May 16, 2020 | Business, FIDO, Internet, MFA, Microsoft, Passwords, Radio Show, Radio_Show, Security, Technology, token
Microsoft wants You to Use FIDO instead of Passwords Passwords are a security issue, but primarily the problem with passwords is human behavior. People choose an insecure password, reuse them on multiple sites, don’t change them, and share them with colleagues....
May 9, 2020 | Biological Viruses, Business, Coronavirus, Covid-19, Covid-19, Cyber breaches, Cybercrime, Hackers, Hacking, Hacks, Internet, Pandemic, Quarantine, Radio Show, Radio_Show, Security, Technology
Pandemic Hackers are Active – Be Aware Con artists, hackers, cybercriminals will use any excuse to create a plan for defrauding unsuspecting people. COVID-19 is no different, and it has created a swarm of scams related around this pandemic. It is time to open...
Mar 7, 2020 | Applications, Attack Vectors, Audit Logs, Best Practices, Business, Business Email Compromise, Cloud, Cloud, Cloud Vendors, Compliance, Computers, Critical data, Cyber Insurance, Cyber Liability, Cybercrime, Cybersecurity, Hacking, Internet, Malware, misconfigured environments, Patching, Policies and Procedures, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Security Assessments, SecurityThing, Technology, Technology, Third - Party, trojans, Updates
Are you Secure — Depends on Many Things If a business owner asks a cybersecurity specialist if they are secure, it will be tough for them to give them a straight and honest answer without delving into their systems and business operations. Most companies...
Feb 29, 2020 | 2FA, Best Practices, credentials, Password Managers, Passwords, Privacy, Radio Show, Radio_Show, Security, Security, Social Influencers, Technology
Passwords: Length trumps Complexity Complex passwords that must be changed every 90 days are the bain of most companies and a headache for employees and they are not as secure as you have been led to believe. The reason is that people have to write them down. They...
Feb 15, 2020 | Applications, Best Practices, Business, CEO, Compliance, credential stealing, Hacking, Internet, Intricate Data Systems, Legacy Systems, Patching, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Frameworks, Security, Security, Security Alerts, Shadow-IT, Software, Software As A Service, Software Manufacturers, Technology, Third - Party, third-world, Threats, Updates
Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession. And they carry them everywhere. Yes, I am talking about their cellphones. On these devices, they can download 1000’s of apps. These apps allow them to create...
Page 1 of 6123...5...NEXT»Last »