Jun 15, 2019 | Apple, Facebook, Marketing, Monitoring, Passwords, Privacy, Radio Show, Radio_Show, Security, Software, Technology, Tracking, Web Tools
Multiple Logins The Bane of Modern Online Life In our online lives today, it seems like every time you turn around, you are required to sign in to something, create an account for something to use their services. Every app seems to require its specific login. Google...
Jun 15, 2019 | Business, Data, data sharing, Internet Service Providers, Online, Privacy, Radio Show, Radio_Show, Security
Using You for Profits Many companies take our information and use it to make profits to enrich themselves. Some we share with, and others get our information without our approval because it is shared with them by another vendor with whom we chose to do business. Who...
Jun 15, 2019 | Backup, Business, Computers, Cybersecurity, Data, data sharing, Data Storage, Databases, Networking, Privacy, Radio Show, Radio_Show, Ransomware, Regulation, Resources, Security, Security, Technology
CEOs and Business Owners Aren’t Taking CyberSecurity Seriously — And Are Facing Huge Penalties In the last two weeks, warnings about two massive vulnerabilities have hit the wires. They involve two of the largest manufacturers of software and components,...
Jun 15, 2019 | Business, Data, data sharing, Data Storage, Databases, DNA, Law Enforcement, Legal, News, Open Source, Privacy, Radio Show, Radio_Show, Resources, Science, Security, Technology, Tracking
Technology and Databases have Murderers and Rapists Crying Foul Did you hear about how the Golden State Killer was finally apprehended? If you are not familiar with the story, the Golden State Killer spend ten years on a murderous spree carrying out at least 12...
Jun 1, 2019 | Data, Data Storage, Google, Passwords, Privacy, Radio Show, Radio_Show, Resources, Security, Software, Technology, Web Tools
Why Are We Still Trusting Google? Can you believe that a technology company that sells companies the ability to use a suite of their services — failed to protect their login credentials? Yes, that’s right. You pay us, and we will leave your login’s and...
Jun 1, 2019 | bluetooth, Cybersecurity, gadgets, hardware token, Laptops, Passwords, Privacy, Radio Show, Radio_Show, Security, Security, WiFi
You know that I advise people to use 2FA. But Google’s token has a problem that might affect you. Just this week Google announced that their two-factor authentication FOB, called Titan, has a vulnerability that allows it to be hacked by anyone who is within 30...