Oct 12, 2019 | Business, Business Email Compromise, cyberattacks, Cybersecurity, Email, Email, Employees, Hacking, Radio Show, Radio_Show, Security
Sophisticated Email Attacks Against Businesses Are Up Exponentially The top tactic preferred by cybercriminals is the use of what is known as Impersonation fraud or more commonly as Business email compromise (BEC). Since these rarely involve malware, it is...
Oct 12, 2019 | Business, Internet, Microsoft, Operating Systems, Patching, Radio Show, Radio_Show, Security, Security Alerts, Updates, Windows (Microsoft)
Keeping Windows Safe Means Patching, Patching, Patching and More Patching Just when you thought that you were safe from worms, malware, etc. here come the cybercriminals again. If you can believe it, they are still targeting exploits for which the manufacturer...
Sep 28, 2019 | Best Practices, Business, Government, Insider Threat, Radio Show, Radio_Show, Security, Security, Technology
Insider Threats and DoD Response Insider threats are a danger to every organization. While all threat actors have motives, insiders enjoy ideal means and opportunity. From the inside, they are in a much better position to carry out damaging activities....
Sep 28, 2019 | Best Practices, Bitcoin, Computers, Cryptocurrency, Cybercrime, Cybersecurity, Malware, Malware, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Ransomware Attack, Schools and Colleges, Security, Security
Ransomware Storm Against Schools and School Districts School Districts, Schools and Colleges across the country are under a ransomware attack. These attacks are have resulted in the widespread operational disruption. Educational institutions rank #2 in ransomware...
Sep 27, 2019 | Business, Business Email Compromise, Cell Phone, cell phones, CEO, Cyber breaches, Cybercrime, Email, Employees, Hackers, Hacking, Hacking, iPad, iPhone, Malware, Phishing, Radio Show, Radio_Show, Security, Smart Phone, Tablet
Spearphishing Mobile Devices of Executives Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...
Sep 27, 2019 | Audit Logs, Business, Coding, cyberattacks, Cybercrime, Cybersecurity, data sharing, Databases, Governance, Hacking, Nationstates, Organized Crime, Radio Show, Radio_Show, Security, Security Alerts, Technology
Audit Logs May Help You Make Your Case — If You Have Them Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...