May 9, 2020 | Bittorrent, Business, Covid-19, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, Internet, movies, Pandemic, Quarantine, Radio Show, Radio_Show, Security, Technology
BitTorrent and Pandemic: A Match Made in Hacker Heaven Those who download films from bit torrent sites may be in for a big surprise. Hackers are using the pandemic to take advantage of people who are stuck at home using movies as bait for their malware. Security...
May 2, 2020 | Agencies, Banking, Banking, Biological Viruses, Business, communication, Consumer, CoronaVirus, Coronavirus, Covid-19, Cyber breaches, Cybercrime, Cybersecurity, Financial, fraudster, Government, Hackers, Internet, News, Phishing, Phishing, Quarantine, Radio Show, Radio_Show, scam, Security, Smishing, Technology, Vishing
Who Is Falling for COVID-19 Scams…Lots of People Hackers are spreading their scams widely in the face of the COVID-19 pandemic, and unfortunately, tricking many people into clicking on these fraudulent spam offers. Having been sequestered in our homes and feel...
May 2, 2020 | Access Controls, Business, Corporate Reputation, Cybercrime, Cybersecurity, Dark Web, Data Loss, Employees, Exploits, Hacking Tools, Inside Information, Internet, Malicious Insider, Marketplace, Radio Show, Radio_Show, Security, Technology
Malicious Insiders Monetize Their Knowlege Using Dark Web Have you considered that you may have those inside your business who would do you harm? Cybercrime is no longer for hackers. The dark web has provided an outlet for information supplied by insiders to raise...
Apr 27, 2020 | Asset Management, Backup, Business, Business Email Compromise, CEO, Compliance, Computers, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data Assets, Data Loss, Data Storage, Disaster Recovery, Employees, Employment, Employment, Executives, Firewalls, Hacking, Hard Disks, Hiring, Incident Response, Intellectual Property Theft, Intricate Data Systems, IT Professional, Laptops, Legacy Systems, Managed Security Services Provider (MSSP), Networking, Patching, Ransomware, Routers, Security, Security Alerts, Shadow-IT, Software As A Service, Technology, Technology, Third - Party, Updates, VPN
Overcoming the Critical Cybersecurity Talent Shortage Businesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...
Apr 25, 2020 | Applications, Business, Cloud, Collaboration Tools, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, misconfigured environments, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Technology, Updates, Zoom
Your Zoom Account is Worth One ‘Copper’ to Hackers Zoom has gained popularity during this pandemic’s require shelter in their homes. However its widespread use has unveiled to many the privacy and security issues inherent in this platform. These inherent...
Apr 18, 2020 | Anti-Virus, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Big Tech, browsers, Business, Cloud, Cloud, Compliance, Computers, Cyber breaches, Cyber Insurance, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Loss, Data Storage, Databases, Domain Name Service, Incident Response, industrial espionage, Information Technology, Internet, Internet Infrastructure, Networking, Patches, Patching, Privacy, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, Updates, Updates, Web Tools
Time to Invest in Cybersecurity Every company no matter the size is at high risk for a cyberattack. With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime. Much...