Mar 7, 2020 | Access Controls, Anonymity, Applications, Best Practices, Business, Compliance, Critical data, Data Loss, DNS over HTTPS (DoH), Domain Name Service, Employees, Executives, Filtering, Internet, Intricate Data Systems, Patching, Policies and Procedures, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Technology, Technology, TOR, Updates
DNS over HTTPS (DoH) is not the Panacea the Marketers Are Leading you to Believe Mozilla Firefox is promoting its new DNS over HTTPS (DoH) as a privacy-preserving method, but in reality, it is changing how DNS works. Its not the magical user privacy cure but marketing...
Mar 7, 2020 | Big Tech, Business, data sharing, Family, Geek, Hollywood, Humor, Internet, Media, Nostalgia, Radio Show, Radio_Show, Security, Technology, Technology, Wayback Machine
Getting Your Fix of Nostalgia Have you ever found yourself nostalgic for some of the commercials, tv shows, and videos from your youth? If so, you will love The Internet Archive, VHS Vault that has more than 20K recordings for you to go through and relive your past....
Mar 7, 2020 | Asset Management, Attack Vectors, Audit Logs, Best Practices, Business, Compliance, Critical data, cyberattacks, Data, Data Assets, data sharing, Data Storage, Databases, Disaster Recovery, Hard Disks, Intricate Data Systems, Policies and Procedures, Privacy, Radio Show, Radio_Show, records, Security, Security, Technology, Unsecured
Don’t Store Data You Don’t Need Today all businesses are tech businesses. That requires that they all comply with different variations of regulatory compliance, the requirements which are often changing faster than possible implementation. Unfortunately, due to these...
Mar 7, 2020 | Access Controls, Asset Management, Best Practices, Business, Compliance, credential stealing, credentials, Critical data, Cyber Liability, cyberattacks, Data Assets, Employees, Hacking, Human Element, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Legacy Systems, Operating Systems, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Regulatory Compliance, Security, Security, Security Alerts, Technology, Technology, Third - Party, Updates
Cryptocurrencies and Insurance Increases Ransomware Profitability Ransomware is rising like a phoenix from the ashes again. Companies are paying enormous ransoms in cryptocurrencies and insurance companies paying out claims, which in turn is adding to the rise in...
Mar 7, 2020 | Applications, Attack Vectors, Audit Logs, Best Practices, Business, Business Email Compromise, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Critical data, Cyber Insurance, Cyber Liability, Cybercrime, Cybersecurity, Hacking, Internet, Malware, misconfigured environments, Patching, Policies and Procedures, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Security Assessments, SecurityThing, Technology, Technology, Third - Party, trojans, Updates
Are you Secure — Depends on Many Things If a business owner asks a cybersecurity specialist if they are secure, it will be tough for them to give them a straight and honest answer without delving into their systems and business operations. Most companies...
Mar 7, 2020 | Anti-Virus, Attack Vectors, Best Practices, Business, Cyber Liability, Cybercrime, Data Loss, Data Storage, Executives, Exploits, Hacking, Hacking, Hacking Tools, Internet, Operating Systems, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, scam, Security, Security, Security Alerts, Security Assessments, Security Services, Technology, Updates
You Don’t Have Much Time To Stop An Attack How much time do you have to secure your systems from a zero-day infection? Would it surprise you to learn that it is less than 72 hours? It is true. Locking down your systems from new vulnerabilities is essential. But just...