Nov 9, 2019 | anonymity, Applications, Audit Logs, audit logs, automation, Big Tech, Business, Cloud Vendors, Code-Breaking, Computers, Consumer, credentials, Cyber breaches, Data, Data Storage, Databases, Elections, Elections, Encryption, Government, Hackers, Hacking, Hard Disks, Internet, Legal, Machine Learning, Malware, Nationstates, Networking, Online Voting, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Updates, Voting Technology
Online Voting is a Disaster waiting to Happen If it is connected it can be hacked. The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...
Nov 9, 2019 | Applications, Applications, Artificial Intelligence, Audit Logs, audit logs, automation, Best Practices, bluetooth, Business, cameras, cyberattacks, Cybercrime, Cybersecurity, Encryption, gadgets, Hackers, Hacking, Hacking, Health, Hospital, Infosec, Internet, IoT, Liability, Malware, Mobile Phones, Patches, Patching, Privacy, privacy, Radio Show, Radio_Show, safety, Security, Security, Security, Security, Security Alerts, segmentation, Smart Home, Software, Technology, Third-Party, Updates, Updates
Cybercrime is Zeroing in on Healthcare Organizations It seems that almost everything today is connected and more connections to the internet are made daily. One industry where this is more problematic is Healthcare. Why? Medical data is worth big bucks — up to...
Oct 19, 2019 | anonymity, Anonymity, Business, Encryption, Government, Hacking, Internet, Monitoring, Radio Show, Radio_Show, Security, Security, spying, Surveillance, Technology, TOR
Protect your Anonymity is all about Layers The acronym, TOR, stands for The Onion Router or a system of security encryption that can protect anonymity. While some use it for nefarious purposes, it began as a project at the United States Naval Research...
Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...
Oct 19, 2019 | cyberattacks, Cybercrime, Cybersecurity, Email, Encryption, Government, Hacking, Internet, Nationstates, News, Online, Organized Crime, Privacy, Radio Show, Radio_Show, Security, Technology
Standing our Ground on Encryption – without it, we will lose all Privacy! According to the US Consitution, we have the right to be secure in our persons, houses, and papers. Unlike 1787 when they wrote the constitution, today, “our papers” are digitally...
Oct 12, 2019 | Business, Consumer, Cybercrime, Encryption, Government, Hackers, Hacking, Home, Malware, Nationstates, Networking, Networking, NSA, NSA, Organized Crime, Radio Show, Radio_Show, Security, Technology, VPN, VPN
Popular VPNs Are Vulnerable To Exploit Out of all the topics that my listeners inquire about, none is more prevalent than VPNs and VPN security. Unlike what the advertisements seem to indicate (like Norton VPN advertisements you’ve heard on the radio), a VPN is...