Dec 19, 2019 | Applications, Audit Logs, Best Practices, Business, cell phones, credentials, Employees, Employees, Intellectual Property Theft, Internet, Malware, Mobile Phones, Patching, Radio Show, Radio_Show, Regulatory Compliance, safety, Security, Security, Security Alerts, spying, Technology, Updates
Business Computers Should Only Be Used For Business If an employer provides you with equipment, they expect that the computer to be used for work and work only. Many times there will be software installed on these devices that monitors your activities and...
Dec 7, 2019 | Attack Vectors, Consumer, Hacking, Hacking, Internet, IoT, Malware, Pet Monitoring, Privacy, Psychology, Radio Show, Radio_Show, safety, Security, Security Alerts, Smart Speakers, spying, Technology, Zero-Day
Peeping on Toms Many of us have a lovable tomcat who stays at home while we are at work. We all love our pets! Now taking care of them is getting even easier with the advent of an assortment of digital and technological devices. This sector is growing...
Nov 30, 2019 | Business, Computers, Cyber breaches, cyberattacks, Cybercrime, Data Storage, Employees, Firewalls, Hackers, Hacking, Hacking, Hacking, Insider Threat, Intellectual Property Theft, Internet, Malware, Malware, Networking, Networking, Patching, Privacy, Radio Show, Radio_Show, Routers, Security, Security Alerts, segmentation, Technology, Updates, Vulnerabilities
Why Zero Trust Is the Answer to Internet Everywhere Connections Everyone everywhere has a mobile device, and connections to the internet are available whenever we want it. In our connected world, it means that keeping your businesses secure means fighting a...
Nov 23, 2019 | Android, Android, AT&T, Big Tech, Business, Cell Phone, cell phones, Cellular Services, Google, Google, Internet, Jailbreak, Malware, Mobile, Mobile Phones, Operating Systems, Patching, Phone, Phones, Radio Show, Radio_Show, Security, Security Alerts, Smart Phone, T-Mobile, Technology, Updates, Verizon, Zero-Day
Reduce Vulnerabilities by Ditching Android Like I repeatedly explain to people to ask me about Android. Android is not Android is not Android. Every Android phone is unique because the Manufacturers are allowed to freely create applications and interfaces and...
Nov 16, 2019 | Anti-Virus, Anti-Virus, Applications, Best Practices, Business, Consumer, Cyber breaches, Cybercrime, Cybersecurity, Data, Hackers, Hacking, McAfee, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Updates, Vulnerabilities, Zero-Day
Vulnerability in Popular Anti-Virus Program McAfee anti-virus software has a very serious vulnerability in its code execution. No matter what edition of McAfee software you are using because all editions are vulnerable. The vulnerability allows malware to...
Nov 9, 2019 | Applications, Artificial Intelligence, Audit Logs, Best Practices, Business, credentials, Cyber breaches, cyberattacks, Cybercrime, CyberTraining, data sharing, Data Storage, Databases, Employees, Employees, Firewalls, Firewalls, Hackers, Hacking, Hacking, Hacks, Hard Disks, Intellectual Property Theft, Laptops, Liability, Malware, Malware, Networking, Networking, Patching, Radio Show, Radio_Show, Ransomware, Routers, Security, Security, Security Alerts, segmentation, Software As A Service, Switches, Technology, Updates
Cyberbreaches cause Small Businesses to Close Cybercriminals have found a lucrative new target – the small business. Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly....