Jan 11, 2020 | Asset Management, Attack Vectors, Audit Logs, automation, Best Practices, Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Data, Data Assets, DOD, Economic Disruption, Email, Firewalls, Government, Hackers, Hacking, Hacking Tools, Homeland Security, Incident Response, Internet, Iran, Law Enforcement, Nationstates, Networking, Operating Systems, Patching, Phishing, Phishing, Policies and Procedures, Privacy, Radio Show, Radio_Show, Routers, Security, Security, Security Alerts, segmentation, Switches, Technology, Third - Party, third-world, Updates, Wiper Malware
Bomb’s will not be Iran’s retaliation – Technological hacks are more likely Microsoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and...
Dec 19, 2019 | AT&T, Best Practices, Cell Phone, cell phones, Cellular Services, Internet, Mobile Phones, Networking, Networking, News, Phone, Phones, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Security, T-Mobile, Technology, Verizon
5G – Not Ready For PrimeTime…Yet! Technology is ever-changing, and new and improved technology is consistently released and models refreshed or introduced. The next significant advancement coming our way will be in cellular technology and the...
Nov 30, 2019 | Business, Data, Data Storage, Incident Response, Internet, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Security, Technology, Vulnerabilities
Upping your Incident Response Game — New Regulations coming If you are a business and you have data on any Massachusetts resident or do business in Massachusetts, coming in early January, there are new data collection requirements with which you will need...