Feb 23, 2023 | Authentication, Best Practices, Business, credentials, Credentials, Cyber Security, Cybersecurity, Hacking, ID Theft, Microsoft, Microsoft, Password Managers, Passwords, Passwords, Privacy, Security, Security, stolen identity, Technology, Threats, Windows (Microsoft)
Locking down your files with a strong password is like putting a virtual lock on your front door. It helps protect your personal or sensitive information from prying eyes, cyber-attacks, or theft. Whether you’re sharing your computer with others or working in a...
Apr 25, 2020 | Best Practices, Business, Consumer, Cybercrime, Data Loss, Hackers, Hacking, Internet, Networking, Networking, Password Managers, Passwords, Patching, Privacy, Radio Show, Radio_Show, Routers, Routers, Security, Security, Security Alerts, Technology, Technology, Updates
Hijacked Routers – Securing Them Requires Password Reset Hackers have found a way to hijack user accounts and change the user settings on Linksys routers that use Smart WiFi accounts. When this is done users are now redirected them to malware sites. The Smart...
Feb 29, 2020 | 2FA, Best Practices, credentials, Password Managers, Passwords, Privacy, Radio Show, Radio_Show, Security, Security, Social Influencers, Technology
Passwords: Length trumps Complexity Complex passwords that must be changed every 90 days are the bain of most companies and a headache for employees and they are not as secure as you have been led to believe. The reason is that people have to write them down. They...
Feb 29, 2020 | Asset Management, Best Practices, Business, Cable Companies, Cloud, Cloud Vendors, Computers, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Assets, Data Brokers, data sharing, Data Storage, Databases, Domain Name Service, Email, Employees, Executives, Financial, Future Workforce, Generation-Y, Hackers, Hacking, Hacks, Incident Response, Information Technology, Insider Threat, Internet, Internet Service Providers, IoT, Jobs, Liability, Machine Learning, Malware, Malware, MFA, Nationstates, Networking, Open Source, Organized Crime, Password Managers, Passwords, Phishing, predictive algorithms, Radio Show, Radio_Show, Ransomware, Regulation, Regulatory Compliance, Security, Security, Security Assessments, Shadow-IT, Software As A Service, Technology, Technology, Unsecured, Web Tools, Zero-Day
All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not. Companies who continue to believe that they are not technology companies...
Dec 19, 2019 | Applications, Attack Vectors, Business, Business Email Compromise, credential stealing, credentials, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Financial, Government, Hackers, Hacking, Hacking, Hacking, hacking as a service, Incident Response, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Malware, Nationstates, Networking, Operating Systems, Organized Crime, Password Managers, Passwords, Patching, Phishing, Radio Show, Radio_Show, Ransomware, Security, Security Alerts, Software As A Service, Technology, third-world, Updates, Windows (Microsoft)
Lessons We Failed To Learn and Therefore Are Doomed To Repeat It seems as every year gets worse and worse when it comes to Cyber Breaches and Cyberattacks. Compared to 2018 were have had 33% more breaches this year. They are, after all of our data, personally...
Nov 1, 2019 | Business, Hacking, Internet, Password Managers, Passwords, Privacy, Radio Show, Radio_Show, safety, Security
Common Password Vulnerabilities and How to Avoid Them There are a couple of interesting articles this week discussing one of my favorite subjects because it can make a significant impact on your security stance. Breaches that could result in data loss are the...