Feb 8, 2020 | 5G, Attack Vectors, Best Practices, Business, Internet, IoT, Networking, Networking, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Tracking, Updates, updates and patches
5G Will Be Built-In to Almost Every Device Later This Year — Is Your Security Stance Ready? With 5G on the horizon, we are starting to see a significant expansion of the “Internet of Things” — and it is creating a huge security challenge for businesses! A...
Feb 8, 2020 | Attack Vectors, Business, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Exploits, Hacking, Internet, Israel, Nationstates, NSO Group, Patching, Radio Show, Radio_Show, Security, Security Alerts, spying, Spyware, Technology, Updates
Israeli Company’s Spyware Used to Hack US Citizens. FBI Now Involved. US Companies and Citizens may have had their information compromised by the Israeli company, NSO Group through their smartphone-based surveillance software utilized to gather intelligence....
Feb 8, 2020 | Applications, Audit Logs, Business, CEO, Cloud, Compliance, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Databases, Disaster Recovery, Executives, Foreign Currency Exchange, Hackers, Hacking, Incident Response, Internet, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Security, Technology
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You? We have all heard about Ransomware and the toll it can take on businesses of all sizes. The rate of attacks has doubled in Q4, and the...
Feb 8, 2020 | Applications, Big Tech, Business, Cloud, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, Malware, Microsoft, Microsoft, Nationstates, Radio Show, Radio_Show, Russia, Security, Security Alerts, Technology, third-world, Windows (Microsoft)
“Evil Corp” really does exist, and it’s distributing malware using Microsoft Excel Yes, there is an Evil Corp, and it is a Russian backed group of Cybercriminals. They are busy weaponizing Microsoft’s popular spreadsheet package, Excel, so that it...
Feb 8, 2020 | Apple, Apple, Attack Vectors, Best Practices, Big Tech, Business, Computers, Corporate Reputation, Cybersecurity, Data Assets, Data Storage, Exploits, FBI, Government, Hacking, Internet, iOS, Mobile, Mobile Phones, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Security First, Surveillance, Technology
Apple is being two-faced about its security. Turns out they have a backdoor key to our backups. Reports say that Apple is not going to allow customers to fully encrypt backups of the iOS data they store in iCloud after the FBI demanded access two years ago. Any...
Feb 8, 2020 | Best Practices, Business, CEO, Corporate Reputation, Cybercrime, Cybersecurity, Economic Disruption, Employees, Executives, Executives, Extortion, Hackers, Hacking, ID Theft, industrial espionage, Internet, Nationstates, Organized Crime, Radio Show, Radio_Show, Security, Security, Technology, third-world, Uncategorized
Our Personal and Brand Reputations are At-Risk By Nation-States Nation-States are no longer interested in just disrupting our politics. Not much money in that. With armies of cybercriminals, nation-states are going after our businesses with the goal of economic...