Tech Talk Show Notes January 24 – 30, 2021

Tech Talk Show Notes January 24 – 30, 2021

Read. Learn. Share TECH TALK SHOW NOTES January 30, 2021 Cloud Jacking: The Bold New World of Enterprise Cybersecurity Those with their finger on the pulse of emerging cybersecurity threats are already aware that there’s a new danger in town: cloud jacking. The...
All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not.  Companies who continue to believe that they are not technology companies...
Keeping Legacy Software Safe

Keeping Legacy Software Safe

Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure.  Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered.  That means that they were not designed...
Standing our Ground on Encryption – without it, we will lose all Privacy!

Standing our Ground on Encryption – without it, we will lose all Privacy!

Standing our Ground on Encryption – without it, we will lose all Privacy!   According to the US Consitution, we have the right to be secure in our persons, houses, and papers. Unlike 1787 when they wrote the constitution, today, “our papers” are digitally...
SMB Cyber Security and Audits. The Why’s, the How’s, and the steps…

SMB Cyber Security and Audits. The Why’s, the How’s, and the steps…

SMB Cyber Security and Audits. The Why’s, the How’s, and the steps… Why? To maintain your company’s “security hygiene.”  To identify critical weaknesses in your cybersecurity protection measures To Keep in Compliance with Industry...