Nov 1, 2019 | Business, Hacking, Internet, Password Managers, Passwords, Privacy, Radio Show, Radio_Show, safety, Security
Common Password Vulnerabilities and How to Avoid Them There are a couple of interesting articles this week discussing one of my favorite subjects because it can make a significant impact on your security stance. Breaches that could result in data loss are the...
Jul 6, 2019 | 2FA, Best Practices, Breaches, Business, Cloud, Internet, O365, Radio Show, Radio_Show, Security, Software Manufacturers, Technology
O365 Non-Security – again The US Cybersecurity and Infrastructure Security Agency (CISA) has become the latest government body to plead with admins to implement security best practices on Microsoft’s Office 365 platform. The UK’s National...
Jun 1, 2019 | Data, Data Storage, Google, Passwords, Privacy, Radio Show, Radio_Show, Resources, Security, Software, Technology, Web Tools
Why Are We Still Trusting Google? Can you believe that a technology company that sells companies the ability to use a suite of their services — failed to protect their login credentials? Yes, that’s right. You pay us, and we will leave your login’s and...
May 17, 2019 | Radio Show
Israel Bombed Cyber Hackers (That Is Historic, For Many Reasons) Between the fake Nigerian princes and the endless computer passwords we need to create (one uppercase and lowercase letter, please), we have all wanted to bomb the hackers. Last weekend, Israel did just...
Apr 26, 2019 | Radio Show
Former NH Sen. Hassan Aide Stole Gigabytes Of ‘High Value’ Data A former IT aide to New Hampshire Democratic Sen. Maggie Hassan mounted an “extraordinarily extensive data-theft scheme” against the office, the culprit’s plea agreement states. The plot included the...