Jan 1, 2021 | Apple, browsers, contact tracing, contact tracing, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, Domain Name Service, Email, Employee Training, Employees, Employees, Encryption, Go Daddy, Government, Hackers, Hacks, Information Technology, Internet, iOS, Monitoring, Mozilla Firefox, Nationstates, Networking, Phishing, Phishing, President Joe Biden, Public Health, Radio Show, Radio_Show, Ransomware, Russia, Security, Show Notes, Technology, Treasury, VPN, VPN
Tech Talk Show Notes December 27, 2020 – January 2, 2021 Mozilla praises Apple anti-tracking privacy features in iOS 14 Mozilla, the organization that maintains Firefox and other open source projects, has launched a new campaign in support of a suite of privacy...
Dec 25, 2020 | Agencies, Android, Apple, Apps, Backdoor, Backdoors, Best Practices, Big Tech, Business, CPU, cyberattacks, Cybercrime, Cybersecurity, FBI, Google, Google Play Store, Government, Hackers, Hacking, Hacking, Internet, Law Enforcement, Malicious Apps, Malware, Microsoft, Microsoft, Mobile, Nationstates, Networking, Proprietary Design, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Russia, Security, Security, Show Notes, Technology, third-world, VPN, VPN
Tech Talk Show Notes December 20 -26, 2020 Google Removed Shady Android VPN App That Allowed MiTM Attacks Google has recently removed a shady Android VPN App from the Play Store. Identified as SuperVPN Free VPN Client, this app boasted 100 million installs and had...
Dec 4, 2020 | Agencies, Amazon, Amazon platform, Anti-Virus, Attack Vectors, Best Practices, Big Tech, cyberattacks, Facial Recognition, Google, Government, Incident Response, Information Technology, Internet, IRS, Malware, Radio Show, Radio_Show, Ransomware, School Districts, Security, Show Notes, Technology, Third-Party resellers
Tech Talk Show Notes November 29 – December 5, 2020 Gaming Over the Holidays? 7 Important Security Tips It’s the most wonderful time of the year for hackers to target home gamers. Gamers are typically on the younger side and more trusting and comfortable...
May 9, 2020 | Attack Vectors, Business, compromised machines, Cybercrime, Internet, Lockbit, Radio Show, Radio_Show, Ransomware, Security, Technology
Unique Ransomware Variants are Actively Propogating Ransomware is up and getting more and more popular as a mechanism for cybercriminals to make money. There are many strains of ransomware out available to cybercriminals. One current variant in use is called...
Apr 27, 2020 | Asset Management, Backup, Business, Business Email Compromise, CEO, Compliance, Computers, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data Assets, Data Loss, Data Storage, Disaster Recovery, Employees, Employment, Employment, Executives, Firewalls, Hacking, Hard Disks, Hiring, Incident Response, Intellectual Property Theft, Intricate Data Systems, IT Professional, Laptops, Legacy Systems, Managed Security Services Provider (MSSP), Networking, Patching, Ransomware, Routers, Security, Security Alerts, Shadow-IT, Software As A Service, Technology, Technology, Third - Party, Updates, VPN
Overcoming the Critical Cybersecurity Talent Shortage Businesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...
Apr 18, 2020 | Business, Cybercrime, DeepFake, Internet, Malware, Porn Scams, Radio Show, Radio_Show, Ransomware, Security, Sextortion, Technology
Watch out – Porn Scams by Email are back! Cybercriminals will try just about any tactic they can to get you to click on and accept their malware. One of their most successful have been scams related to pornography. These scams surround the possible situation...