Aug 24, 2019 | Best Practices, Biometrics, Business, Code-Breaking, Consumer, Cybercrime, Cybersecurity, Databases, Encryption, Hacking, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Technology
You Can Change Your Password but You Can’t Change Your Fingerprints The biggest known biometric data breach to date was reported recently when researchers managed to access a 23-gigabyte database of more than 27.8m records including fingerprint and facial...
Aug 24, 2019 | Best Practices, Business, CEO, Computers, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Surveillance
Employee Privacy vs Network Security: The Matchup PRACTICALLY all governments and industry regulators now demand that companies secure their enterprise networks to protect their systems and data. In responses, companies are doing everything in their capacity to...
Aug 24, 2019 | Best Practices, Business, Cybercrime, Hackers, Malware, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Security, Security, Technology
Ransomware Attacks Strike 20% of Americans Cybercriminals have been using ransomware to profit off of unprepared victims for more than a decade. Ransomware rose to infamy when the WannaCry and NotPetya attacks struck the world. Recently, attackers have...
Aug 17, 2019 | Banking, Best Practices, Breaches, Business, Cyber breaches, Cybercrime, Cybersecurity, Data, Hackers, Hacking, Hacking, Hacking, Hacks, Passwords, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Technology, Under Arrest
Turns Out It Wasn’t Just Capital One Federal prosecutors say a woman charged in a massive data breach at Capital One may have hacked more than 30 other organizations. Paige Thompson, of Seattle, was arrested last month after the FBI said she obtained personal...
Aug 17, 2019 | Best Practices, Business, Cybercrime, CyberTraining, Employees, Employees, Hackers, Hacking, Hacking, Liability, Malware, Malware, Passwords, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Regulatory Compliance, scam, Security, Security, Technology
Phishing — Best Practices One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...
Aug 17, 2019 | Best Practices, Business, Cybersecurity, Cybersecurity Professional, CyberTraining, Employees, Employees, Employment, Future Workforce, Radio Show, Radio_Show, Regulatory Compliance, Resources, Security, Security, Security Assessments, Security Services, Technology
Want To Be A Security Pro —- Tips Here! As cyber criminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are currently nearly 3 million unfilled cybersecurity jobs...