Feb 29, 2020 | 2FA, Best Practices, credentials, Password Managers, Passwords, Privacy, Radio Show, Radio_Show, Security, Security, Social Influencers, Technology
Passwords: Length trumps Complexity Complex passwords that must be changed every 90 days are the bain of most companies and a headache for employees and they are not as secure as you have been led to believe. The reason is that people have to write them down. They...
Feb 15, 2020 | Applications, Best Practices, Business, CEO, Compliance, credential stealing, Hacking, Internet, Intricate Data Systems, Legacy Systems, Patching, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Frameworks, Security, Security, Security Alerts, Shadow-IT, Software, Software As A Service, Software Manufacturers, Technology, Third - Party, third-world, Threats, Updates
Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession. And they carry them everywhere. Yes, I am talking about their cellphones. On these devices, they can download 1000’s of apps. These apps allow them to create...
Jan 18, 2020 | Access Controls, Applications, Attack Vectors, automation, Business, CEO, Coding, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Storage, Hackers, Hacking, Hacking, Internet, Patching, Radio Show, Radio_Show, safety, Security, Security Alerts, spying, Technology, Third - Party, Updates
A Lesson to Learn – If it is Connected It can Be Hacked I remember years ago at CES 2013, when this young entrepreneur scheduled an interview with me to show off a prototype for his new Ring security device. At the time, IoT was in its infancy, and this product...
Dec 19, 2019 | Business, Chrome Browser, credentials, Google, Internet, Passwords, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates
Chrome 79 will continuously scan your passwords against public data breaches Best practices dictate that you should use a different password for every website, application, or program. However, many do not do this, and it is why cybercriminals can run rampant...
Dec 7, 2019 | Biometrics, Business, credential stealing, Employees, Facial Recognition, Radio Show, Radio_Show, Security, Technology
The Convenience of Facial Recogition is not All Its Cracked Up to Be As technologies advance many of them are sold to us as a convenience. Nowhere is this more evident as in the whole face recognition for security arena. Think about how much trouble companies...