Jan 1, 2021 | Apple, browsers, contact tracing, contact tracing, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, Domain Name Service, Email, Employee Training, Employees, Employees, Encryption, Go Daddy, Government, Hackers, Hacks, Information Technology, Internet, iOS, Monitoring, Mozilla Firefox, Nationstates, Networking, Phishing, Phishing, President Joe Biden, Public Health, Radio Show, Radio_Show, Ransomware, Russia, Security, Show Notes, Technology, Treasury, VPN, VPN
Tech Talk Show Notes December 27, 2020 – January 2, 2021 Mozilla praises Apple anti-tracking privacy features in iOS 14 Mozilla, the organization that maintains Firefox and other open source projects, has launched a new campaign in support of a suite of privacy...
Dec 25, 2020 | Agencies, Android, Apple, Apps, Backdoor, Backdoors, Best Practices, Big Tech, Business, CPU, cyberattacks, Cybercrime, Cybersecurity, FBI, Google, Google Play Store, Government, Hackers, Hacking, Hacking, Internet, Law Enforcement, Malicious Apps, Malware, Microsoft, Microsoft, Mobile, Nationstates, Networking, Proprietary Design, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Russia, Security, Security, Show Notes, Technology, third-world, VPN, VPN
Tech Talk Show Notes December 20 -26, 2020 Google Removed Shady Android VPN App That Allowed MiTM Attacks Google has recently removed a shady Android VPN App from the Play Store. Identified as SuperVPN Free VPN Client, this app boasted 100 million installs and had...
Apr 28, 2020 | Business, Features, iHeart, Internet, Networking, Security, Technology, VPN, VPN
VPNs and Security Hi. Craig Peterson here with a blink into the dangers and benefits of VPNs. VPNs originally were to connect business networks together over the Internet, saving thousands of dollars per month over leased lines. Today, we’re using VPNs to watch...
Mar 21, 2020 | Agencies, Announcements, Best Practices, Biological Viruses, Biological Warfare, Business, Cable Companies, Cisco, Cloud, Cloud Vendors, Compliance, Computers, Coronavirus, Covid-19, Covid-19, Critical data, Cyber Liability, Data Storage, Domain Name Service, duck duck go, Employees, Encryption, Executives, FDA, Filtering, Firewalls, Firewalls, Government, Information Technology, Internet, IoT, Laptops, Malware, Networking, Networking, Operating Systems, Pandemic, Patches, Patching, Quarantine, Quarantine, Quarantine, Radio Show, Radio_Show, Regulatory Compliance, Remote Work, Remote-Work, Routers, Routers, Security, Security, Security Alerts, segmentation, Social Distancing, Software As A Service, Switches, Technology, Updates, Updates, VPN, VPN, WebEx, WHO
Being Successful While Remote Working If you’re starting to work from home or just got a remote position, you’re probably looking forward to not spending time on a frustrating commute and staying in your pajamas until noon. Enjoy that for the first day or two! But if...
Feb 22, 2020 | anonymity, Attack Vectors, Business, Compliance, cyberattacks, Cybersecurity, Internet, Iran, Nationstates, Networking, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Third - Party, Threats, Updates, VPN, VPN
Iranian Hackers Exploit VPNs Worldwide Last year major companies that make VPN servers were found to have security holes in them and now it appears according to a recent report that government cyber hackers from Iran have been exploiting these publicly announced...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...