Aug 17, 2019 | Best Practices, Business, Cybercrime, CyberTraining, Employees, Employees, Hackers, Hacking, Hacking, Liability, Malware, Malware, Passwords, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Regulatory Compliance, scam, Security, Security, Technology
Phishing — Best Practices One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...
Aug 17, 2019 | Cybercrime, CyberTraining, Employees, Encryption, Financial, Hackers, Hacking, Internet, Malware, Passwords, Radio Show, Radio_Show, scam, Security, Security, Security, Social Networking, Technology
Technology Makes Crime Easier In part one of TechRepublic’s four-part series “Mastermind con-man behind Catch Me If You Can talks cybersecurity” TechRepublic’s Karen Roby sat down with Frank Abagnale, the famous con man turned FBI...
Aug 10, 2019 | Best Practices, Business, Cloud Vendors, Computers, Cryptocurrency, Cyber breaches, Cybercrime, Financial, Hackers, Hacking, Hacking, Internet, IoT, Liability, Malware, Nationstates, North Korea, Radio Show, Radio_Show, Ransomware, Ransomware, scam, Security, Security, Technology
North Korea. What do you think when you hear about this country? You probably think of a nation that has separated from progress and technology. A country run by a socialist despot. A hermit kingdom that strictly controls the daily activities of its people. A country...
Jul 27, 2019 | Breaches, Computers, Consumer, Cyber breaches, Cybercrime, Cybersecurity, Hacking, Laptops, Malware, Radio Show, Radio_Show, Security, Security, Surveillance, Technology, Tracking, Video, Windows (Microsoft)
Is Someone Lurking in Your Computer? Whether you’re in an open office where colleagues regularly wander past or live somewhere—like a college dorm—where you may feel comfortable leaving your laptop unattended in the presence of relative strangers, it can be all...
Jul 20, 2019 | Blogging, Business, Cybercrime, Cybersecurity, CyberTraining, data sharing, Email, Employees, Facebook, Facebook, Generation-Y, Google, Hackers, Hacking, Internet, LinkedIn, LinkedIn, Malware, Monitoring, Pinterest, Privacy, Radio Show, Radio_Show, Social Media, Social Networking, Technology, Tracking, Twitter, Twitter, YouTube
Are you or your employees giving away the keys to your kingdom? The magnetism of Social Media If you have teens and you will understand the magnetism that social media seems to have over them. However, it is not only teens, but almost our entire society is...
Jul 6, 2019 | Business, Computers, Cybercrime, Malware, Malware, Organized Crime, Radio Show, Radio_Show, Ransomware
Organized crimes latest drive-by’s attacking website visitors An ongoing operation that’s installing ransomware and other malware on the computers of unsuspecting website visitors is one of the most potent drive-by attack campaigns researchers have seen in...