Jan 18, 2020 | Applications, Best Practices, Business, Business Email Compromise, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, Economic Disruption, Education, Employee Training, Employees, Employment, Exploits, Fines and Penalties, Government, Hackers, Hacking, Hacks, Insider Threat, Internet, Malware, MFA, Nationstates, Organized Crime, Phishing, Phishing, Phishing, Policies and Procedures, Radio Show, Radio_Show, scam, Security, Security, Smishing, Social Engineering, Social Media, Social Media, Social Networking, Technology, Threats, Tracking
Social Engineering Comes to the Forefront of Attacks We depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...
Jan 11, 2020 | Access Controls, Amazon, Apple, Asset Management, Attack Vectors, audit logs, Backup, Big Tech, Business, Computers, Cyber breaches, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Employee Training, Employment, Encryption, Fines and Penalties, Google, Hacking, Incident Response, industrial espionage, Insider Threat, Internet, Jobs, Legal, Liability, Malware, Malware, Microsoft, Monitoring, Networking, predictive algorithms, Radio Show, Radio_Show, Ransomware, Security, Software As A Service, Surveillance, Technology, Zero-Day
How Mature is Your Insider Threat Intelligence? Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...
Jan 11, 2020 | Access Controls, Applications, Asset Management, Attack Vectors, Audit Logs, audit logs, Business, Compliance, Computers, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Storage, Hackers, Hacking, Incident Response, Intellectual Property Theft, Malware, Patching, Security, Security Alerts, Third - Party, Updates
Metrics Can Not Adequately Describe The Pain of Cybercrime How can you measure the effect of a cybersecurity incident on your company? Knowing the number of records involved and the costs incurred by the event, but it can not give you a complete picture because there...
Jan 11, 2020 | Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Backup, Business, CEO, Cloud, Cloud Provide, Cloud Vendors, Compliance, Computers, Cyber breaches, Cyber Insurance, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data, Data Assets, data sharing, Data Storage, Databases, Employees, Fines and Penalties, Government, Hacking, Hacking, Incident Response, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Machine Learning, Malware, Managed Security Services Provider (MSSP), Microsoft, Networking, Operating Systems, Patching, predictive algorithms, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates, Vulnerabilities
Cloud Migration Considerations to Take into Account Deciding to move to business technology services to “the Cloud” is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest...
Jan 11, 2020 | Amazon, anonymity, Apple, Applications, Asset Management, Audit Logs, audit logs, Big Tech, Big Tech, Business, CCPA, Chrome Browser, Compliance, Computers, Cyber Liability, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Databases, Encryption, Financial, Fines and Penalties, Google, Government, Hacking, Internet, Legislation, Malware, Microsoft, Monitoring, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, spying, Technology, Updates, Windows (Microsoft)
Businesses In For Rude Awakening as CCPA Takes Full Effect What use of technology do you use to give you the edge? Do you use outsourced technology platforms and services? Do you know what data you collect and where all your data is stored? California’s...