Show Notes Dec 27, 2020 to Jan 2, 2021

Show Notes Dec 27, 2020 to Jan 2, 2021

Tech Talk Show Notes December 27, 2020 – January 2, 2021 Mozilla praises Apple anti-tracking privacy features in iOS 14 Mozilla, the organization that maintains Firefox and other open source projects, has launched a new campaign in support of a suite of privacy...
Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites

Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites

Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites No matter how big you are –, you can be a victim. Business email compromise can happen to anyone, and it only takes a single moment of inattention for it to work. To carry out a...
All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not.  Companies who continue to believe that they are not technology companies...
Most Businesses Attacked By Business Email Compromise Last Year

Most Businesses Attacked By Business Email Compromise Last Year

Most Businesses Attacked By Business Email Compromise Last Year 2019 was the year for Business Email Compromises also known as BEC attacks.  In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....
Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations.  Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...

Technology Can Only Protect You So Much — Then Other Tactics are Needed

Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...