Mar 28, 2020 | Business, Cybercrime, Government, Internet, intrusion tactics, News, Radio Show, Radio_Show, Ransomware, Security, Technology
Monitoring Your Logs Can Prevent Business Ransomware Attacks Ransomware gangs using some sophisticated tactics are able to break into company networks and look around for days and even weeks at a time before, exfiltrating extensive amounts of information without being...
Feb 8, 2020 | 5G, Attack Vectors, Best Practices, Business, Internet, IoT, Networking, Networking, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Tracking, Updates, updates and patches
5G Will Be Built-In to Almost Every Device Later This Year — Is Your Security Stance Ready? With 5G on the horizon, we are starting to see a significant expansion of the “Internet of Things” — and it is creating a huge security challenge for businesses! A...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...
Dec 19, 2019 | AT&T, Best Practices, Cell Phone, cell phones, Cellular Services, Internet, Mobile Phones, Networking, Networking, News, Phone, Phones, Policies and Procedures, Radio Show, Radio_Show, Regulatory Compliance, Security, T-Mobile, Technology, Verizon
5G – Not Ready For PrimeTime…Yet! Technology is ever-changing, and new and improved technology is consistently released and models refreshed or introduced. The next significant advancement coming our way will be in cellular technology and the...
Nov 30, 2019 | Best Practices, Business, China, Cyber breaches, Cybersecurity, Data, Economic Disruption, Hacking, Internet, Iran, Nationstates, North Korea, password spraying, Phishing, Phishing, Phishing, Privacy, Radio Show, Radio_Show, Russia, Security, Security, Security, Software, Technology, Vulnerabilities
Nation-State Cybecriminals and Economic Disruption Nation-state cybercriminals from Russia, China, North Korea, and Iran are attacking all parts of US society. They are attacking anything and everything that will disrupt our economy. They will attack our...