Nov 1, 2019 | Business, China, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Dark Web, Government, Hackers, Hacking, Hacking, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Nationstates, News, North Korea, Organized Crime, Privacy, Radio Show, Radio_Show, Regulation, Russia, safety, Security, spying, Surveillance, Technology
Cyber Cold War Right on Our Door Step Nation-State sponsored cybercrime is on the upswing. China, as an example, has an entire cyber army that it dispatches to US university programs and US businesses as well as to third party providers world-wide who offer...
Oct 26, 2019 | Applications, Best Practices, Business, Cyber breaches, Cybercrime, Hackers, Hacking, Patches, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Updates, Updates
Just because you download an app does not mean that it is not vulnerable to exploit or data leaks. The chance of it happening is even higher for those not in traditional app stores. Additionally, businesses depend on older software applications are at a great risk...
Oct 26, 2019 | Audit Logs, audit logs, Best Practices, Business, Computers, Cyber breaches, cyberattacks, Cybercrime, Data Storage, Hackers, Hacking, Hacking, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Third-Party, Updates
Exploitable Vulnerability Allows Major VPN Breaches 3000 Servers hacked, the blame is being pointed at a third-party provider utilizing a remote management system in the data center. Who owned the data center? That would be NordVPN, a popular consumer VPN provider....
Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...
Oct 12, 2019 | Best Practices, Business, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, industrial espionage, Internet, Malware, Radio Show, Radio_Show, Security, Security, Technology
More Than Three-Quarters of US Businesses Are CyberAtttack Targets Cybersecurity incidents are up! Hackers worldwide favorite target du jour are U.S. small and medium-sized businesses. Unfortunately, for many, they have fallen back on the false idea they are...
Oct 5, 2019 | Apple, Business, Cyber breaches, cyberattacks, Cybercrime, Gaming, Google, Hackers, Hacking, Hacking, iPad, Radio Show, Radio_Show, Tablet, Technology
Popular Game Breaches Personally Identifiable Information of 218 Million People Do you like to play games on your smartphone or tablet? Word games, crosswords, and word searches and other social brain challenge games are quite popular but none so much as Words...