Apr 18, 2020 | Anti-Virus, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Big Tech, browsers, Business, Cloud, Cloud, Compliance, Computers, Cyber breaches, Cyber Insurance, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Loss, Data Storage, Databases, Domain Name Service, Incident Response, industrial espionage, Information Technology, Internet, Internet Infrastructure, Networking, Patches, Patching, Privacy, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, Updates, Updates, Web Tools
Time to Invest in Cybersecurity Every company no matter the size is at high risk for a cyberattack. With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime. Much...
Mar 14, 2020 | Applications, Applications, Attack Vectors, Best Practices, Big Tech, Breaches, Compliance, Critical data, Cyber breaches, Cybercrime, Cybersecurity, Data Loss, Hackers, Hacking, industrial espionage, Insider Threat, Malware, Operating Systems, Patches, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates, Updates, Updates, Vulnerabilities
Patch As Many As You Possibly Can and Keep The Bad Guys At Bay Software updates and patches protect both your digital safety and cybersecurity. The sooner you update, the more secure you will be until the next update comes out. However, with all the cybercriminals out...
Mar 7, 2020 | Artificial Intelligence, Asset Management, Attack Vectors, Best Practices, Biometrics, Business, CEO, Clearview AI, credential stealing, Critical data, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Databases, Executives, Facial Recognition, Facial Recognition, Hackers, Hacking, Hacking, Hacks, Images, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Nationstates, Online, Organized Crime, Patches, Patching, Patents, Photo Database, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, third-world, Updates, Updates
Hackers Target Large Databases It was only a matter of time! The tiny start-up Clearview AI developed an algorithm that utilized a three billion image database that could end your ability to walk down the street anonymously. They provided it to worldwide law...
Feb 29, 2020 | Applications, Applications, Asset Management, Attack Vectors, Audit Logs, audit logs, Best Practices, Big Tech, Business, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Data Storage, Employees, Executives, Hackers, Hacking, industrial espionage, Organized Crime, Patches, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates
Businesses in Danger: Data Transfer between Cloud Apps The cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data. I constantly have to explain to...
Feb 29, 2020 | Attack Vectors, Best Practices, Business, Cloud, Cloud Vendors, Compliance, Corporate Reputation, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Databases, Fines and Penalties, Hackers, Hacking, Legal, Liability, Market Value, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Technology, Third - Party, Third-Party, Threats, Unsecured, Updates
Businesses Must Understand The Intricacies of Cloud Security It does not matter the size of the organization or the complexity of the operations businesses have been sold on the idea that “the cloud” is the answer. For MGM Resorts they found out that the data they...
Feb 8, 2020 | Applications, Attack Vectors, Best Practices, Business, Cloud, Compliance, Cyber Liability, Data Storage, Databases, Hacking, Internet, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, spying, Technology, Third - Party, Third-Party, Updates
Do You Use Trello? Search turns up massive trove of private data Do you use Trello? It is an excellent collaboration platform that I use with my team. It can be an excellent tool for project collaboration. However, it must get set up correctly if you want to...