Tech Talk Show Notes March 6, 2021

Tech Talk Show Notes March 6, 2021

Read. Learn. Share. Tech Talk Show Notes March 6, 2021 Embracing a Zero Trust Security Model As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the...
Tech Talk Show Notes March 6, 2021

Tech Talk Show Notes January 24 – 30, 2021

Read. Learn. Share TECH TALK SHOW NOTES January 30, 2021 Cloud Jacking: The Bold New World of Enterprise Cybersecurity Those with their finger on the pulse of emerging cybersecurity threats are already aware that there’s a new danger in town: cloud jacking. The...
Credential Security is Essential when using Collaboration Platforms

Credential Security is Essential when using Collaboration Platforms

Credential Security is Essential when using Collaboration Platforms Microsoft teams gained popularity as a collaboration platform to use as you telecommute to the office during this pandemic. As part of this platform, Teams utilize some automated notifications. Well,...
Pawned Accounts

Pawned Accounts

Pawned Accounts Hi. Craig Peterson here with a blink into the stolen account business, also known as “Pwning.” [Prounced “poned” as in p-owned]     Pwned means that your account has been the victim of a data breach. Your username and password have been stolen from a...
Hijacked Routers – Securing Them Requires Password Reset

Hijacked Routers – Securing Them Requires Password Reset

Hijacked Routers – Securing Them Requires Password Reset Hackers have found a way to hijack user accounts and change the user settings on Linksys routers that use Smart WiFi accounts. When this is done users are now redirected them to malware sites. The Smart...