors your activities and...
Dec 19, 2019 | Applications, Attack Vectors, Business, Business Email Compromise, credential stealing, credentials, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Financial, Government, Hackers, Hacking, Hacking, Hacking, hacking as a service, Incident Response, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Malware, Nationstates, Networking, Operating Systems, Organized Crime, Password Managers, Passwords, Patching, Phishing, Radio Show, Radio_Show, Ransomware, Security, Security Alerts, Software As A Service, Technology, third-world, Updates, Windows (Microsoft)
Lessons We Failed To Learn and Therefore Are Doomed To Repeat It seems as every year gets worse and worse when it comes to Cyber Breaches and Cyberattacks. Compared to 2018 were have had 33% more breaches this year. They are, after all of our data, personally...
Dec 7, 2019 | Android, Attack Vectors, Business, Cybercrime, Internet, Jailbreak, Mobile Phones, Patching, Phones, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, updates and patches, Vulnerabilities
Apple:1 Android:120 Android is not Android is not Android. That means that there are many many versions of the operating system that must be updated and it is why most Android devices are sorely out of date with security patches and operating system updates. ...
Dec 7, 2019 | Attack Vectors, Consumer, Hacking, Hacking, Internet, IoT, Malware, Pet Monitoring, Privacy, Psychology, Radio Show, Radio_Show, safety, Security, Security Alerts, Smart Speakers, spying, Technology, Zero-Day
Peeping on Toms Many of us have a lovable tomcat who stays at home while we are at work. We all love our pets! Now taking care of them is getting even easier with the advent of an assortment of digital and technological devices. This sector is growing...
Dec 7, 2019 | Business, Business Email Compromise, Cyber Insurance, Cybercrime, Cybersecurity, Databases, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Patching, Radio Show, Radio_Show, Ransomware, safety, Security, Security Alerts, Technology, Updates
Protecting Company Assets and Cybersecurity Insurance Cybercriminals are carrying out more sophisticated attacks on businesses than ever before and that required companies to spend more trying to protect their data and intellectual property. One of the pieces...