Mar 5, 2021 | Access Controls, anonymity, Attack Vectors, Best Practices, Big Tech, Breaches, Business, Chromebook, Coinseed, Compliance, CPU, CPU, credentials, Cryptocurrency, Cyber Liability, Cybersecurity, Google, Government, Hacking, Internet, Malware, News, Passwords, Patching, Podcast, Radio Show, Radio_Show, Security, Security, Show Notes, Social Media, Social Media, Social Networking, SolarWinds, Technology, Updates, Vulnerabilities, WhatsApp, Zero Trust
Read. Learn. Share. Tech Talk Show Notes March 6, 2021 Embracing a Zero Trust Security Model As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the...
Jan 29, 2021 | Applications, Automation, Automotive, Big Tech, browsers, Chrome, Cloud, Cloud Jacking, Cyber breaches, Cybercrime, Cybersecurity, Data Aggregator, Data Brokers, DIA, Dragnet, Edge, GeoFence Warrants, Government, Hackers, Hacking, Hacks, Internet, Law Enforcement, Location Data, Malware, Nationstates, North Korea, Passwords, Privacy, Radio Show, Radio_Show, safety, Security, Security, Show Notes, Spyware, Technology, trojans
Read. Learn. Share TECH TALK SHOW NOTES January 30, 2021 Cloud Jacking: The Bold New World of Enterprise Cybersecurity Those with their finger on the pulse of emerging cybersecurity threats are already aware that there’s a new danger in town: cloud jacking. The...
May 16, 2020 | Business, FIDO, Internet, MFA, Microsoft, Passwords, Radio Show, Radio_Show, Security, Technology, token
Microsoft wants You to Use FIDO instead of Passwords Passwords are a security issue, but primarily the problem with passwords is human behavior. People choose an insecure password, reuse them on multiple sites, don’t change them, and share them with colleagues....
May 9, 2020 | Best Practices, Business, Collaboration Tools, credential stealing, Internet, Passwords, Passwords, Radio Show, Radio_Show, Security, Security, Technology
Credential Security is Essential when using Collaboration Platforms Microsoft teams gained popularity as a collaboration platform to use as you telecommute to the office during this pandemic. As part of this platform, Teams utilize some automated notifications. Well,...
Apr 28, 2020 | Business, Features, iHeart, Internet, Pwned, Security, Technology
Pawned Accounts Hi. Craig Peterson here with a blink into the stolen account business, also known as “Pwning.” [Prounced “poned” as in p-owned] Pwned means that your account has been the victim of a data breach. Your username and password have been stolen from a...
Apr 25, 2020 | Best Practices, Business, Consumer, Cybercrime, Data Loss, Hackers, Hacking, Internet, Networking, Networking, Password Managers, Passwords, Patching, Privacy, Radio Show, Radio_Show, Routers, Routers, Security, Security, Security Alerts, Technology, Technology, Updates
Hijacked Routers – Securing Them Requires Password Reset Hackers have found a way to hijack user accounts and change the user settings on Linksys routers that use Smart WiFi accounts. When this is done users are now redirected them to malware sites. The Smart...
Page 1 of 5123...5...NEXT»Last »