Mar 28, 2020 | Biological Viruses, Business, continuing education, Coronavirus, Covid-19, Covid-19, Cybercrime, Cybersecurity, Cybersecurity Professional, CyberTraining, Government, Internet, Law Enforcement, Monitoring, Pandemic, Police, Professional Security Researchers, Quarantine, Quarantine, Radio Show, Radio_Show, Security, Social Distancing, Technology, White-Hat Hackers
White-Hat Investigations Unveil Security Issues but Often at their own Peril It is rare that any law can outpace technology or the tactics of cybercriminals. Many times it takes them weeks to discover and solve physical crimes. Since many law enforcement officers are...
Mar 21, 2020 | Agencies, Attack Vectors, Bitcoin, Business, Cryptocurrency, Cyber breaches, cyberattacks, Cybercrime, Data Loss, FBI, Financial, Government, Hackers, Hacking, Hacking, Hacks, Judicial, Legal, Monitoring, News, Patching, Police, Radio Show, Radio_Show, Security, Security Alerts, Surveillance, Technology, Under Arrest, Updates
Proceeds from Cybercriminal Activity Results in Charges Against an Atlanta Criminal Gang Cybercriminals are not smart enough to outsmart the Federal Government especially when they get greedy. For 24 members of an Atlanta cybercrime gang involved in fraud and money...
Mar 14, 2020 | Applications, Applications, Attack Vectors, Best Practices, Big Tech, Breaches, Compliance, Critical data, Cyber breaches, Cybercrime, Cybersecurity, Data Loss, Hackers, Hacking, industrial espionage, Insider Threat, Malware, Operating Systems, Patches, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates, Updates, Updates, Vulnerabilities
Patch As Many As You Possibly Can and Keep The Bad Guys At Bay Software updates and patches protect both your digital safety and cybersecurity. The sooner you update, the more secure you will be until the next update comes out. However, with all the cybercriminals out...
Feb 8, 2020 | Best Practices, Business, CEO, Corporate Reputation, Cybercrime, Cybersecurity, Economic Disruption, Employees, Executives, Executives, Extortion, Hackers, Hacking, ID Theft, industrial espionage, Internet, Nationstates, Organized Crime, Radio Show, Radio_Show, Security, Security, Technology, third-world, Uncategorized
Our Personal and Brand Reputations are At-Risk By Nation-States Nation-States are no longer interested in just disrupting our politics. Not much money in that. With armies of cybercriminals, nation-states are going after our businesses with the goal of economic...
Feb 1, 2020 | Access Controls, Anti-Virus, Applications, Attack Vectors, Audit Logs, Best Practices, Business, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Disaster_Preparedness, Hackers, Hacking, Hacking, Incident Response, Legacy Systems, Liability, Malware, Monitoring, Operating Systems, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Updates, Zero-Day
Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure. Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered. That means that they were not designed...