Mar 14, 2020 | Biological Viruses, Business, Cisco, Cisco, Coronavirus, Covid-19, Government, Internet, Quarantine, Quarantine, Radio Show, Radio_Show, Security, Technology, WebEx
Webex Communications Keep Businesses Operating During Quarantines Seasonal Flu or a Covid-19 quarantine may sideline employees this year. To keep productivity up, you may need to conduct business remotely. One of the biggest challenges to remote work for companies is...
Feb 15, 2020 | Applications, Best Practices, Business, CEO, Compliance, credential stealing, Hacking, Internet, Intricate Data Systems, Legacy Systems, Patching, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Frameworks, Security, Security, Security Alerts, Shadow-IT, Software, Software As A Service, Software Manufacturers, Technology, Third - Party, third-world, Threats, Updates
Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession. And they carry them everywhere. Yes, I am talking about their cellphones. On these devices, they can download 1000’s of apps. These apps allow them to create...
Jan 18, 2020 | Business, Cyber breaches, Cybercrime, Cybersecurity, CyberTraining, Data Assets, Employees, Employment, Human Element, Identity Theft, Insider Threat, Internet, Passwords, Phishing, Phishing, Privacy, Radio Show, Radio_Show, Security, Smishing, Technology, Vishing, Vulnerabilities
Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...
Nov 23, 2019 | Android, Android, AT&T, Big Tech, Business, Cell Phone, cell phones, Cellular Services, Google, Google, Internet, Jailbreak, Malware, Mobile, Mobile Phones, Operating Systems, Patching, Phone, Phones, Radio Show, Radio_Show, Security, Security Alerts, Smart Phone, T-Mobile, Technology, Updates, Verizon, Zero-Day
Reduce Vulnerabilities by Ditching Android Like I repeatedly explain to people to ask me about Android. Android is not Android is not Android. Every Android phone is unique because the Manufacturers are allowed to freely create applications and interfaces and...
Nov 16, 2019 | 2FA, Best Practices, Business, Computers, credentials, Cyber breaches, cyberattacks, Cybersecurity, Employees, Employees, Hacking, Hacking, hardware token, Internet, Laptops, Malware, MFA, Phishing, Radio Show, Radio_Show, Security, Security, Technology
Best Practices in Authentication Still Mostly Ignored By Businesses How do cybercriminals breach into corporate systems? They use many tactics but on of the easiest is through the use of compromised credentials. The problems is that these are real valid credentials...