Aug 24, 2019 | automation, bluetooth, Business, Cyber breaches, Cybercrime, Hackers, Hacking, Hacking, Health, Infosec, Internet, IoT, Legal, Liability, Medical Technology, Patents, Radio Show, Radio_Show
Security First Mindset evades Medical Devices leaving them Vulnerable “Everything with a powerpoint is probably connected, or will be shortly,” says Christopher Neal, chief information security officer (CISO) of Ramsay Health Care....
Aug 24, 2019 | Business, credentials, Cyber breaches, Cybercrime, Cybersecurity, Hacking, Hacking, Passwords, Radio Show, Radio_Show, Security, Technology
Your Login Credentials are Keys to the Kingdom for Hackers A recent study published by Google estimates that 1.5% of all login credentials used across the web have been compromised in data breaches and are vulnerable to credential stuffing attacks. Google has...
Aug 24, 2019 | Best Practices, Biometrics, Business, Code-Breaking, Consumer, Cybercrime, Cybersecurity, Databases, Encryption, Hacking, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Technology
You Can Change Your Password but You Can’t Change Your Fingerprints The biggest known biometric data breach to date was reported recently when researchers managed to access a 23-gigabyte database of more than 27.8m records including fingerprint and facial...
Aug 18, 2019 | automation, Business, China, Hackers, Hacking, Hacking, Infosec, Internet, IoT, Malware, Monitoring, Nationstates, Privacy, Radio Show, Radio_Show, Russia, Security, Surveillance
IoT – Putting our Business Networks and Security at Risk IoT – Putting our Networks and Security at Risk Just take a look at any website or catalog, and you will see the availability of hundreds to thousands of connected devices touted to make your...
Aug 17, 2019 | Banking, Best Practices, Breaches, Business, Cyber breaches, Cybercrime, Cybersecurity, Data, Hackers, Hacking, Hacking, Hacking, Hacks, Passwords, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Technology, Under Arrest
Turns Out It Wasn’t Just Capital One Federal prosecutors say a woman charged in a massive data breach at Capital One may have hacked more than 30 other organizations. Paige Thompson, of Seattle, was arrested last month after the FBI said she obtained personal...
Aug 17, 2019 | Best Practices, Business, Cybercrime, CyberTraining, Employees, Employees, Hackers, Hacking, Hacking, Liability, Malware, Malware, Passwords, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Regulatory Compliance, scam, Security, Security, Technology
Phishing — Best Practices One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...