Apr 30, 2021 | Apple, Automation, Automotive, Best Practices, Big Tech, Business, Cloud, Cloud, Cloud Vendors, CPU, Critical data, Cybercrime, Data, Databases, Emotet, FCC, Government, Hackers, Hacking, iMac, Internet, Laptops, Law Enforcement, Mac Pro, MacBook, Monitoring, News, Podcast, Police, Proprietary Design, Radio Show, Radio_Show, Ransomware, Ransomware, Security, Security, Security Alerts, Show Notes, Skyrocketing Ransoms, SpaceX, Starlink, Technology, Unsecured
Read. Learn. Share. Tech Talk Show Notes May 1, 2021 Lyft is getting out of the self-driving business Lyft has sold its self-driving division to a Toyota subsidiary called Woven Planet for $550 million—the latest sign that it takes deep pockets to compete in the...
Apr 9, 2021 | Agencies, Android, Android, App Store, Apple, Apple, Apps, Apps, Attack Vectors, Automation, Automotive, Best Practices, Big Data, Big Tech, Business, Cloud, Cloud Vendors, Computers, Contractors, Cryptocurrency, Cryptocurrency, cyberattacks, Cybercrime, Data Aggregator, Data Brokers, Data Loss, data sharing, Databases, Demonetize, Facebook, Facebook, Financial, Google, Google, Google Play Store, Government, Government, Hackers, Hacking, Hacking, Homeland Security, ID Theft, Internet, iPad, Malicious Insider, Malware, Malware, Mobile, Mobile Phones, Networking, News, NFTs, Patching, Phone, Pixel, Podcast, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Show Notes, Spyware, Surveillance, Tablet, Technology, Technology, Third-Party, United States, Unsecured, Updates, Valuations, vehicles, VPN, VPN, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes April 11, 2021 DHS Preparing to Use Private Contractors to “Scour Public Data and Social Media” To Compile Dissident Citizens for Watch List and No Fly Lists The U.S. Department of Homeland Security is now getting ready to...
Mar 21, 2020 | Agencies, Announcements, Best Practices, Biological Viruses, Biological Warfare, Business, Cable Companies, Cisco, Cloud, Cloud Vendors, Compliance, Computers, Coronavirus, Covid-19, Covid-19, Critical data, Cyber Liability, Data Storage, Domain Name Service, duck duck go, Employees, Encryption, Executives, FDA, Filtering, Firewalls, Firewalls, Government, Information Technology, Internet, IoT, Laptops, Malware, Networking, Networking, Operating Systems, Pandemic, Patches, Patching, Quarantine, Quarantine, Quarantine, Radio Show, Radio_Show, Regulatory Compliance, Remote Work, Remote-Work, Routers, Routers, Security, Security, Security Alerts, segmentation, Social Distancing, Software As A Service, Switches, Technology, Updates, Updates, VPN, VPN, WebEx, WHO
Being Successful While Remote Working If you’re starting to work from home or just got a remote position, you’re probably looking forward to not spending time on a frustrating commute and staying in your pajamas until noon. Enjoy that for the first day or two! But if...
Mar 21, 2020 | Best Practices, Biological Viruses, Business, cell phones, Cisco, Cloud, Cloud Vendors, Computers, Coronavirus, Covid-19, Cybersecurity, Data Assets, Internet, News, Patching, Privacy, Quarantine, Radio Show, Radio_Show, Remote Work, Remote-Work, Security, Security, Security Alerts, Technology, Technology, Unsecured Devices, Updates, WebEx
Security Must Be In Place Prior to Remote Work One of the biggest problems facing companies during this coronavirus pandemic is that they do not have the proper and robust enough security to support remote-work. Many companies do not completely understand the...
Mar 7, 2020 | Applications, Attack Vectors, Audit Logs, Best Practices, Business, Business Email Compromise, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Critical data, Cyber Insurance, Cyber Liability, Cybercrime, Cybersecurity, Hacking, Internet, Malware, misconfigured environments, Patching, Policies and Procedures, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Security Assessments, SecurityThing, Technology, Technology, Third - Party, trojans, Updates
Are you Secure — Depends on Many Things If a business owner asks a cybersecurity specialist if they are secure, it will be tough for them to give them a straight and honest answer without delving into their systems and business operations. Most companies...
Feb 29, 2020 | Applications, Applications, Asset Management, Attack Vectors, Audit Logs, audit logs, Best Practices, Big Tech, Business, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Data Storage, Employees, Executives, Hackers, Hacking, industrial espionage, Organized Crime, Patches, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates
Businesses in Danger: Data Transfer between Cloud Apps The cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data. I constantly have to explain to...