Apr 18, 2020 | bank account information, Business, fraudster, Government, Internet, IRS, Radio Show, Radio_Show, Security, Stimulus, stolen identity, Technology
Stimulus Payments Easy to Intercept If you are expecting a check from the US government you may be in for a surprise if you are one of the millions that are not required to file a tax return. For these people, the IRS has set up a site where they can give...
Apr 18, 2020 | Business, Cybercrime, DeepFake, Internet, Malware, Porn Scams, Radio Show, Radio_Show, Ransomware, Security, Sextortion, Technology
Watch out – Porn Scams by Email are back! Cybercriminals will try just about any tactic they can to get you to click on and accept their malware. One of their most successful have been scams related to pornography. These scams surround the possible situation...
Mar 7, 2020 | Anti-Virus, Attack Vectors, Best Practices, Business, Cyber Liability, Cybercrime, Data Loss, Data Storage, Executives, Exploits, Hacking, Hacking, Hacking Tools, Internet, Operating Systems, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, scam, Security, Security, Security Alerts, Security Assessments, Security Services, Technology, Updates
You Don’t Have Much Time To Stop An Attack How much time do you have to secure your systems from a zero-day infection? Would it surprise you to learn that it is less than 72 hours? It is true. Locking down your systems from new vulnerabilities is essential. But just...
Feb 22, 2020 | Applications, Best Practices, Business, Cloud, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, data sharing, Data Storage, Hacking, Hacking, Hacks, Intellectual Property Theft, Internet, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, scam, Security, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Sharp Increase in Exposed Records by Third-Party Applications Businesses are finding themselves at severe risk from Third-party applications and services. Vetting of these services and restrictions on what data they can access is the primary reason. Cybercriminals...
Feb 15, 2020 | Airbnb, Business, Homes and Villas, Hospitality, Internet, Internet Properties, News, Radio Show, Radio_Show, Rentals, scam, Security, Social Media, Technology, Text Messages, Threats, Travel, VRBO
Scammers have found a fertile field in Airbnb How many of you have used Airbnb as an alternative to a hotel or for an extended stay option? Many times it works out well but like everything once successful the bad guys get into the game and scams begin and it all goes...
Feb 1, 2020 | Attack Vectors, Audio-Visual Data, Best Practices, Biometrics, Business, Corporate Reputation, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, CyberTraining, DeepFake, Employees, Employees, Executives, Extortion, Hackers, Hacking, Hacking, Human Element, Impersonation, Incident Response, industrial espionage, Internet, Market Value, Marketing Manipulation, Patching, Radio Show, Radio_Show, records, scam, Security, Security, Security Alerts, Social Engineering, Technology, Updates
Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations. Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...