Sep 28, 2019 | Civilian Employment, Cybercrime, Databases, DOD, Internet, Military, Radio Show, Radio_Show, scam, Technology, Veterans
Cybercriminals Target Veterans Looking for Civilian Employment Taking advantage of anyone is unacceptable. However, when it targets our warriors who are seeking civilian employment at the end of their military service, I find it infuriating. Cybercriminals set up an...
Sep 28, 2019 | Best Practices, Bitcoin, Computers, Cryptocurrency, Cybercrime, Cybersecurity, Malware, Malware, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Ransomware Attack, Schools and Colleges, Security, Security
Ransomware Storm Against Schools and School Districts School Districts, Schools and Colleges across the country are under a ransomware attack. These attacks are have resulted in the widespread operational disruption. Educational institutions rank #2 in ransomware...
Sep 27, 2019 | Best Practices, Business, Data Storage, Hacking, Hard Disks, Hard Disks, Hardware, industrial espionage, Legal, Radio Show, Radio_Show, Recycling, Security, storage, Technology
Recycling Disks the Wrong Way can Bite you! Recycling old technology is big business. Companies employ life cycle management for their IT hardware. Disposing of used servers, storage, and networking equipment on your own can be expensive and time-consuming and often...
Sep 27, 2019 | Business, Business Email Compromise, Cell Phone, cell phones, CEO, Cyber breaches, Cybercrime, Email, Employees, Hackers, Hacking, Hacking, iPad, iPhone, Malware, Phishing, Radio Show, Radio_Show, Security, Smart Phone, Tablet
Spearphishing Mobile Devices of Executives Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...
Sep 27, 2019 | Advertising, browsers, Computer Repair, Computers, Consumer, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Radio Show, Radio_Show, Remote Repair, Repair, scam, Senior
“Technology Help” Cybercriminals Scam Seniors into Paying Thousands Computers began during our seasoned citizens lifetime. They did not grow up with them, and this places them at a distinct disadvantage when it comes to their level of understanding. Senior citizens...
Sep 27, 2019 | Audit Logs, Business, Coding, cyberattacks, Cybercrime, Cybersecurity, data sharing, Databases, Governance, Hacking, Nationstates, Organized Crime, Radio Show, Radio_Show, Security, Security Alerts, Technology
Audit Logs May Help You Make Your Case — If You Have Them Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...