Sep 14, 2019 | Best Practices, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, Legal, Radio Show, Radio_Show, Security, Security, Technology
Successful Cybercriminals Require Your Help Most cybercriminals target people, not infrastructure: More than 99% of emails distributing malware from 2018 into 2019 required human interaction to click links, open documents, accept security warnings, or complete other...
Sep 14, 2019 | apps, Best Practices, Big Tech, Business, Cloud, Cyber breaches, Cybersecurity, Data, data sharing, Data Storage, Health, Legal, Liability, Privacy, privacy, Radio Show, Radio_Show, Security, Security, Security, Software, storage, Technology, Tracking
HIPAA Can’t Protect Privacy In Medical Apps Americans may soon be able to get their medical records through smartphone apps as easily as they order takeout food from Seamless or catch a ride from Lyft. But prominent medical organizations are warning that...
Sep 14, 2019 | Big Tech, Business, Computers, Data, data sharing, Financial, Fines and Penalties, Google, Google, Google, Law Enforcement, Legal, Liability, Radio Show, Radio_Show, Regulation, Security, Software, Software Manufacturers, Technology, Valuations
No More Hiding -Google’s Tactics Under Scrutiny On Monday, 50 attorneys general from US states and territories signed onto an antitrust investigation into Google, placing even more pressure on the major tech firm that is already facing intense scrutiny over its...
Sep 14, 2019 | 5G, Android, Android, Best Practices, Cell Phone, cell phones, Cellular Services, Consumer, Cybersecurity, Data, Internet, iOS, IoT, iPhone, Legal, Mobile, Mobile Phones, Networking, Phone, Radio Show, Radio_Show, Security, Security, Smart Phone, Surveillance, Technology, WiFi
Security Demands Up With 5G Zhou Hongyi, co-founder of Chinese internet security provider Qihoo 360 Technology, expects the rollout of 5G mobile services and expansion of the industrial internet to open up more opportunities for the company in the world’s second...
Aug 24, 2019 | automation, bluetooth, Business, Cyber breaches, Cybercrime, Hackers, Hacking, Hacking, Health, Infosec, Internet, IoT, Legal, Liability, Medical Technology, Patents, Radio Show, Radio_Show
Security First Mindset evades Medical Devices leaving them Vulnerable “Everything with a powerpoint is probably connected, or will be shortly,” says Christopher Neal, chief information security officer (CISO) of Ramsay Health Care....
Aug 17, 2019 | Backup, Best Practices, Business, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Storage, Encryption, Hacking, Legal, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Assessments
Your Cyber Insurance Policy Probably Won’t Pay Out More businesses are recognizing the need for cyber insurance as part of an overall security strategy. Here are some key points to consider when evaluating, purchasing, and relying on a policy. After years of...