Feb 29, 2020 | Business, compromised machines, Corporate Reputation, Critical data, Cryptocurrency, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data, Data Assets, Databases, Disaster Recovery, Financial, Hacking, Malware, Malware, Radio Show, Radio_Show, Ransomware, Security, Security, Technology, Technology, trojans, Zero-Day
Businesses Beware: Ransomware is on the rise, again Companies are under attack from Ransomware gangs and are paying a high price. Cybercriminals who were surreptitiously using business computing resources to mine cryptocurrencies have found that with the huge drop in...
Feb 29, 2020 | Asset Management, Best Practices, Business, Cable Companies, Cloud, Cloud Vendors, Computers, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Assets, Data Brokers, data sharing, Data Storage, Databases, Domain Name Service, Email, Employees, Executives, Financial, Future Workforce, Generation-Y, Hackers, Hacking, Hacks, Incident Response, Information Technology, Insider Threat, Internet, Internet Service Providers, IoT, Jobs, Liability, Machine Learning, Malware, Malware, MFA, Nationstates, Networking, Open Source, Organized Crime, Password Managers, Passwords, Phishing, predictive algorithms, Radio Show, Radio_Show, Ransomware, Regulation, Regulatory Compliance, Security, Security, Security Assessments, Shadow-IT, Software As A Service, Technology, Technology, Unsecured, Web Tools, Zero-Day
All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not. Companies who continue to believe that they are not technology companies...
Feb 15, 2020 | Access Controls, Applications, Attack Vectors, Audit Logs, audit logs, automation, Business, Compliance, credentials, Cyber breaches, Data, data sharing, Elections, Elections, Government, Internet, Intricate Data Systems, Malware, News, Online Voting, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, Voting Apps, Voting Technology
The security mistakes made by the Iowa Democratic Party in creating their App Last week there was a caucus in Iowa. Caucuses by their very nature are prone to manipulation and miscounting. Then you add in the fact that the party chose to use a new technology that was...
Feb 15, 2020 | ACLU, Big Tech, Business, Civil Rights, Data, Data Aggregator, Data Brokers, Data Storage, Databases, DHS, Government, Internet, Legal, Radio Show, Radio_Show, Security, Technology
DHS wants to track illegal aliens using available cell-phone location data. ACLU says Whoa! We have a problem with illegal immigrants. Now don’t get me wrong we love immigrants and they can add a lot to our economy but those immigrants come to our country through...
Jan 25, 2020 | Big Tech, Biometrics, Business, Data, Databases, Facial Recognition, Location Data, Monitoring, Privacy, Radio Show, Radio_Show, Security, Software, Software Manufacturers, Technology, Tracking
Privacy Gone: Tech Start-up Has Huge Facial Recognition Database What if I told you that there was a biometric artificial intelligence program that might end privacy as we know it… would you believe me? What if I told you that the company that developed it was...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...