Feb 29, 2020 | Applications, Best Practices, Big Tech, Business, COPPA, Data Aggregator, Data Brokers, data sharing, Education, Elementary School, Future Workforce, Google, Google, Grade School, High School, High School, Information Technology, Internet, Legal, Liability, Location Data, Machine Learning, predictive algorithms, Psychology, Radio Show, Radio_Show, Resources, School Districts, Schools and Colleges, Security, Security, Software Manufacturers, Technology, Tracking
Big Tech taking Advantage of Our Kids Technology costs money. The sooner that everyone learns this the safer we will be. There is no way to offer technology services for free you will pay some way. For many that cost comes through the loss of private information....
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...
Jan 4, 2020 | Android, Android, anonymity, Asset Management, audit logs, Cell Phone, cell phones, Cellular Services, Censorship, College, College, Cybersecurity, Data Assets, data sharing, Education, iOS, iPhone, Mobile, Mobile Phones, Monitoring, Online, Phone, Privacy, Radio Show, Radio_Show, safety, Schools and Colleges, Security, Smart Phone, spying, Surveillance, Tracking
How is your Social Credit Score? It turns out that some American Universities use them to track their students. Have you heard of the app called SpotterEDU? Initially developed by a college basketball coach who used it to track his athletes as they traveled to their...
Nov 23, 2019 | Applications, Big Tech, Business, CEO, Computers, cyberattacks, Government, Hacking, Hacking, Internet, Microsoft, Microsoft, Microsoft, Radio Show, Radio_Show, Ransomware, Ransomware Attack, Security, Technology, Windows (Microsoft)
Tackling Ransomware on Windows Microsoft has 1 billion Windows-OS powered PCs in use worldwide which explains why they are such a big target for hackers. There are a number of Windows security threats that everyone needs to be aware of including potentially...
Sep 28, 2019 | Best Practices, Bitcoin, Computers, Cryptocurrency, Cybercrime, Cybersecurity, Malware, Malware, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Ransomware Attack, Schools and Colleges, Security, Security
Ransomware Storm Against Schools and School Districts School Districts, Schools and Colleges across the country are under a ransomware attack. These attacks are have resulted in the widespread operational disruption. Educational institutions rank #2 in ransomware...