May 9, 2020 | Biological Viruses, Business, Collaboration Tools, Coronavirus, Covid-19, Employees, Quarantine, Radio Show, Radio_Show, Remote-Work, Technology, Telecommuting, Unsecured Devices
Post-COVID Business Climate and the Change in Telecommuting After the pandemic, the way that businesses operate will be completely different. For many, they will now understand the importance of their Information technology and cybersecurity personnel. Companies will...
May 9, 2020 | Best Practices, Business, Collaboration Tools, credential stealing, Internet, Passwords, Passwords, Radio Show, Radio_Show, Security, Security, Technology
Credential Security is Essential when using Collaboration Platforms Microsoft teams gained popularity as a collaboration platform to use as you telecommute to the office during this pandemic. As part of this platform, Teams utilize some automated notifications. Well,...
Mar 21, 2020 | Anti-Virus, Attack Vectors, Biological Viruses, Business, CoronaVirus, Coronavirus, Government, Internet, Malware, News, Phishing, Radio Show, Radio_Show, Security, Signature-Based, Technology, Zero-Day
Malware Infecting PC’s of Those Just Wanting More Coronavirus Infection Information Cybercriminals are constantly changing their tactics and creating new ways to spread their malware to hack and exploit users. With the coronavirus acting as a pandemic and spreading...
Feb 15, 2020 | Applications, Best Practices, Business, CEO, Compliance, credential stealing, Hacking, Internet, Intricate Data Systems, Legacy Systems, Patching, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Frameworks, Security, Security, Security Alerts, Shadow-IT, Software, Software As A Service, Software Manufacturers, Technology, Third - Party, third-world, Threats, Updates
Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession. And they carry them everywhere. Yes, I am talking about their cellphones. On these devices, they can download 1000’s of apps. These apps allow them to create...
Jan 18, 2020 | Business, Cyber breaches, Cybercrime, Cybersecurity, CyberTraining, Data Assets, Employees, Employment, Human Element, Identity Theft, Insider Threat, Internet, Passwords, Phishing, Phishing, Privacy, Radio Show, Radio_Show, Security, Smishing, Technology, Vishing, Vulnerabilities
Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...