Sep 28, 2019 | Civilian Employment, Cybercrime, Databases, DOD, Internet, Military, Radio Show, Radio_Show, scam, Technology, Veterans
Cybercriminals Target Veterans Looking for Civilian Employment Taking advantage of anyone is unacceptable. However, when it targets our warriors who are seeking civilian employment at the end of their military service, I find it infuriating. Cybercriminals set up an...
Sep 27, 2019 | Audit Logs, Business, Coding, cyberattacks, Cybercrime, Cybersecurity, data sharing, Databases, Governance, Hacking, Nationstates, Organized Crime, Radio Show, Radio_Show, Security, Security Alerts, Technology
Audit Logs May Help You Make Your Case — If You Have Them Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...
Aug 24, 2019 | Best Practices, Biometrics, Business, Code-Breaking, Consumer, Cybercrime, Cybersecurity, Databases, Encryption, Hacking, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Technology
You Can Change Your Password but You Can’t Change Your Fingerprints The biggest known biometric data breach to date was reported recently when researchers managed to access a 23-gigabyte database of more than 27.8m records including fingerprint and facial...
Aug 10, 2019 | automation, Best Practices, Breaches, Business, Cybercrime, Cybersecurity, Data, Data Storage, Databases, Equifax, Hacking, News, Privacy, Radio Show, Radio_Show, Security, Security, settlement
Did You Get Your Equifax Settlement? Settlement Drained in a WeekSo many people have made claims in the data-breach settlement against consumer credit rating agency Equifax that, according to the Federal Trade Commission, each claimant is now likely to get...
Aug 3, 2019 | Biography, Book, Data Storage, Databases, Encryption, Government, Memoir, Monitoring, Privacy, Radio Show, Radio_Show, Security, Surveillance, Technology
Edward Snowden the Book Edward Snowden, the former CIA employee and National Security Agency contractor who spilled some of the deepest secrets of the US government’s electronic surveillance operations, has written a memoir. Permanent Record, published by...
Aug 3, 2019 | Children, Cybercrime, Databases, Education, Hackers, Hacking, Radio Show, Radio_Show, School Districts, Technology
Hackers Stick a Bullseye on Schools and School Districts Some hackers demand ransom; others sweep up personal data for sale to identity thieves. But whatever hackers’ motives, school systems around the country have been the targets of their cyberattacks. One attack...