Apr 25, 2020 | Applications, Business, Cloud, Collaboration Tools, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, misconfigured environments, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Technology, Updates, Zoom
Your Zoom Account is Worth One ‘Copper’ to Hackers Zoom has gained popularity during this pandemic’s require shelter in their homes. However its widespread use has unveiled to many the privacy and security issues inherent in this platform. These inherent...
Mar 7, 2020 | Access Controls, Asset Management, Best Practices, Business, Compliance, credential stealing, credentials, Critical data, Cyber Liability, cyberattacks, Data Assets, Employees, Hacking, Human Element, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Legacy Systems, Operating Systems, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Regulatory Compliance, Security, Security, Security Alerts, Technology, Technology, Third - Party, Updates
Cryptocurrencies and Insurance Increases Ransomware Profitability Ransomware is rising like a phoenix from the ashes again. Companies are paying enormous ransoms in cryptocurrencies and insurance companies paying out claims, which in turn is adding to the rise in...
Feb 22, 2020 | anonymity, Attack Vectors, Business, Compliance, cyberattacks, Cybersecurity, Internet, Iran, Nationstates, Networking, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Third - Party, Threats, Updates, VPN, VPN
Iranian Hackers Exploit VPNs Worldwide Last year major companies that make VPN servers were found to have security holes in them and now it appears according to a recent report that government cyber hackers from Iran have been exploiting these publicly announced...
Jan 25, 2020 | Apple, Apple, Best Practices, Big Tech, Business, FBI, Government, iOS, iPhone, Phone, Privacy, Radio Show, Radio_Show, Security, Security, Security First, Smart Phone, Technology
Security First, Apple Stands Ground on iPhone Encryption The Apple iPhone platform is based on security first. It is designed to be secure and private. To do that they use a proprietary encryption system. While there have been private companies who have tried to...
Oct 12, 2019 | Business, Consumer, Cybercrime, Encryption, Government, Hackers, Hacking, Home, Malware, Nationstates, Networking, Networking, NSA, NSA, Organized Crime, Radio Show, Radio_Show, Security, Technology, VPN, VPN
Popular VPNs Are Vulnerable To Exploit Out of all the topics that my listeners inquire about, none is more prevalent than VPNs and VPN security. Unlike what the advertisements seem to indicate (like Norton VPN advertisements you’ve heard on the radio), a VPN is...