Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...
Oct 12, 2019 | Best Practices, Business, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacks, industrial espionage, Internet, Malware, Radio Show, Radio_Show, Security, Security, Technology
More Than Three-Quarters of US Businesses Are CyberAtttack Targets Cybersecurity incidents are up! Hackers worldwide favorite target du jour are U.S. small and medium-sized businesses. Unfortunately, for many, they have fallen back on the false idea they are...
Sep 28, 2019 | Best Practices, Business, Government, Insider Threat, Radio Show, Radio_Show, Security, Security, Technology
Insider Threats and DoD Response Insider threats are a danger to every organization. While all threat actors have motives, insiders enjoy ideal means and opportunity. From the inside, they are in a much better position to carry out damaging activities....
Sep 28, 2019 | Best Practices, Bitcoin, Computers, Cryptocurrency, Cybercrime, Cybersecurity, Malware, Malware, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Ransomware Attack, Schools and Colleges, Security, Security
Ransomware Storm Against Schools and School Districts School Districts, Schools and Colleges across the country are under a ransomware attack. These attacks are have resulted in the widespread operational disruption. Educational institutions rank #2 in ransomware...
Sep 27, 2019 | Best Practices, Business, Data Storage, Hacking, Hard Disks, Hard Disks, Hardware, industrial espionage, Legal, Radio Show, Radio_Show, Recycling, Security, storage, Technology
Recycling Disks the Wrong Way can Bite you! Recycling old technology is big business. Companies employ life cycle management for their IT hardware. Disposing of used servers, storage, and networking equipment on your own can be expensive and time-consuming and often...
Sep 23, 2019 | Best Practices, Business, Cyber breaches, cyberattacks, Cybercrime, Email, Hacking, Hacking, industrial espionage, Nationstates, Organized Crime, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, scam, Security, Security, spying, Technology
Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...