Aug 3, 2019 | Business, Cybersecurity, Employees, Employees, Radio Show, Radio_Show, Security
Retain Employees Increase Security People, processes, and technology: the three most important components of security operations. Processes can be designed and documented, technology can be purchased and implemented, but people are most often the X...
Aug 3, 2019 | Best Practices, Business, CEO, Cloud Vendors, Computers, CyberTraining, Legal, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Assessments
SMB Cyber Security and Audits. The Why’s, the How’s, and the steps… Why? To maintain your company’s “security hygiene.” To identify critical weaknesses in your cybersecurity protection measures To Keep in Compliance with Industry...
Jul 27, 2019 | Business, CEO, DeepFake, Radio Show, Radio_Show, Security, Technology, Video
Is Your CEO real or Is He a DeepFake? “Deepfakes” refers to media that has been altered by artificial intelligence to make it appear that a person is doing or saying something that, in fact, that person has never done or said. The technology first began appearing a...
Jul 27, 2019 | Business, CEO, Cybercrime, CyberTraining, Employees, Hackers, Hacking, LinkedIn, LinkedIn, Organized Crime, Radio Show, Radio_Show, Smart Phone, Social Networking, Technology
Business leaders use Social Media, too. And LinkedIn is now being used to attack us on an unprecedented scale. But this is different. Social Media is no longer about tweens, teens, and college students. It’s at the point now where most adults find it hard to...
Jul 22, 2019 | Business, CEO, CEO Security Intelligence Brief, Cloud, Cyber breaches, Radio Show, Radio_Show
July 2019 – CEO Security Intelligence Brief Third Parties are either directly or indirectly responsible for 63% of all cyber attacks. The costliest threats to small and medium businesses involve data leaving the organization via third-party providers....