Apr 27, 2020 | Asset Management, Backup, Business, Business Email Compromise, CEO, Compliance, Computers, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data Assets, Data Loss, Data Storage, Disaster Recovery, Employees, Employment, Employment, Executives, Firewalls, Hacking, Hard Disks, Hiring, Incident Response, Intellectual Property Theft, Intricate Data Systems, IT Professional, Laptops, Legacy Systems, Managed Security Services Provider (MSSP), Networking, Patching, Ransomware, Routers, Security, Security Alerts, Shadow-IT, Software As A Service, Technology, Technology, Third - Party, Updates, VPN
Overcoming the Critical Cybersecurity Talent Shortage Businesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...
Mar 28, 2020 | Applications, Big Tech, Biological Viruses, Business, Computers, Coronavirus, Covid-19, data sharing, FDA, Google, Google, Government, Internet, Internet Infrastructure, Quarantine, Radio Show, Radio_Show, Scalability, Security, Software As A Service, Technology
Inability to Scale Plagues Google’s Pandemic Information and Diagnostic Site The entire Covid-19 pandemic has caused every business to question its capabilities whether from a business continuity standpoint or a complete re-imagining of its business practices. Some...
Mar 21, 2020 | Agencies, Announcements, Best Practices, Biological Viruses, Biological Warfare, Business, Cable Companies, Cisco, Cloud, Cloud Vendors, Compliance, Computers, Coronavirus, Covid-19, Covid-19, Critical data, Cyber Liability, Data Storage, Domain Name Service, duck duck go, Employees, Encryption, Executives, FDA, Filtering, Firewalls, Firewalls, Government, Information Technology, Internet, IoT, Laptops, Malware, Networking, Networking, Operating Systems, Pandemic, Patches, Patching, Quarantine, Quarantine, Quarantine, Radio Show, Radio_Show, Regulatory Compliance, Remote Work, Remote-Work, Routers, Routers, Security, Security, Security Alerts, segmentation, Social Distancing, Software As A Service, Switches, Technology, Updates, Updates, VPN, VPN, WebEx, WHO
Being Successful While Remote Working If you’re starting to work from home or just got a remote position, you’re probably looking forward to not spending time on a frustrating commute and staying in your pajamas until noon. Enjoy that for the first day or two! But if...
Feb 29, 2020 | Asset Management, Best Practices, Business, Cable Companies, Cloud, Cloud Vendors, Computers, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Assets, Data Brokers, data sharing, Data Storage, Databases, Domain Name Service, Email, Employees, Executives, Financial, Future Workforce, Generation-Y, Hackers, Hacking, Hacks, Incident Response, Information Technology, Insider Threat, Internet, Internet Service Providers, IoT, Jobs, Liability, Machine Learning, Malware, Malware, MFA, Nationstates, Networking, Open Source, Organized Crime, Password Managers, Passwords, Phishing, predictive algorithms, Radio Show, Radio_Show, Ransomware, Regulation, Regulatory Compliance, Security, Security, Security Assessments, Shadow-IT, Software As A Service, Technology, Technology, Unsecured, Web Tools, Zero-Day
All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not. Companies who continue to believe that they are not technology companies...
Feb 22, 2020 | Applications, Best Practices, Business, Cloud, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, data sharing, Data Storage, Hacking, Hacking, Hacks, Intellectual Property Theft, Internet, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, scam, Security, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Sharp Increase in Exposed Records by Third-Party Applications Businesses are finding themselves at severe risk from Third-party applications and services. Vetting of these services and restrictions on what data they can access is the primary reason. Cybercriminals...
Feb 15, 2020 | Applications, Best Practices, Business, CEO, Compliance, credential stealing, Hacking, Internet, Intricate Data Systems, Legacy Systems, Patching, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Frameworks, Security, Security, Security Alerts, Shadow-IT, Software, Software As A Service, Software Manufacturers, Technology, Third - Party, third-world, Threats, Updates
Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession. And they carry them everywhere. Yes, I am talking about their cellphones. On these devices, they can download 1000’s of apps. These apps allow them to create...