Feb 26, 2021 | 00-HomePage, Advertising, Anti-Virus, Apple, Apple, Automation, Automotive, Best Practices, Big Tech, Biological Viruses, browsers, Business, cell phones, Chrome, Chrome Browser, Computers, Coronavirus, Covid-19, Cyber breaches, Cybercrime, CyberTraining, Electric Grid, Employee Training, Employees, Encryption, Energy, Environment, Google, Google, Government, Hackers, Hacking, Hacks, Internet, MacBook, Malware, Malware, News, Phishing, Phishing, Podcast, Privacy, Radio Show, Radio_Show, Security, Security, Show Notes, Smishing, Spyware, Sustainable fuels, Technology, trojans, Vishing, Zero-Day
Read. Learn. Share Tech Talk Show Notes February 27, 2021 This Basic Math Shows How Wind Energy Failures Contributed To Texas’s Deadly Power Loss Why did Texas lose power? Math — apolitical, non-ideological, and sometimes cruel math. During such an extreme cold for...
Jan 1, 2021 | 00-HomePage, Apple, browsers, contact tracing, contact tracing, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, Domain Name Service, Email, Employee Training, Employees, Employees, Encryption, Go Daddy, Government, Hackers, Hacks, Information Technology, Internet, iOS, Monitoring, Mozilla Firefox, Nationstates, Networking, Phishing, Phishing, President Joe Biden, Public Health, Radio Show, Radio_Show, Ransomware, Russia, Security, Show Notes, Technology, Treasury, VPN, VPN
Tech Talk Show Notes December 27, 2020 – January 2, 2021 Mozilla praises Apple anti-tracking privacy features in iOS 14 Mozilla, the organization that maintains Firefox and other open source projects, has launched a new campaign in support of a suite of privacy...
Mar 7, 2020 | Best Practices, Business, Business Email Compromise, Compliance, Cybercrime, Cybersecurity, CyberTraining, Employees, Employees, Executives, Executives, Extortion, Financial, Hackers, Hacking, Human Element, Inattention, Insider Threat, Internet, Nationstates, Organized Crime, Phishing, Policies and Procedures, Privacy, Radio Show, Radio_Show, Security, Security, Social Engineering, Technology
Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites No matter how big you are –, you can be a victim. Business email compromise can happen to anyone, and it only takes a single moment of inattention for it to work. To carry out a...
Feb 29, 2020 | Asset Management, Best Practices, Business, Cable Companies, Cloud, Cloud Vendors, Computers, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Assets, Data Brokers, data sharing, Data Storage, Databases, Domain Name Service, Email, Employees, Executives, Financial, Future Workforce, Generation-Y, Hackers, Hacking, Hacks, Incident Response, Information Technology, Insider Threat, Internet, Internet Service Providers, IoT, Jobs, Liability, Machine Learning, Malware, Malware, MFA, Nationstates, Networking, Open Source, Organized Crime, Password Managers, Passwords, Phishing, predictive algorithms, Radio Show, Radio_Show, Ransomware, Regulation, Regulatory Compliance, Security, Security, Security Assessments, Shadow-IT, Software As A Service, Technology, Technology, Unsecured, Web Tools, Zero-Day
All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not. Companies who continue to believe that they are not technology companies...
Feb 1, 2020 | Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, DeepFake, Employees, Employees, Hackers, Hacking, Hacking, HR, Human Element, Identity Theft, industrial espionage, Insider Threat, Internet, Malware, Malware, MFA, Patching, Phishing, Phishing, Psychology, Radio Show, Radio_Show, Security, Security Alerts, Social Engineering, Technology
Most Businesses Attacked By Business Email Compromise Last Year 2019 was the year for Business Email Compromises also known as BEC attacks. In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....
Feb 1, 2020 | Attack Vectors, Audio-Visual Data, Best Practices, Biometrics, Business, Corporate Reputation, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, CyberTraining, DeepFake, Employees, Employees, Executives, Extortion, Hackers, Hacking, Hacking, Human Element, Impersonation, Incident Response, industrial espionage, Internet, Market Value, Marketing Manipulation, Patching, Radio Show, Radio_Show, records, scam, Security, Security, Security Alerts, Social Engineering, Technology, Updates
Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations. Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...
Page 1 of 4123...NEXT»Last »