Latest Shows

Listen and Read

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

The Latest!

Unmasking the Windows Wardrobe: Your Data is The Show, Microsoft is The Spectator! Secure it Now!

Unmasking the Windows Wardrobe: Your Data is The Show, Microsoft is The Spectator! Secure it Now!

Hey there, cyber-savvy folks! Your friendly neighborhood cyber security influencer here, ready to dive into the fascinating world of Microsoft Windows and its behind-the-scenes data collection!  Microsoft's operating systems, Windows 11 and Windows 10, are widely popular and used by millions around the globe. But did you know they have a sneaky side in collecting your data? Fear not, my friends! I've got some solid tips and tricks to help bolster your privacy defenses. Let's get started!  Number 1: Privacy Settings:  First things first, head over to your Windows Settings and take control of your privacy. Accomplish this by reviewing each section related to data collection and making preferential adjustments to all settings. Remember, it's your data, so make it work for you!  How to get to the privacy settings 1. Click on the "Start" button at your desktop's bottom left corner. 2. This will open the Start menu. From here, click on the "Settings" gear icon. 3. The Windows Settings...

Never Miss a Patch: Proven Strategies to Ensure You Get The Necessary Patches On-time

Never Miss a Patch: Proven Strategies to Ensure You Get The Necessary Patches On-time

Patches are out there; But you have to know where to look for them. The good news is that patches are available for most devices. The bad news is that they're not always easy to find and install, especially if you don't know what you're doing. If you decide to go looking for a patch yourself, be prepared: there are lots of websites out there claiming they have the latest version of your favorite program or operating system--but many of these sites are scams designed solely as money-making tools (and not even good ones at that). If it seems too good to be true, it probably is! Instead, stick with trusted sources like Apple's App Store or Microsoft's Windows Store; these companies have strict guidelines about what kind of content can appear on their stores' pages so as not to get sued into oblivion by angry customers who bought something that didn't work correctly or at all after downloading it from somewhere else online instead of directly from them first before taking any precautions...

The Game of ‘Spy the Breach’ in a Hybrid Office – Catching Data Thieves with Style

The Game of ‘Spy the Breach’ in a Hybrid Office – Catching Data Thieves with Style

The hybrid working model became increasingly popular during and since the pandemic. It has brought benefits to individuals and organizations alike, such as increased flexibility and lower overheads. It has also been beneficial for the environment by reducing commuting. However, security teams face a new challenge in responding to vulnerabilities and cyber threats due to remote work practices; phishing attacks are more likely when staff is not in the office, which presents opportunities for criminals. In addition, despite many employees now being familiar with this way of working, adapting to new strategies is still proving difficult. Detecting data breaches can be challenging, even when organizations use the same network and employ various security solutions such as antivirus and anti-malware. Organizations may often only know that a system breach occurred once they receive a notification from a third party or trace stolen data back to them. Hackers work hard to avoid detection, so...

Protect Yourself From Falling Victim to Buying and Selling Scammers

Protect Yourself From Falling Victim to Buying and Selling Scammers

In the last couple of months, I've had at least six friends I can think of who have almost fallen for scams where people pretended they were buying or selling something. The scams ranged from hiring them for services through selling a Model-A Ford. In all but one of the cases my friends thought something fishy might have been going on, so they contacted me to see what I thought. Speaking of Fords, I was looking for a new F-150 pickup truck online. Found a great deal and contacted the seller. I asked why it was so cheap and they gave me a poor excuse, so I dug into it a little more. I did a reverse image search on Google to see if the photo of the truck had been found elsewhere and... it had. The bad guy had copied a photo from a legitimate car dealer posting and put it in their fake advertisement. I confronted them with a question about what I had found and I never heard from them again. Too bad, it was a nice truck 😉 E-commerce has its benefits. But, you must stay alert to common...

Don’t Take the Bait: Unmasking Phishing Scams Targeting Small Businesses & How to Fight Back

Don’t Take the Bait: Unmasking Phishing Scams Targeting Small Businesses & How to Fight Back

Phishing is a deceptive technique cybercriminals use to trick individuals into revealing sensitive information, such as passwords and financial data. Small businesses are particularly vulnerable to these attacks, as they often lack the resources and expertise of larger organizations to implement robust cybersecurity measures. This blog post will explore real-world examples of successful phishing campaigns targeted toward small businesses, illustrating the methods used and their impact. By understanding these tactics, you can take steps to protect your business and customers from similar attacks. Example 1: The Shark Gets Bit - Barbara Corcoran's Phishing Attack Shark Tank host and renowned business expert Barbara Corcoran fell victim to a phishing scam, losing $380,000. The scammers used an email address that appeared to belong to Corcoran's assistant but was misspelled by one letter. The email contained a fake invoice from FFH Concept GmbH, a legitimate German company, for...

Don’t Get Hooked: Essential Tips to Shield Yourself from Phishing Attacks

Don’t Get Hooked: Essential Tips to Shield Yourself from Phishing Attacks

In a Trend Micro Report by Security Company Egress and IBM's Cost of Data Breach Report 2022, we see that 92% of organizations fell victim to phishing attacks, making phishing one of the most common initial attack vectors resulting in 16% of all company data breaches. Last year, phishing victims reported over $52 million in losses, with each phishing attack costing corporations $4.91 million on average. Additionally, these companies suffered a loss of customer trust, reputation, and market value, along with regulatory fines. If the website is asking for your personal information, be wary. Many websites will ask you to enter your email address or other sensitive information like a phone number, and they'll often say that it's necessary to sign up or use their service. This isn't always true; many services only ask for this information so that they can spam/phish you later on down the line. Phishing is a scam that uses fake emails or websites to steal personal information. It's most...

Craig’s Comprehensive Guide for Parents on Monitoring and Regulating Children’s Social Media Activity

Craig’s Comprehensive Guide for Parents on Monitoring and Regulating Children’s Social Media Activity

This comprehensive guide will equip you with the necessary knowledge to set up parental controls on popular social media platforms including Facebook, Instagram, Twitter, and TikTok. You'll also discover reliable third-party apps and tools that can make the process easier. Moreover, we'll emphasize the significance of having open communication with your children regarding their online activities. Then, I will review some third-party Parental Control tools you can use, some talking points for your children, and additional resources. Setting Up Parental Controls on Social Media Platforms Facebook Desktop Log in to your child's Facebook account. Click the downward arrow at the top right corner and select "Settings & Privacy." Choose "Settings," then "Privacy" on the left sidebar. Adjust the privacy settings, such as who can see their posts, send friend requests, and view their profile. Mobile Open the Facebook app and log in to your child's account. Tap on the three horizontal lines...

10 Myths about Keeping Your Information Safe and Secure Online: Myths And Tips To Help You Save Valuable Time and Money

10 Myths about Keeping Your Information Safe and Secure Online: Myths And Tips To Help You Save Valuable Time and Money

The internet is an excellent tool for keeping in touch with friends, finding new recipes, getting your news, and doing your shopping. But there are a lot of myths out there about how to keep your information safe and secure online. In this post, we'll look at some of these myths and give tips on saving valuable time and money. Myth: I need antivirus software to protect my computer. Fact: You don't need additional antivirus software for most people. Microsoft Defender is about as good as consumer-level antivirus can be these days, and it comes preinstalled on your computer if it's running Windows 10 or 8.1 (or later). If you're still using an older version of Windows, consider using malware bytes instead of buying extra antivirus software. It has a strong reputation for being lightweight, effective, and easy to use--and its free version won't slow down your machine as some other security programs might.* Malwarebytes doesn't have the same kind of brand recognition as some other brands...