The Latest in Tech Today
Cyber War isn’t Coming It is already Here!
Cyber War isn’t Coming It is already Here!Wars today are less likely to be kinetic, and it is safe to assume that the primary mode of retaliation from Iran will be a cyber attack. Iran wants to bring down the U.S., and the fastest way to do that is to damage us...
How Mature is Your Insider Threat Intelligence?
How Mature is Your Insider Threat Intelligence?Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...
Zeroing In On our Industrial Control Systems
Zeroing In On our Industrial Control Systems The country of Iran has been recruiting and training an army of cyberhackers and developing digital tools that can disruptively sabatoge entire computer networks. Now they are focusing their efforts on SCADA systems often...
Metrics Can Not Adequately Describe The Pain of Cybercrime
Metrics Can Not Adequately Describe The Pain of Cybercrime How can you measure the effect of a cybersecurity incident on your company? Knowing the number of records involved and the costs incurred by the event, but it can not give you a complete picture because there...
Hackers Preying on Old and Decrepit Technology
Hackers Preying on Old and Decrepit TechnologyCybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older vulnerable...
Nebulous Budget and Security Concerns Affecting Cloudy Decisions
Nebulous Budget and Security Concerns Affecting Cloudy Decisions Everyone is talking about "the cloud," and many of the more prominent forecasting firms are saying that the revenue from this technology will exceed 350 billion in the next three years. However, I have...
Bomb’s will not be Iran’s retaliation – Technological hacks are more likely
Bomb's will not be Iran's retaliation - Technological hacks are more likelyMicrosoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and former United States...
Cloud Migration Considerations to Take into Account
Cloud Migration Considerations to Take into Account Deciding to move to business technology services to "the Cloud" is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest level of the...
Soon Most New Cars May feature Light Detecting, and Ranging (LIDAR) Sensors
Soon Most New Cars May feature Light Detecting, and Ranging (LIDAR) SensorsIn an announcement on Thursday, the Tier 1 auto-parts maker Bosch is planning to use remote pulsed laser light sensors to measure distances, officially known as LIDAR. They are one of the few...
Businesses In For Rude Awakening as CCPA Takes Full Effect
Businesses In For Rude Awakening as CCPA Takes Full EffectWhat use of technology do you use to give you the edge? Do you use outsourced technology platforms and services? Do you know what data you collect and where all your data is stored? California's Consumer...
Did the Russians get Anywhere close to Hacking our 2016 Election?
Did the Russians get Anywhere close to Hacking our 2016 Election? Like with most of the hacks, it all begins the same way, unpatched vulnerable systems, and untrained personnel. That is all it takes for an opportunistic criminal or nation-state hacker to gain...
Can fasting add years to your life in addition to helping you lose weight?
Can fasting add years to your life in addition to helping you lose weight?Did you know that Craig and his wife (Karen) have been using Intermittent Fasting for almost three years now? It has done wonders for our health, and now the rest of the world is taking notice. ...
Intermittent Fasting and its Perks
Intermittent Fasting and its PerksFat loss is an excellent reason to fast, but it isn't the only benefit of fasting. Intermittent fasting makes your day simpler. Intermittent fasting helps you live longer. Intermittent fasting may reduce cancer risks. Intermittent...
Pesky Apps That You Need To Delete ASAP
Pesky Apps That You Need To Delete ASAPNot all Apps are Good Apps... Depressive Apps. With everyone curating an unrealistic, heavily manufactured, idealized version of their lives, we all start to believe other people's lives are so much better than our own. It...
How is your Social Credit Score? It turns out that some American Universities use them to track their students.
How is your Social Credit Score? It turns out that some American Universities use them to track their students.Have you heard of the app called SpotterEDU? Initially developed by a college basketball coach who used it to track his athletes as they traveled to their...
The New World Owners — Influencers
The New World Owners -- InfluencersIn twelve years, our President may be a Youtube star! Oh -- let us hope not. Did you know that most of today's influencers are just single person start-ups? What makes them unique is their ability to spot trends and then experiment...
Biological Warfare Against Chinese Pig Farmers.
Biological Warfare Against Chinese Pig Farmers. A bizarre battle between pig farmers and criminal gangs is happening in China. Farmers began using anti-drone technology to stop gangs of criminals from infecting their livestock with diseases that have killed more than...
Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone.
Vulnerable Location data -- It does not take an Expert to Spy on your Every Movement with Your Phone. The media tracked President Donald Trump's movements during the campaign using cellphone data. Using leaked phone data to track the movements, one of his Secret...
Who is tracking your web movements? Use Firefox if you want to know
Who is tracking your web movements? Use Firefox if you want to know We all are tracked, as we browse the internet, but by which sites are tracking? Mozilla has added a new feature to its Firefox browser that lets you know how often our tracked when website...
Getting the Perfect Tech Gift for Your Special “Techie”
Getting the Perfect Tech Gift for Your Special "Techie" Do you have a "Techie" on your Christmas list? If so, here are some ideas for those who live and breathe technology and enjoy using the latest, greatest, and best tech available.
Chrome 79 will continuously scan your passwords against public data breaches
Chrome 79 will continuously scan your passwords against public data breaches Best practices dictate that you should use a different password for every website, application, or program. However, many do not do this, and it is why cybercriminals can run rampant...
Security – Knowing What You Have Is Essential
Security - Knowing What You Have Is Essential One of the most important things that a business can do to reduce their cybersecurity risk is to know what assets they have, where those assets are, who has access to those assets, how those assets are accessed....
Are You At Risk from Your Outsourced Software Provider
Are You At Risk from Your Outsourced Software Provider The "Cloud" is the eponymous name given for a computer server that belongs to another person or company that you have no control over. There are many companies who offer computing services to businesses...
5G – Not Ready For PrimeTime…Yet!
5G - Not Ready For PrimeTime...Yet! Technology is ever-changing, and new and improved technology is consistently released and models refreshed or introduced. The next significant advancement coming our way will be in cellular technology and the launching of 5G...
Business Computers Should Only Be Used For Business
Business Computers Should Only Be Used For Business If an employer provides you with equipment, they expect that the computer to be used for work and work only. Many times there will be software installed on these devices that monitors your activities and...
Lessons We Failed To Learn and Therefore Are Doomed To Repeat
Lessons We Failed To Learn and Therefore Are Doomed To Repeat It seems as every year gets worse and worse when it comes to Cyber Breaches and Cyberattacks. Compared to 2018 were have had 33% more breaches this year. They are, after all of our data, personally...
Signature Anti-Virus does not adequately protect you from today’s Malware
Signature Anti-Virus does not adequately protect you from today's Malware Today's malware acts much differently and can disguise itself more effectively than previous generations of malware. The designs of most anti-virus do not take that into account. Malware...
Apple:1 Android:120
Apple:1 Android:120 Android is not Android is not Android. That means that there are many many versions of the operating system that must be updated and it is why most Android devices are sorely out of date with security patches and operating system updates. ...
Smart TVs, Security and the FBI
Smart TVs, Security and the FBI Did you go out on Black Friday and pick up a new television for the family? Chance are it was a “Smart TV.” Many TV manufacturers have jumped on the internet connected bandwagon to produce more convenience by including one-stop...