Jan 11, 2020 | Asset Management, Attack Vectors, Audit Logs, automation, Best Practices, Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Data, Data Assets, DOD, Economic Disruption, Email, Firewalls, Government, Hackers, Hacking, Hacking Tools, Homeland Security, Incident Response, Internet, Iran, Law Enforcement, Nationstates, Networking, Operating Systems, Patching, Phishing, Phishing, Policies and Procedures, Privacy, Radio Show, Radio_Show, Routers, Security, Security, Security Alerts, segmentation, Switches, Technology, Third - Party, third-world, Updates, Wiper Malware
Bomb’s will not be Iran’s retaliation – Technological hacks are more likely Microsoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and...
Jan 4, 2020 | 2FA, Attack Vectors, Audit Logs, audit logs, Business, Business Email Compromise, credential stealing, credentials, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Elections, Elections, Email, Employees, Encryption, Hackers, Hacking, Hacking, Hacking Tools, Intellectual Property Theft, Internet, Nationstates, Patching, Radio Show, Radio_Show, Russia, safety, Security, Security Alerts, spying, Technology, Third - Party, third-world, Updates, Voting Technology
Did the Russians get Anywhere close to Hacking our 2016 Election? Like with most of the hacks, it all begins the same way, unpatched vulnerable systems, and untrained personnel. That is all it takes for an opportunistic criminal or nation-state hacker to gain...
Jan 4, 2020 | Advertising, Applications, Attack Vectors, brain development, Brain Fitness, Business, cyberattacks, Cybercrime, Cybersecurity, Data, Exploits, Facebook, Google, Hackers, Hacking, Hacks, Health, Infosec, iOS, Malware, Mental Fatigue, Mobile, Mobile Phones, Nationstates, Patching, Ransomware, Security, Security Alerts, spying, Tracking, Updates, Vulnerabilities
Pesky Apps That You Need To Delete ASAP Not all Apps are Good Apps… Depressive Apps. With everyone curating an unrealistic, heavily manufactured, idealized version of their lives, we all start to believe other people’s lives are so much better than...
Dec 19, 2019 | Applications, Attack Vectors, Business, Business Email Compromise, credential stealing, credentials, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Financial, Government, Hackers, Hacking, Hacking, Hacking, hacking as a service, Incident Response, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Malware, Nationstates, Networking, Operating Systems, Organized Crime, Password Managers, Passwords, Patching, Phishing, Radio Show, Radio_Show, Ransomware, Security, Security Alerts, Software As A Service, Technology, third-world, Updates, Windows (Microsoft)
Lessons We Failed To Learn and Therefore Are Doomed To Repeat It seems as every year gets worse and worse when it comes to Cyber Breaches and Cyberattacks. Compared to 2018 were have had 33% more breaches this year. They are, after all of our data, personally...
Dec 7, 2019 | Business, Business Email Compromise, Cyber Insurance, Cybercrime, Cybersecurity, Databases, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Patching, Radio Show, Radio_Show, Ransomware, safety, Security, Security Alerts, Technology, Updates
Protecting Company Assets and Cybersecurity Insurance Cybercriminals are carrying out more sophisticated attacks on businesses than ever before and that required companies to spend more trying to protect their data and intellectual property. One of the pieces...
Dec 7, 2019 | Business, Cell Phone, cell phones, Cellular Services, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, iPhone, Mobile Phones, Phone, Radio Show, Radio_Show, Security, Smart Phone, T-Mobile, Technology
Call 611 Now — Hackers Breach 1M Cellular Customers Cybercriminals will go after anyone who has an expolitable vulnerability. Businesses must work to protect themselves and must put into place an incident response plan along with a disaster recovery plan...