May 9, 2020 | Attack Vectors, Business, compromised machines, Cybercrime, Internet, Lockbit, Radio Show, Radio_Show, Ransomware, Security, Technology
Unique Ransomware Variants are Actively Propogating Ransomware is up and getting more and more popular as a mechanism for cybercriminals to make money. There are many strains of ransomware out available to cybercriminals. One current variant in use is called...
May 9, 2020 | Bittorrent, Business, Covid-19, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, Internet, movies, Pandemic, Quarantine, Radio Show, Radio_Show, Security, Technology
BitTorrent and Pandemic: A Match Made in Hacker Heaven Those who download films from bit torrent sites may be in for a big surprise. Hackers are using the pandemic to take advantage of people who are stuck at home using movies as bait for their malware. Security...
May 2, 2020 | Agencies, Banking, Banking, Biological Viruses, Business, communication, Consumer, CoronaVirus, Coronavirus, Covid-19, Cyber breaches, Cybercrime, Cybersecurity, Financial, fraudster, Government, Hackers, Internet, News, Phishing, Phishing, Quarantine, Radio Show, Radio_Show, scam, Security, Smishing, Technology, Vishing
Who Is Falling for COVID-19 Scams…Lots of People Hackers are spreading their scams widely in the face of the COVID-19 pandemic, and unfortunately, tricking many people into clicking on these fraudulent spam offers. Having been sequestered in our homes and feel...
May 2, 2020 | Access Controls, Business, Corporate Reputation, Cybercrime, Cybersecurity, Dark Web, Data Loss, Employees, Exploits, Hacking Tools, Inside Information, Internet, Malicious Insider, Marketplace, Radio Show, Radio_Show, Security, Technology
Malicious Insiders Monetize Their Knowlege Using Dark Web Have you considered that you may have those inside your business who would do you harm? Cybercrime is no longer for hackers. The dark web has provided an outlet for information supplied by insiders to raise...
Apr 28, 2020 | Business, Computers, Consumer, Cyber breaches, Cybercrime, Features, Hackers, iHeart, Internet, Public, Security, Technology, Vishing
Secure Use of Computers in Public Hi. Craig Peterson here with a blink into using computers in public. Most people have their own computers nowadays, but we are using them more-and-more in public. We are plugging our devices into random USB ports to charge them....
Apr 27, 2020 | Asset Management, Backup, Business, Business Email Compromise, CEO, Compliance, Computers, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data Assets, Data Loss, Data Storage, Disaster Recovery, Employees, Employment, Employment, Executives, Firewalls, Hacking, Hard Disks, Hiring, Incident Response, Intellectual Property Theft, Intricate Data Systems, IT Professional, Laptops, Legacy Systems, Managed Security Services Provider (MSSP), Networking, Patching, Ransomware, Routers, Security, Security Alerts, Shadow-IT, Software As A Service, Technology, Technology, Third - Party, Updates, VPN
Overcoming the Critical Cybersecurity Talent Shortage Businesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...