Feb 15, 2020 | ACLU, Big Tech, Business, Civil Rights, Data, Data Aggregator, Data Brokers, Data Storage, Databases, DHS, Government, Internet, Legal, Radio Show, Radio_Show, Security, Technology
DHS wants to track illegal aliens using available cell-phone location data. ACLU says Whoa! We have a problem with illegal immigrants. Now don’t get me wrong we love immigrants and they can add a lot to our economy but those immigrants come to our country through...
Feb 8, 2020 | Apple, Apple, Attack Vectors, Best Practices, Big Tech, Business, Computers, Corporate Reputation, Cybersecurity, Data Assets, Data Storage, Exploits, FBI, Government, Hacking, Internet, iOS, Mobile, Mobile Phones, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Security First, Surveillance, Technology
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups. Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Feb 8, 2020 | Applications, Attack Vectors, Best Practices, Business, Cloud, Compliance, Cyber Liability, Data Storage, Databases, Hacking, Internet, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, spying, Technology, Third - Party, Third-Party, Updates
Do You Use Trello? Search turns up massive trove of private data Do you use Trello? It is an excellent collaboration platform that I use with my team. It can be an excellent tool for project collaboration. However, it must get set up correctly if you want to...
Feb 1, 2020 | Best Practices, Biometrics, Business, Cyber breaches, cyberattacks, Data Brokers, Data Storage, Databases, Facial Recognition, Facial Recognition, False Positives, Hacking, Hacking, ID Theft, Internet, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Social Networking, Technology, Unsecured
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption Facial Recognition is not a perfect technology and still needs some time before being widely used in societal applications until we get our hands around the issues of privacy, safety and...
Jan 18, 2020 | Access Controls, Applications, Attack Vectors, automation, Business, CEO, Coding, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Storage, Hackers, Hacking, Hacking, Internet, Patching, Radio Show, Radio_Show, safety, Security, Security Alerts, spying, Technology, Third - Party, Updates
A Lesson to Learn – If it is Connected It can Be Hacked I remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...