Feb 29, 2020 | Asset Management, Best Practices, Business, Cable Companies, Cloud, Cloud Vendors, Computers, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Assets, Data Brokers, data sharing, Data Storage, Databases, Domain Name Service, Email, Employees, Executives, Financial, Future Workforce, Generation-Y, Hackers, Hacking, Hacks, Incident Response, Information Technology, Insider Threat, Internet, Internet Service Providers, IoT, Jobs, Liability, Machine Learning, Malware, Malware, MFA, Nationstates, Networking, Open Source, Organized Crime, Password Managers, Passwords, Phishing, predictive algorithms, Radio Show, Radio_Show, Ransomware, Regulation, Regulatory Compliance, Security, Security, Security Assessments, Shadow-IT, Software As A Service, Technology, Technology, Unsecured, Web Tools, Zero-Day
All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not. Companies who continue to believe that they are not technology companies...
Feb 22, 2020 | Attack Vectors, Best Practices, Cyber Liability, Cybercrime, Cybersecurity, Elections, Government, Hackers, Hacking, Internet, logging, Malware, Mobile, Mobile Phones, Online Voting, Politics, Privacy, Radio Show, Radio_Show, Security, Security, Technology, Tracking, Voting Apps, Voting Technology, Vulnerabilities
Four States Use A Flaw Filled Mobile Voting App Creating a secure voting application is near to impossible. WIth hackers right on the tails of technology working to thwart every advantage, it will be a long while until we can create an app that could assure the...
Feb 22, 2020 | anonymity, Attack Vectors, Business, Compliance, cyberattacks, Cybersecurity, Internet, Iran, Nationstates, Networking, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Third - Party, Threats, Updates, VPN, VPN
Iranian Hackers Exploit VPNs Worldwide Last year major companies that make VPN servers were found to have security holes in them and now it appears according to a recent report that government cyber hackers from Iran have been exploiting these publicly announced...
Feb 22, 2020 | Applications, Best Practices, Business, Cloud, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, data sharing, Data Storage, Hacking, Hacking, Hacks, Intellectual Property Theft, Internet, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, scam, Security, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Sharp Increase in Exposed Records by Third-Party Applications Businesses are finding themselves at severe risk from Third-party applications and services. Vetting of these services and restrictions on what data they can access is the primary reason. Cybercriminals...
Feb 15, 2020 | Applications, Attack Vectors, Business, Business Email Compromise, Compliance, Corporate Reputation, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, CyberTraining, Employees, Executives, Extortion, Hacking, Hacks, Human Element, ID Theft, Incident Response, Intellectual Property Theft, Internet, Intricate Data Systems, Market Value, News, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Regulatory Compliance, Security, Security Alerts, Social Engineering, Technology, third-world, Updates
Ransomware rings adapt to business declarations by Revealing Stolen Data Did you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world. Even the most prepared organization have found themselves...
Feb 15, 2020 | Attack Vectors, CDC, CoronaVirus, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Hackers, Hacking, Internet, Nationstates, News, Organized Crime, Phishing, Radio Show, Radio_Show, Security, Security Alerts, Social Engineering, Technology, third-world, WHO
Coronavirus bringing out opportunistic Hackers Whenever there is something in the news we find cybercriminals willing to exploit it in some way. Currently, the big news is the Coronavirus that is spreading from Wuhan, China. We have seen email malware being spread...