Feb 23, 2023 | Authentication, Best Practices, Business, credentials, Credentials, Cyber Security, Cybersecurity, Hacking, ID Theft, Microsoft, Microsoft, Password Managers, Passwords, Passwords, Privacy, Security, Security, stolen identity, Technology, Threats, Windows (Microsoft)
Locking down your files with a strong password is like putting a virtual lock on your front door. It helps protect your personal or sensitive information from prying eyes, cyber-attacks, or theft. Whether you’re sharing your computer with others or working in a...
May 16, 2020 | Business, Computing, Cybersecurity, Data Assets, Data Centers, Internet, Radio Show, Radio_Show, Security, Technology, Technology
Cybersecurity Focus moves from Data Center to Clouds and Endpoints with the advent of Corporate telecommuting. One thing this pandemic has unveiled is that cybersecurity does begin and end in the data center. Technology has enabled the spread of multiple devices, both...
Apr 18, 2020 | Apple, Big Tech, Business, contact tracing, Covid-19, Epidemiology, Google, Internet, Mobile Phones, Pandemic, Phone, Public Health, Radio Show, Radio_Show, Security, Technology
Big Tech Contact Tracing – Antithetical to American Society The way that public health follows infection of a population is by tracing the contact of infected persons, and testing them is known as contact tracing. It is how epidemiologists aim to reduced...
Mar 7, 2020 | Asset Management, Attack Vectors, Audit Logs, Best Practices, Business, Compliance, Critical data, cyberattacks, Data, Data Assets, data sharing, Data Storage, Databases, Disaster Recovery, Hard Disks, Intricate Data Systems, Policies and Procedures, Privacy, Radio Show, Radio_Show, records, Security, Security, Technology, Unsecured
Don’t Store Data You Don’t Need Today all businesses are tech businesses. That requires that they all comply with different variations of regulatory compliance, the requirements which are often changing faster than possible implementation. Unfortunately, due to these...
Jan 11, 2020 | Access Controls, Amazon, Apple, Asset Management, Attack Vectors, audit logs, Backup, Big Tech, Business, Computers, Cyber breaches, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Employee Training, Employment, Encryption, Fines and Penalties, Google, Hacking, Incident Response, industrial espionage, Insider Threat, Internet, Jobs, Legal, Liability, Malware, Malware, Microsoft, Monitoring, Networking, predictive algorithms, Radio Show, Radio_Show, Ransomware, Security, Software As A Service, Surveillance, Technology, Zero-Day
How Mature is Your Insider Threat Intelligence? Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...