Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...
Aug 31, 2019 | Business, Business Email Compromise, CEO, Cyber breaches, Cybercrime, Employees, Employees, Hackers, Hacking, Hacking, Phishing, Phishing, Radio Show, Radio_Show, Security
Business Email Compromise Group Charged in Bust Eighty people have been charged for their roles in a massive and complex fraud operation that attempted to steal $46 million in business email compromise (BEC) and romance scams, according to the US Department of...
Aug 31, 2019 | Applications, Business, cyberattacks, Cybersecurity, Email, Email, Employees, Employees, Hacking, O365, Phishing, Radio Show, Radio_Show, Technology
The number of Users Makes this Company a Hacking Target One of the biggest players in enterprises is Microsoft and because they are so huge they are a target for phishers because if they can compromise a single user they can get access to your entire O365...
Aug 17, 2019 | Best Practices, Business, Cybercrime, CyberTraining, Employees, Employees, Hackers, Hacking, Hacking, Liability, Malware, Malware, Passwords, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Regulatory Compliance, scam, Security, Security, Technology
Phishing — Best Practices One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...
Aug 17, 2019 | Best Practices, Business, Cybersecurity, Cybersecurity Professional, CyberTraining, Employees, Employees, Employment, Future Workforce, Radio Show, Radio_Show, Regulatory Compliance, Resources, Security, Security, Security Assessments, Security Services, Technology
Want To Be A Security Pro —- Tips Here! As cyber criminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are currently nearly 3 million unfilled cybersecurity jobs...
Aug 17, 2019 | Backup, Best Practices, Business, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Storage, Encryption, Hacking, Legal, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Assessments
Your Cyber Insurance Policy Probably Won’t Pay Out More businesses are recognizing the need for cyber insurance as part of an overall security strategy. Here are some key points to consider when evaluating, purchasing, and relying on a policy. After years of...