Nov 16, 2019 | Business, Business Email Compromise, credential stealing, cyberattacks, Cybercrime, Cybersecurity, Email, Hackers, Hacking, Hacking, Identity Theft, Organized Crime, Phishing, Phishing, Radio Show, Radio_Show, Security, third-world
Bots Losing Panache as Cybercriminals Hire In Third World As our detection methods and tools improve, cybercriminals are changing tactics by employing workers from third world countries to steal credentials and money through phishing. It seems we are seeing a...
Nov 9, 2019 | Applications, Artificial Intelligence, Audit Logs, Best Practices, Business, credentials, Cyber breaches, cyberattacks, Cybercrime, CyberTraining, data sharing, Data Storage, Databases, Employees, Employees, Firewalls, Firewalls, Hackers, Hacking, Hacking, Hacks, Hard Disks, Intellectual Property Theft, Laptops, Liability, Malware, Malware, Networking, Networking, Patching, Radio Show, Radio_Show, Ransomware, Routers, Security, Security, Security Alerts, segmentation, Software As A Service, Switches, Technology, Updates
Cyberbreaches cause Small Businesses to Close Cybercriminals have found a lucrative new target – the small business. Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly....
Nov 9, 2019 | Applications, Best Practices, Business, China, Cyber breaches, cyberattacks, Cybercrime, Entertainment, Government, Hackers, Hacking, Hacking, Intellectual Property Theft, Internet, Malware, Nationstates, Patching, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Social Media, spying, Technology, TikTok, Updates
National Security and the Chinese-based Social App TikTok Have you or Do your kids use TikTok? TikTok is a wholely owned Chinese based video platform that is popular in social media circles. It boast a user base of a half-a-billion. What the government is...
Nov 9, 2019 | Applications, Applications, Audit Logs, Best Practices, Business, cyberattacks, Hacking, Hacking, Internet, Judicial, Legal, Liability, Patches, Patching, Radio Show, Radio_Show, Ransomware, Ransomware, Resources, Security, Security, Security Alerts, Software As A Service, Software Manufacturers, Technology, Third-Party, Updates
Lawfirm Software attacked by Ransomware Legal offices use case management software to assist them in preparing for trials. One of the largest providers is a company called TrialWorks. Unfortunately, a cybercriminal was able to launch a REvil/Sodinokibi...
Nov 9, 2019 | anonymity, Applications, Audit Logs, audit logs, automation, Big Tech, Business, Cloud Vendors, Code-Breaking, Computers, Consumer, credentials, Cyber breaches, Data, Data Storage, Databases, Elections, Elections, Encryption, Government, Hackers, Hacking, Hard Disks, Internet, Legal, Machine Learning, Malware, Nationstates, Networking, Online Voting, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Updates, Voting Technology
Online Voting is a Disaster waiting to Happen If it is connected it can be hacked. The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...
Nov 9, 2019 | Applications, Applications, Artificial Intelligence, Audit Logs, audit logs, automation, Best Practices, bluetooth, Business, cameras, cyberattacks, Cybercrime, Cybersecurity, Encryption, gadgets, Hackers, Hacking, Hacking, Health, Hospital, Infosec, Internet, IoT, Liability, Malware, Mobile Phones, Patches, Patching, Privacy, privacy, Radio Show, Radio_Show, safety, Security, Security, Security, Security, Security Alerts, segmentation, Smart Home, Software, Technology, Third-Party, Updates, Updates
Cybercrime is Zeroing in on Healthcare Organizations It seems that almost everything today is connected and more connections to the internet are made daily. One industry where this is more problematic is Healthcare. Why? Medical data is worth big bucks — up to...