Apr 25, 2020 | Amazon, Amazon, Applications, Big Tech, Biological Viruses, Business, CEO, Consumer, Coronavirus, Corporate Reputation, Covid-19, Deliveries, Family, groceries, Home, Internet, Online, Quarantine, Radio Show, Radio_Show, Resources, Retail, Retail, Sales, Scalability, Shopping, shopping, Technology, Technology, Third - Party
Pandemic Customers Buy but Amazon Can’t Deliver With our shopping abilities deeply curtailed by this forced government self-isolation to prevent the spread of COVID-19, we have turned to those who can supply our needs through online shopping. Turns out that for many...
Feb 29, 2020 | Applications, Best Practices, Big Tech, Business, COPPA, Data Aggregator, Data Brokers, data sharing, Education, Elementary School, Future Workforce, Google, Google, Grade School, High School, High School, Information Technology, Internet, Legal, Liability, Location Data, Machine Learning, predictive algorithms, Psychology, Radio Show, Radio_Show, Resources, School Districts, Schools and Colleges, Security, Security, Software Manufacturers, Technology, Tracking
Big Tech taking Advantage of Our Kids Technology costs money. The sooner that everyone learns this the safer we will be. There is no way to offer technology services for free you will pay some way. For many that cost comes through the loss of private information....
Nov 23, 2019 | anonymity, automation, Big Data, Big Tech, Big Tech, Business, Business Email Compromise, Computers, Consumer, cyberattacks, Data, data sharing, Data Storage, Databases, Encryption, Hackers, Hacking, Hacking, Hacking, Internet, Liability, Machine Learning, Monitoring, Radio Show, Radio_Show, Resources, Security, Software, Technology
Big Data, Data Brokers and Your Information Big Data brokers collect our data and establish “hidden” ratings about us before selling it to those who will pay. This information is used by marketers, insurance companies, credit companies, and merchants. ...
Nov 9, 2019 | Applications, Applications, Audit Logs, Best Practices, Business, cyberattacks, Hacking, Hacking, Internet, Judicial, Legal, Liability, Patches, Patching, Radio Show, Radio_Show, Ransomware, Ransomware, Resources, Security, Security, Security Alerts, Software As A Service, Software Manufacturers, Technology, Third-Party, Updates
Lawfirm Software attacked by Ransomware Legal offices use case management software to assist them in preparing for trials. One of the largest providers is a company called TrialWorks. Unfortunately, a cybercriminal was able to launch a REvil/Sodinokibi...
Sep 7, 2019 | Applications, Best Practices, Big Tech, Business, Consumer, Cybercrime, Cybersecurity, Data, data sharing, Employee Training, Facebook, Facebook, Google, Hacking, LinkedIn, LinkedIn, Radio Show, Radio_Show, Resources, Security, Social Media, Social Networking, Software, Software As A Service, storage, Technology, Web Tools
Companies Sharing Your Data with Their Third-Party Vendors It seems that every day there’s another news headline about how companies are using consumer data. Facebook was in the news again recently when the FTC slapped it with a $5 billion fine based on...
Aug 17, 2019 | Best Practices, Business, Cybersecurity, Cybersecurity Professional, CyberTraining, Employees, Employees, Employment, Future Workforce, Radio Show, Radio_Show, Regulatory Compliance, Resources, Security, Security, Security Assessments, Security Services, Technology
Want To Be A Security Pro —- Tips Here! As cyber criminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are currently nearly 3 million unfilled cybersecurity jobs...