Dec 19, 2019 | Business, Chrome Browser, credentials, Google, Internet, Passwords, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates
Chrome 79 will continuously scan your passwords against public data breaches Best practices dictate that you should use a different password for every website, application, or program. However, many do not do this, and it is why cybercriminals can run rampant...
Dec 19, 2019 | Asset Management, Business, Data Assets, Internet, Radio Show, Radio_Show, Security, Technology
Security – Knowing What You Have Is Essential One of the most important things that a business can do to reduce their cybersecurity risk is to know what assets they have, where those assets are, who has access to those assets, how those assets are...
Dec 19, 2019 | Backup, Business, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, Data Storage, Fines and Penalties, Government, Hacking, Hacking, hacking as a service, Hacks, Incident Response, Insider Threat, Internet, Malware, Networking, Patching, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Are You At Risk from Your Outsourced Software Provider The “Cloud” is the eponymous name given for a computer server that belongs to another person or company that you have no control over. There are many companies who offer computing services to...
Dec 19, 2019 | AT&T, Best Practices, Cell Phone, cell phones, Cellular Services, Internet, Mobile Phones, Networking, Networking, News, Phone, Phones, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Security, T-Mobile, Technology, Verizon
5G – Not Ready For PrimeTime…Yet! Technology is ever-changing, and new and improved technology is consistently released and models refreshed or introduced. The next significant advancement coming our way will be in cellular technology and the...
Dec 19, 2019 | Applications, Audit Logs, Best Practices, Business, cell phones, credentials, Employees, Employees, Intellectual Property Theft, Internet, Malware, Mobile Phones, Patching, Radio Show, Radio_Show, Regulatory Compliance, safety, Security, Security, Security Alerts, spying, Technology, Updates
Business Computers Should Only Be Used For Business If an employer provides you with equipment, they expect that the computer to be used for work and work only. Many times there will be software installed on these devices that monitors your activities and...
Dec 19, 2019 | Applications, Attack Vectors, Business, Business Email Compromise, credential stealing, credentials, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Financial, Government, Hackers, Hacking, Hacking, Hacking, hacking as a service, Incident Response, industrial espionage, Insider Threat, Intellectual Property Theft, Internet, Malware, Nationstates, Networking, Operating Systems, Organized Crime, Password Managers, Passwords, Patching, Phishing, Radio Show, Radio_Show, Ransomware, Security, Security Alerts, Software As A Service, Technology, third-world, Updates, Windows (Microsoft)
Lessons We Failed To Learn and Therefore Are Doomed To Repeat It seems as every year gets worse and worse when it comes to Cyber Breaches and Cyberattacks. Compared to 2018 were have had 33% more breaches this year. They are, after all of our data, personally...