May 2, 2020 | Applications, Business, Data, Hospital, Internet, IoMT, Medical, Radio Show, Radio_Show, Security, Technology
Medical IoT Prone to Security Challenges Hospitals are busy places, and anytime they can save time or make something more natural, they try to do so. Medical device companies are adding applications and creating real products to solve medical issues. Medical IoT...
Feb 29, 2020 | Applications, Applications, Asset Management, Attack Vectors, Audit Logs, audit logs, Best Practices, Big Tech, Business, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Corporate Reputation, credentials, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Data Storage, Employees, Executives, Hackers, Hacking, industrial espionage, Organized Crime, Patches, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Technology, Third - Party, Third-Party, Updates
Businesses in Danger: Data Transfer between Cloud Apps The cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data. I constantly have to explain to...
Feb 29, 2020 | Attack Vectors, Best Practices, Business, Cloud, Cloud Vendors, Compliance, Corporate Reputation, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Databases, Fines and Penalties, Hackers, Hacking, Legal, Liability, Market Value, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Technology, Third - Party, Third-Party, Threats, Unsecured, Updates
Businesses Must Understand The Intricacies of Cloud Security It does not matter the size of the organization or the complexity of the operations businesses have been sold on the idea that “the cloud” is the answer. For MGM Resorts they found out that the data they...
Dec 19, 2019 | Backup, Business, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, Data Storage, Fines and Penalties, Government, Hacking, Hacking, hacking as a service, Hacks, Incident Response, Insider Threat, Internet, Malware, Networking, Patching, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Software As A Service, Technology, Third - Party, Updates
Are You At Risk from Your Outsourced Software Provider The “Cloud” is the eponymous name given for a computer server that belongs to another person or company that you have no control over. There are many companies who offer computing services to...
Jun 29, 2019 | Backup, Business, Cyber breaches, Cybersecurity, Data, Databases, Liability, Malware, Privacy, Radio Show, Radio_Show, Security, Software As A Service
Cyber Breaches — How Far Does Your Liability Extend? It seems like we read about a major data breach occurring almost every other day. From credit card information and PIN codes stolen from some of the largest retailers in America to very personal health...