Feb 22, 2020 | Applications, Best Practices, Business, Cloud, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, data sharing, Data Storage, Hacking, Hacking, Hacks, Intellectual Property Theft, Internet, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, scam, Security, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Sharp Increase in Exposed Records by Third-Party Applications Businesses are finding themselves at severe risk from Third-party applications and services. Vetting of these services and restrictions on what data they can access is the primary reason. Cybercriminals...
Dec 19, 2019 | Asset Management, Business, Data Assets, Internet, Radio Show, Radio_Show, Security, Technology
Security – Knowing What You Have Is Essential One of the most important things that a business can do to reduce their cybersecurity risk is to know what assets they have, where those assets are, who has access to those assets, how those assets are...
Dec 19, 2019 | Backup, Business, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, Data Storage, Fines and Penalties, Government, Hacking, Hacking, hacking as a service, Hacks, Incident Response, Insider Threat, Internet, Malware, Networking, Patching, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Are You At Risk from Your Outsourced Software Provider The “Cloud” is the eponymous name given for a computer server that belongs to another person or company that you have no control over. There are many companies who offer computing services to...
Nov 9, 2019 | Android, Android, Applications, Applications, applications, Biography, Business, Cars, Coding, Consumer, Hacking, Hacking, Hacks, Internet, iOS, iPhone, Mapping, Mobile, Mobile Phones, Navigation, Patches, Patching, Phone, Phones, Radio Show, Radio_Show, safety, Security, Security Alerts, Smart Phone, Software Manufacturers, Technology, Third-Party, Tracking, Travel, Updates, vehicles
Powerful Apps allow Control for…. Ever! Many companies are creating apps and they are powerful. They are convenient and offer ease of use to their product lines. However, they may not have concidered the implications when not used in the manner that they...
Oct 26, 2019 | Applications, Best Practices, Business, Cyber breaches, Cybercrime, Hackers, Hacking, Patches, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Updates, Updates
Just because you download an app does not mean that it is not vulnerable to exploit or data leaks. The chance of it happening is even higher for those not in traditional app stores. Additionally, businesses depend on older software applications are at a great risk...