Sep 17, 2023 | Cyber breaches, Cyber Insurance, Cyber Security, Cybercrime
Listen up, folks! Cybersecurity should be a top priority for everyone out there. No one is safe from those sneaky hoser hackers, from small businesses to big corporations. But here’s the thing: certain types of cyber threats tend to plague office environments...
Jul 1, 2023 | Business, Cybersecurity, Data Assets, data sharing, Databases, Email, Employee Training, Employees, Fines and Penalties, Firewalls, Hybrid Office, Internet, Networking, Ransomware, Routers, Security, Technology, VPN, Webcam
The hybrid working model became increasingly popular during and since the pandemic. It has brought benefits to individuals and organizations alike, such as increased flexibility and lower overheads. It has also been beneficial for the environment by reducing...
Apr 21, 2023 | Cybercrime, Firewalls, Organized Crime, Podcast, Routers, Security, Webcam, WiFi
In this episode, we will discuss zero-day vulnerabilities and how they can affect everyone. A zero-day vulnerability is an exploit that has been discovered but not yet fixed by a software vendor. It’s essentially a security hole in software that hasn’t...
Mar 24, 2023 | Credentials, Cyber Security, Cybercrime, Podcast
https://craigpeterson.com/warfare/the-road-to-machine-learning-wars/36388/ First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses,...
Mar 11, 2023 | Asset Management, Backup, Cyber breaches, Data Assets, Ransomware, Security
All businesses began as small businesses and are the lifeblood of our economy. With more than half of all jobs in the US provided by small companies, it is incredible that almost one-third never back up their data. Scary? No, it’s worse; those who did a backup...
Jan 29, 2023 | Baby Boom, Cyber breaches, Cyber Liability, Cybercrime, Generation-Z, Malicious Insider, Networking
Generation Z is the least cyber secure because they are the most tech-savvy generation and the least experienced in cyber security. As a result, they are more likely to take risks online, such as clicking on suspicious links or downloading unknown files and are less...