Apr 25, 2020 | Android, anonymity, Apple, Applications, apps, Big Tech, Biological Viruses, Business, contact tracing, Coronavirus, Covid-19, Covid-19, Epidemiology, Google, Government, Internet, Mobile, Mobile Phones, Monitoring, Monitoring, Pandemic, Privacy, privacy, Public Health, Quarantine, Radio Show, Radio_Show, Security, Security, Surveillance, Technology, Technology, Tracking
Contract Tracing = Limited Privacy Inital projected models for the spread of this novel virus were designed specifically to ramp up fear. Big Tech and Governments are working on ways to try to control the spread of a pandemic that frankly is really not much worse than...
Feb 1, 2020 | anonymity, Applications, Applications, apps, Attack Vectors, audit logs, Best Practices, Business, CEO, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Executives, Executives, Extortion, Hackers, Hacking, Hacking, Internet, Location Data, Malware, Monitoring, Phishing, Phishing, Phone, Phones, privacy, Radio Show, Radio_Show, Security, Security, Smart Phone, Software, Surveillance, Technology, third-world, Video
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack Who are you hiring? Did you do your due diligence? I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince. ...
Nov 9, 2019 | Applications, Applications, Artificial Intelligence, Audit Logs, audit logs, automation, Best Practices, bluetooth, Business, cameras, cyberattacks, Cybercrime, Cybersecurity, Encryption, gadgets, Hackers, Hacking, Hacking, Health, Hospital, Infosec, Internet, IoT, Liability, Malware, Mobile Phones, Patches, Patching, Privacy, privacy, Radio Show, Radio_Show, safety, Security, Security, Security, Security, Security Alerts, segmentation, Smart Home, Software, Technology, Third-Party, Updates, Updates
Cybercrime is Zeroing in on Healthcare Organizations It seems that almost everything today is connected and more connections to the internet are made daily. One industry where this is more problematic is Healthcare. Why? Medical data is worth big bucks — up to...
Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...
Sep 14, 2019 | apps, Best Practices, Big Tech, Business, Cloud, Cyber breaches, Cybersecurity, Data, data sharing, Data Storage, Health, Legal, Liability, Privacy, privacy, Radio Show, Radio_Show, Security, Security, Security, Software, storage, Technology, Tracking
HIPAA Can’t Protect Privacy In Medical Apps Americans may soon be able to get their medical records through smartphone apps as easily as they order takeout food from Seamless or catch a ride from Lyft. But prominent medical organizations are warning that...