Jan 25, 2020 | Attack Vectors, audit logs, Best Practices, Big Tech, Business, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Hacking, Legacy Systems, Microsoft, Microsoft, Microsoft, Operating Systems, Patching, Privacy, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Technology, Updates, Windows 7, Zero-Day
No Security for Windows 7 After Today Are you using Windows 7? Did you know some of the largest firms in the country (even large financial institutions) are still using it? Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...
Jan 18, 2020 | Applications, Big Tech, browsers, Business, Compliance, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Firefox, Government, Hackers, Hacking, Hacking, Homeland Security, Internet, Legacy Systems, Malware, Mozilla Firefox, Nationstates, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, Vulnerabilities, warnings, Zero-Day
Zero-Day Browser Vulnerabilities “This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...
Jan 11, 2020 | Access Controls, Amazon, Apple, Asset Management, Attack Vectors, audit logs, Backup, Big Tech, Business, Computers, Cyber breaches, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Employee Training, Employment, Encryption, Fines and Penalties, Google, Hacking, Incident Response, industrial espionage, Insider Threat, Internet, Jobs, Legal, Liability, Malware, Malware, Microsoft, Monitoring, Networking, predictive algorithms, Radio Show, Radio_Show, Ransomware, Security, Software As A Service, Surveillance, Technology, Zero-Day
How Mature is Your Insider Threat Intelligence? Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...
Jan 11, 2020 | Anti-Virus, Applications, Attack Vectors, Best Practices, Business, Computers, Cybercrime, Cybersecurity, Data, Hackers, Hacking, Incident Response, Internet, Legacy, Legacy Systems, Malware, Passwords, Patches, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Compliance, Security, Security, Security Assessments, Software, Technology, Updates, Vulnerabilities, Zero-Day
Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...
Jan 4, 2020 | Advertising, Applications, Attack Vectors, brain development, Brain Fitness, Business, cyberattacks, Cybercrime, Cybersecurity, Data, Exploits, Facebook, Google, Hackers, Hacking, Hacks, Health, Infosec, iOS, Malware, Mental Fatigue, Mobile, Mobile Phones, Nationstates, Patching, Ransomware, Security, Security Alerts, spying, Tracking, Updates, Vulnerabilities
Pesky Apps That You Need To Delete ASAP Not all Apps are Good Apps… Depressive Apps. With everyone curating an unrealistic, heavily manufactured, idealized version of their lives, we all start to believe other people’s lives are so much better than...