May 9, 2020 | Biological Viruses, Business, Collaboration Tools, Coronavirus, Covid-19, Employees, Quarantine, Radio Show, Radio_Show, Remote-Work, Technology, Telecommuting, Unsecured Devices
Post-COVID Business Climate and the Change in Telecommuting After the pandemic, the way that businesses operate will be completely different. For many, they will now understand the importance of their Information technology and cybersecurity personnel. Companies will...
Dec 19, 2019 | Asset Management, Business, Data Assets, Internet, Radio Show, Radio_Show, Security, Technology
Security – Knowing What You Have Is Essential One of the most important things that a business can do to reduce their cybersecurity risk is to know what assets they have, where those assets are, who has access to those assets, how those assets are...
Oct 5, 2019 | Business, Civilian Employment, Contractors, Cybersecurity Professional, Employment, IT Professional, Jobs, Military, Radio Show, Radio_Show, Technology, Under Arrest
Terminated Government Contractor Ends Up in Jail After Destroying IT System Resources IT people are hard to come by and are getting harder to find. That goes for business and government alike. In late 2016 the government terminated a contract with an IT Systems...
Aug 10, 2019 | Best Practices, Business, Cloud Vendors, Computers, Cryptocurrency, Cyber breaches, Cybercrime, Financial, Hackers, Hacking, Hacking, Internet, IoT, Liability, Malware, Nationstates, North Korea, Radio Show, Radio_Show, Ransomware, Ransomware, scam, Security, Security, Technology
North Korea. What do you think when you hear about this country? You probably think of a nation that has separated from progress and technology. A country run by a socialist despot. A hermit kingdom that strictly controls the daily activities of its people. A country...
Aug 3, 2019 | Best Practices, Business, CEO, Cloud Vendors, Computers, CyberTraining, Legal, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Assessments
SMB Cyber Security and Audits. The Why’s, the How’s, and the steps… Why? To maintain your company’s “security hygiene.” To identify critical weaknesses in your cybersecurity protection measures To Keep in Compliance with Industry...