Mar 21, 2020 | Anti-Virus, Attack Vectors, Biological Viruses, Business, CoronaVirus, Coronavirus, Government, Internet, Malware, News, Phishing, Radio Show, Radio_Show, Security, Signature-Based, Technology, Zero-Day
Malware Infecting PC’s of Those Just Wanting More Coronavirus Infection Information Cybercriminals are constantly changing their tactics and creating new ways to spread their malware to hack and exploit users. With the coronavirus acting as a pandemic and spreading...
Feb 29, 2020 | Business, compromised machines, Corporate Reputation, Critical data, Cryptocurrency, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data, Data Assets, Databases, Disaster Recovery, Financial, Hacking, Malware, Malware, Radio Show, Radio_Show, Ransomware, Security, Security, Technology, Technology, trojans, Zero-Day
Businesses Beware: Ransomware is on the rise, again Companies are under attack from Ransomware gangs and are paying a high price. Cybercriminals who were surreptitiously using business computing resources to mine cryptocurrencies have found that with the huge drop in...
Feb 29, 2020 | Asset Management, Best Practices, Business, Cable Companies, Cloud, Cloud Vendors, Computers, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Assets, Data Brokers, data sharing, Data Storage, Databases, Domain Name Service, Email, Employees, Executives, Financial, Future Workforce, Generation-Y, Hackers, Hacking, Hacks, Incident Response, Information Technology, Insider Threat, Internet, Internet Service Providers, IoT, Jobs, Liability, Machine Learning, Malware, Malware, MFA, Nationstates, Networking, Open Source, Organized Crime, Password Managers, Passwords, Phishing, predictive algorithms, Radio Show, Radio_Show, Ransomware, Regulation, Regulatory Compliance, Security, Security, Security Assessments, Shadow-IT, Software As A Service, Technology, Technology, Unsecured, Web Tools, Zero-Day
All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not. Companies who continue to believe that they are not technology companies...
Feb 1, 2020 | Access Controls, Anti-Virus, Applications, Attack Vectors, Audit Logs, Best Practices, Business, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Disaster_Preparedness, Hackers, Hacking, Hacking, Incident Response, Legacy Systems, Liability, Malware, Monitoring, Operating Systems, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Updates, Zero-Day
Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure. Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered. That means that they were not designed...
Jan 25, 2020 | Attack Vectors, audit logs, Best Practices, Big Tech, Business, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Hacking, Legacy Systems, Microsoft, Microsoft, Microsoft, Operating Systems, Patching, Privacy, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Technology, Updates, Windows 7, Zero-Day
No Security for Windows 7 After Today Are you using Windows 7? Did you know some of the largest firms in the country (even large financial institutions) are still using it? Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...
Jan 18, 2020 | Applications, Big Tech, browsers, Business, Compliance, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Firefox, Government, Hackers, Hacking, Hacking, Homeland Security, Internet, Legacy Systems, Malware, Mozilla Firefox, Nationstates, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, Vulnerabilities, warnings, Zero-Day
Zero-Day Browser Vulnerabilities “This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...