Protect your Anonymity is all about Layers
Protect your Anonymity is all about Layers The acronym, TOR, stands for The Onion Router or a system of security encryption that can protect anonymity. While some use it for nefarious purposes, it began as a project at the United States Naval Research...
New Tools Keep CyberThieves From Disabling Your Cyber Protections
New Tools Keep CyberThieves From Disabling Your Cyber Protections Cybercriminals are continually working to defeat any cybersecurity protections we can think up, and it happens almost as fast as we make them. Many times the malware they create has one purpose,...
Nation-State Cyber Theft May Cause US Aerospace Downfall
Nation-State Cybertheft May Cause US Aerospace Downfall Our government leaders have known for years about the industrial espionage conducted by China. It is at the expense of our American companies. They know of China’s goal to develop a colossal aerospace...
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication -- but it why? Most businesses who choose to use it -- decide to use the most insecure version of it. Hackers already know the...
Standing our Ground on Encryption – without it, we will lose all Privacy!
Standing our Ground on Encryption - without it, we will lose all Privacy! According to the US Consitution, we have the right to be secure in our persons, houses, and papers. Unlike 1787 when they wrote the constitution, today, “our papers” are digitally stored...
Bathroom Humor and High-End Executive Cars
Bathroom Humor and High-End Executive Cars Enough already with the Fart jokes! Said every father to his sons. I am not sure why boys get so much enjoyment from this topic, but now it is going a little far with the businessman Elon Musk adding a farting noise to the...
Problems You Never Knew Could Be Solved By Smart Devices
Problems You Never Knew Could Be Solved By Smart Devices How smart do you want your home to be? It seems like every day they come out with some new gadget that can connect to your network, in hopes of making your daily life more convenient. Some are useful and...
Popular VPNs Are Vulnerable To Exploit
Popular VPNs Are Vulnerable To Exploit Out of all the topics that my listeners inquire about, none is more prevalent than VPNs and VPN security. Unlike what the advertisements seem to indicate (like Norton VPN advertisements you’ve heard on the radio), a VPN is...
More Than Three-Quarters of US Businesses Are CyberAtttack Targets
More Than Three-Quarters of US Businesses Are CyberAtttack Targets Cybersecurity incidents are up! Hackers worldwide favorite target du jour are U.S. small and medium-sized businesses. Unfortunately, for many, they have fallen back on the false idea they are...
The Future Communication Means No Phones
The Future Communication Means No Phones Our world today is changing, and we are demanding convenience, efficiency, and speed in our transactional pursuits, and this might mean that smartphone you purchase or finance for the next five years might be unnecessary...