Feb 22, 2020 | Applications, Audit Logs, Biological Viruses, Biological Warfare, Business, Compliance, Coronavirus, Covid-19, cyberattacks, Disaster Recovery, Employees, Government, HR, Incident Response, Internet, Market Value, Policies and Procedures, Radio Show, Radio_Show, Security, Technology
IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus Whenever there is a big story in the News you will find Cybercriminals willing and eager to exploit people using keywords and topics from news stories. With all the stories about the Coronavirus that...
Feb 8, 2020 | Applications, Audit Logs, Business, CEO, Cloud, Compliance, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Databases, Disaster Recovery, Executives, Foreign Currency Exchange, Hackers, Hacking, Incident Response, Internet, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Security, Technology
It Took This Public Company 1+ Months to Recover After a Ransomware Attack. How Can You Prevent This Disaster From Happening to You? We have all heard about Ransomware and the toll it can take on businesses of all sizes. The rate of attacks has doubled in Q4, and the...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...
Dec 7, 2019 | Business, Cell Phone, cell phones, Cellular Services, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, iPhone, Mobile Phones, Phone, Radio Show, Radio_Show, Security, Smart Phone, T-Mobile, Technology
Call 611 Now — Hackers Breach 1M Cellular Customers Cybercriminals will go after anyone who has an expolitable vulnerability. Businesses must work to protect themselves and must put into place an incident response plan along with a disaster recovery plan...
Nov 30, 2019 | Business, Data, Data Storage, Incident Response, Internet, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Security, Technology, Vulnerabilities
Upping your Incident Response Game — New Regulations coming If you are a business and you have data on any Massachusetts resident or do business in Massachusetts, coming in early January, there are new data collection requirements with which you will need...