Latest Podcasts

Latest Articles

Your Login Credentials are Keys to the Kingdom for Hackers

Your Login Credentials are Keys to the Kingdom for Hackers

Your Login Credentials are Keys to the Kingdom for Hackers   A recent study published by Google estimates that 1.5% of all login credentials used across the web have been compromised in data breaches and are vulnerable to credential stuffing attacks. Google has...

read more
Employee Privacy vs Network Security: The Matchup

Employee Privacy vs Network Security: The Matchup

Employee Privacy vs Network Security: The Matchup   PRACTICALLY all governments and industry regulators now demand that companies secure their enterprise networks to protect their systems and data. In responses, companies are doing everything in their capacity to...

read more
Live in Sweden Save Your Cash and Coin

Live in Sweden Save Your Cash and Coin

Live in Sweden Save Your Cash and Coin    For years, we have commented on the Swedish government and the Riksbank pushing for a “cashless society.” The Riksbank has over 1,000 articles posted on its website on the “cashless society“. The emphasis worked: between...

read more
Facebook News takes Another Hard Left Turn

Facebook News takes Another Hard Left Turn

Facebook News takes Another Hard Left Turn    Facebook confirmed on Tuesday it’s hiring a team of veteran journalists to help curate stories in its soon-to-launch news tab. The company confirmed the plans after The New York Times reported that Facebook is...

read more
Ransomware Attacks Strike 20% of Americans

Ransomware Attacks Strike 20% of Americans

Ransomware Attacks Strike 20% of Americans    Cybercriminals have been using ransomware to profit off of unprepared victims for more than a decade. Ransomware rose to infamy when the WannaCry and NotPetya attacks struck the world. Recently, attackers have...

read more
IoT – Putting our Business Networks and Security at Risk

IoT – Putting our Business Networks and Security at Risk

 IoT - Putting our Business Networks and Security at Risk   IoT - Putting our Networks and Security at Risk Just take a look at any website or catalog, and you will see the availability of hundreds to thousands of connected devices touted to make your life...

read more
Turns Out It Wasn’t Just Capital One

Turns Out It Wasn’t Just Capital One

Turns Out It Wasn’t Just Capital One   Federal prosecutors say a woman charged in a massive data breach at Capital One may have hacked more than 30 other organizations. Paige Thompson, of Seattle, was arrested last month after the FBI said she obtained personal...

read more
Phishing — Best Practices

Phishing — Best Practices

Phishing — Best Practices   One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...

read more
powered by Typeform