Jan 11, 2020 | Amazon, anonymity, Apple, Applications, Asset Management, Audit Logs, audit logs, Big Tech, Big Tech, Business, CCPA, Chrome Browser, Compliance, Computers, Cyber Liability, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Databases, Encryption, Financial, Fines and Penalties, Google, Government, Hacking, Internet, Legislation, Malware, Microsoft, Monitoring, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, spying, Technology, Updates, Windows (Microsoft)
Businesses In For Rude Awakening as CCPA Takes Full Effect What use of technology do you use to give you the edge? Do you use outsourced technology platforms and services? Do you know what data you collect and where all your data is stored? California’s...
Dec 7, 2019 | Business, Business Email Compromise, Cyber Insurance, Cybercrime, Cybersecurity, Databases, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Patching, Radio Show, Radio_Show, Ransomware, safety, Security, Security Alerts, Technology, Updates
Protecting Company Assets and Cybersecurity Insurance Cybercriminals are carrying out more sophisticated attacks on businesses than ever before and that required companies to spend more trying to protect their data and intellectual property. One of the pieces...
Nov 23, 2019 | anonymity, automation, Big Data, Big Tech, Big Tech, Business, Business Email Compromise, Computers, Consumer, cyberattacks, Data, data sharing, Data Storage, Databases, Encryption, Hackers, Hacking, Hacking, Hacking, Internet, Liability, Machine Learning, Monitoring, Radio Show, Radio_Show, Resources, Security, Software, Technology
Big Data, Data Brokers and Your Information Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...
Nov 9, 2019 | Applications, Artificial Intelligence, Audit Logs, Best Practices, Business, credentials, Cyber breaches, cyberattacks, Cybercrime, CyberTraining, data sharing, Data Storage, Databases, Employees, Employees, Firewalls, Firewalls, Hackers, Hacking, Hacking, Hacks, Hard Disks, Intellectual Property Theft, Laptops, Liability, Malware, Malware, Networking, Networking, Patching, Radio Show, Radio_Show, Ransomware, Routers, Security, Security, Security Alerts, segmentation, Software As A Service, Switches, Technology, Updates
Cyberbreaches cause Small Businesses to Close Cybercriminals have found a lucrative new target – the small business. Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly....
Nov 9, 2019 | anonymity, Applications, Audit Logs, audit logs, automation, Big Tech, Business, Cloud Vendors, Code-Breaking, Computers, Consumer, credentials, Cyber breaches, Data, Data Storage, Databases, Elections, Elections, Encryption, Government, Hackers, Hacking, Hard Disks, Internet, Legal, Machine Learning, Malware, Nationstates, Networking, Online Voting, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Updates, Voting Technology
Online Voting is a Disaster waiting to Happen If it is connected it can be hacked. The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...
Oct 5, 2019 | Artificial Intelligence, Artificial Intelligence, Artificial Intelligence, Big Tech, Computers, Data Storage, Databases, Health, Images, Machine Learning, Radio Show, Radio_Show, Software, Technology, X-ray
FDA Approves New X-ray Technology System That Implements Machine Learning Algorithms. Artificial Intelligence is coming to a hospital near you. Well, not exactly. What we have is machine learning, and it is a precursor to real artificial intelligence. Machine learning...