The Latest in Tech Today
Patch As Many As You Possibly Can and Keep The Bad Guys At Bay
Patch As Many As You Possibly Can and Keep The Bad Guys At BaySoftware updates and patches protect both your digital safety and cybersecurity. The sooner you update, the more secure you will be until the next update comes out. However, with all the cybercriminals out...
Have Your Phone — It Might Get You Questioned About A Crime!
Have Your Phone -- It Might Get You Questioned About A Crime! You come home from a long day at work and sit down at your computer to check your email to find an email from Google’s legal investigations support team informing you that local police were demanding...
Want To Search Dark Web? It May Soon Be Easier with New Search Engine
Want To Search Dark Web? It May Soon Be Easier with New Search Engine There are three parts to the Internet. The part we know of as the “web” is the surface web and is only one of the elements. The other two sections are the Deep Web, which is the non-indexed part,...
Doc in the Big Box – Medicine for the Masses
Doc in the Big Box - Medicine for the MassesOne of the most significant societal changes is the demand for convenience in every area of our lives. We spend time online looking for discounts and options, yet we have increasingly higher expectations for products and...
Revised Apple Policy Rules for Apps in App Store
Revised Apple Policy Rules for Apps in App StoreDevelopers of apps distributed through the Apple App Store will be subject to a new set of guidelines and policies distributed this week. Some of these changes are controversial. Some of the revisions include mobile...
Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites
Anyone Can Be A Victim - Business Email Compromise Does Not Play Favorites No matter how big you are --, you can be a victim. Business email compromise can happen to anyone, and it only takes a single moment of inattention for it to work. To carry out a business email...
DNS over HTTPS (DoH) is not the Panacea the Marketers Are Leading you to Believe
DNS over HTTPS (DoH) is not the Panacea the Marketers Are Leading you to BelieveMozilla Firefox is promoting its new DNS over HTTPS (DoH) as a privacy-preserving method, but in reality, it is changing how DNS works. Its not the magical user privacy cure but marketing...
Getting Your Fix of Nostalgia
Getting Your Fix of NostalgiaHave you ever found yourself nostalgic for some of the commercials, tv shows, and videos from your youth? If so, you will love The Internet Archive, VHS Vault that has more than 20K recordings for you to go through and relive your past....
Don’t Store Data You Don’t Need
Don’t Store Data You Don’t NeedToday all businesses are tech businesses. That requires that they all comply with different variations of regulatory compliance, the requirements which are often changing faster than possible implementation. Unfortunately, due to these...
Cryptocurrencies and Insurance Increases Ransomware Profitability
Cryptocurrencies and Insurance Increases Ransomware ProfitabilityRansomware is rising like a phoenix from the ashes again. Companies are paying enormous ransoms in cryptocurrencies and insurance companies paying out claims, which in turn is adding to the rise in cyber...
Are you Secure — Depends on Many Things
Are you Secure -- Depends on Many ThingsIf a business owner asks a cybersecurity specialist if they are secure, it will be tough for them to give them a straight and honest answer without delving into their systems and business operations. Most companies spending lots...
You Don’t Have Much Time To Stop An Attack
You Don’t Have Much Time To Stop An AttackHow much time do you have to secure your systems from a zero-day infection? Would it surprise you to learn that it is less than 72 hours? It is true. Locking down your systems from new vulnerabilities is essential. But just as...
Hackers Target Large Databases
Hackers Target Large DatabasesIt was only a matter of time! The tiny start-up Clearview AI developed an algorithm that utilized a three billion image database that could end your ability to walk down the street anonymously. They provided it to worldwide law...
Big Tech taking Advantage of Our Kids
Big Tech taking Advantage of Our KidsTechnology costs money. The sooner that everyone learns this the safer we will be. There is no way to offer technology services for free you will pay some way. For many that cost comes through the loss of private information. It...
Businesses Beware: Ransomware is on the rise, again
Businesses Beware: Ransomware is on the rise, againCompanies are under attack from Ransomware gangs and are paying a high price. Cybercriminals who were surreptitiously using business computing resources to mine cryptocurrencies have found that with the huge drop in...
Businesses in Danger: Data Transfer between Cloud Apps
Businesses in Danger: Data Transfer between Cloud AppsThe cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data. I constantly have to explain to...
Passwords: Length trumps Complexity
Passwords: Length trumps ComplexityComplex passwords that must be changed every 90 days are the bain of most companies and a headache for employees and they are not as secure as you have been led to believe. The reason is that people have to write them down. They...
Businesses Must Understand The Intricacies of Cloud Security
Businesses Must Understand The Intricacies of Cloud Security It does not matter the size of the organization or the complexity of the operations businesses have been sold on the idea that “the cloud” is the answer. For MGM Resorts they found out that the data they...
Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe
Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe Apple designs their computers with a security-first mindset but that does not mean that they are not able to be compromised by enterprising cybercriminals. Although, just like with all news...
Liability belongs to You: Misconfigured Clouds and Security
Liability belongs to You: Misconfigured Clouds and SecurityCompanies that were sold on Cloud Services as a cost-effective solution to maintaining a corporate server with specialized software were ill-equipped to understand all of the technological security...
All Businesses are Tech Businesses – Like it or Not
All Businesses are Tech Businesses - Like it or NotThe world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not. Companies who continue to believe that they are not technology companies are...
Automotive Apps originally designed for Personal Owners cause headaches for rental agencies.
Automotive Apps originally designed for Personal Owners cause headaches for rental agencies.Automotive companies designed apps to assist their car owners to easily access some of the features of their automobiles. However, during the design process, they failed to...
1.77 Billion – That is how much Businesses lost last year to Business Email Compromises
1.77 Billion - That is how much Businesses lost last year to Business Email Compromises One of the most significant cybersecurity dangers to Businesses is known as Business Email Compromise attacks. These types of attacks are carried out by cybercriminals and are...
Four States Use A Flaw Filled Mobile Voting App
Four States Use A Flaw Filled Mobile Voting AppCreating a secure voting application is near to impossible. WIth hackers right on the tails of technology working to thwart every advantage, it will be a long while until we can create an app that could assure the...
Iranian Hackers Exploit VPNs Worldwide
Iranian Hackers Exploit VPNs WorldwideLast year major companies that make VPN servers were found to have security holes in them and now it appears according to a recent report that government cyber hackers from Iran have been exploiting these publicly announced...
IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus
IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus Whenever there is a big story in the News you will find Cybercriminals willing and eager to exploit people using keywords and topics from news stories. With all the stories about the Coronavirus that...
Be Careful of Extensions on Chrome – Many found to Upload Your Private Data.
Be Careful of Extensions on Chrome - Many found to Upload Your Private Data. Many companies provide extensions or plug-ins for the very popular Chrome browser. Unfortunately, some of these companies are shady and have ulterior motives that include grabbing your...
Sharp Increase in Exposed Records by Third-Party Applications
Sharp Increase in Exposed Records by Third-Party Applications Businesses are finding themselves at severe risk from Third-party applications and services. Vetting of these services and restrictions on what data they can access is the primary reason. Cybercriminals...
Shadow-IT: Employees putting Business at Risk
Shadow-IT: Employees putting Business at RiskThere are robust computers in every employee’s possession. And they carry them everywhere. Yes, I am talking about their cellphones. On these devices, they can download 1000’s of apps. These apps allow them to create...
Ransomware rings adapt to business declarations by Revealing Stolen Data
Ransomware rings adapt to business declarations by Revealing Stolen DataDid you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world. Even the most prepared organization have found themselves...