Jun 7, 2023 | Facebook, Instagram, Pinterest, Snapchat, Social Media, Social Media, Twitter, WhatsApp
This comprehensive guide will equip you with the necessary knowledge to set up parental controls on popular social media platforms including Facebook, Instagram, Twitter, and TikTok. You’ll also discover reliable third-party apps and tools that can make the...
Mar 5, 2021 | Access Controls, anonymity, Attack Vectors, Best Practices, Big Tech, Breaches, Business, Chromebook, Coinseed, Compliance, CPU, CPU, credentials, Cryptocurrency, Cyber Liability, Cybersecurity, Google, Government, Hacking, Internet, Malware, News, Passwords, Patching, Podcast, Radio Show, Radio_Show, Security, Security, Show Notes, Social Media, Social Media, Social Networking, SolarWinds, Technology, Updates, Vulnerabilities, WhatsApp, Zero Trust
Read. Learn. Share. Tech Talk Show Notes March 6, 2021 Embracing a Zero Trust Security Model As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the...
Jan 15, 2021 | Amazon, anonymity, Apple, Applications, Apps, Artificial Intelligence, Big Tech, Business, CES, Consumer, Demonetize, Dragnet, Facebook, Facial Recognition, Fake News, False Positives, GeoFence Warrants, Google, Google, Google, Government, Hacking, Hacks, Internet Service Providers, Law Enforcement, Malware, Millennials, Mobile Phones, Show Notes, Social Media, Tech Overlords, Technology, Zero-Day
Tech Talk Show Notes January 10-16, 2021 WhatsApp gives users an ultimatum: Share data with Facebook or stop using the app WhatsApp, the Facebook-owned messenger that claims to have privacy coded into its DNA, is giving its 2 billion-plus users an ultimatum: agree to...
Mar 28, 2020 | Artificial Intelligence, Big Tech, Biological Viruses, Business, Coronavirus, Corporate Reputation, Covid-19, Critical data, Facebook, Instagram, Internet, LinkedIn, Machine Learning, predictive algorithms, Quarantine, Radio Show, Radio_Show, Security, Snapchat, Social Media, Social Media, Social Networking, Technology
The Risky Business Gamble of AI The worldwide pandemic of Covid-19 has increased the amount of traffic on all of the social networks. With almost everyone at home, they have more time to comment and research and share stories and opinions. This means that these...
Jan 18, 2020 | Applications, Best Practices, Business, Business Email Compromise, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, Economic Disruption, Education, Employee Training, Employees, Employment, Exploits, Fines and Penalties, Government, Hackers, Hacking, Hacks, Insider Threat, Internet, Malware, MFA, Nationstates, Organized Crime, Phishing, Phishing, Phishing, Policies and Procedures, Radio Show, Radio_Show, scam, Security, Security, Smishing, Social Engineering, Social Media, Social Media, Social Networking, Technology, Threats, Tracking
Social Engineering Comes to the Forefront of Attacks We depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...
Nov 9, 2019 | Applications, Best Practices, Business, China, Cyber breaches, cyberattacks, Cybercrime, Entertainment, Government, Hackers, Hacking, Hacking, Intellectual Property Theft, Internet, Malware, Nationstates, Patching, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Social Media, spying, Technology, TikTok, Updates
National Security and the Chinese-based Social App TikTok Have you or Do your kids use TikTok? TikTok is a wholely owned Chinese based video platform that is popular in social media circles. It boast a user base of a half-a-billion. What the government is...