Apr 25, 2020 | Agencies, Biological Viruses, Business, China, Coronavirus, Covid-19, Cybercrime, Economic Disruption, Expose Client Functions, Government, industrial espionage, Internet, Malware, Monitoring, Monitoring, Privacy, Quarantine, Radio Show, Radio_Show, Remote-Work, Security, Security Alerts, Surveillance, Technology, Technology, trojans, Tyranny, Unsecured Devices
Thank you Coronavirus – Governments Are Watching Us Quarntines are meant to help control those who are capable of infection from interacting with the general populace. It is not meant to curtail all economic activity of the society. With this pandemic,...
Apr 4, 2020 | Anti-Virus, Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, compromised machines, Critical data, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Firewalls, Hackers, Hacking, Hacking, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Legacy Systems, Malware, Monitoring, Nationstates, Networking, Organized Crime, Patching, Phishing, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Routers, Security, Security Alerts, Smishing, Surveillance, Technology, Technology, trojans, Updates, Vishing, VPN
How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Apr 4, 2020 | Agencies, Business, Business Email Compromise, Censorship, China, Cyber breaches, Cybercrime, Cybersecurity, DOJ, Economic Disruption, FBI, Fines and Penalties, FTC, Government, Hackers, Hacking, Hacking, Hacks, Internet, Internet Service Providers, IoT, Iran, Journalists, Law Enforcement, Malware, Malware, Monitoring, Nationstates, North Korea, Patching, Phishing, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Smishing, Social Engineering, Surveillance, Technology, Technology, Third - Party, third-world, Threat Analysis, trojans, Updates, Vishing, Web Tools, Zero-Day
Google sent users 40,000 warnings of nation-state hack attacks in 2019 Google’s threat analysis group, which counters targeted and government-backed hacking against the company and its users, sent account holders almost 40,000 warnings in 2019, with government...
Mar 7, 2020 | Applications, Attack Vectors, Audit Logs, Best Practices, Business, Business Email Compromise, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Critical data, Cyber Insurance, Cyber Liability, Cybercrime, Cybersecurity, Hacking, Internet, Malware, misconfigured environments, Patching, Policies and Procedures, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Security Assessments, SecurityThing, Technology, Technology, Third - Party, trojans, Updates
Are you Secure — Depends on Many Things If a business owner asks a cybersecurity specialist if they are secure, it will be tough for them to give them a straight and honest answer without delving into their systems and business operations. Most companies...
Feb 29, 2020 | Business, compromised machines, Corporate Reputation, Critical data, Cryptocurrency, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data, Data Assets, Databases, Disaster Recovery, Financial, Hacking, Malware, Malware, Radio Show, Radio_Show, Ransomware, Security, Security, Technology, Technology, trojans, Zero-Day
Businesses Beware: Ransomware is on the rise, again Companies are under attack from Ransomware gangs and are paying a high price. Cybercriminals who were surreptitiously using business computing resources to mine cryptocurrencies have found that with the huge drop in...