Aug 24, 2019 | Best Practices, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Radio Show, Radio_Show, Security, Technology
What is More Destructive a Nuclear Weapon or Cyber Attack People around the world may be worried about nuclear tensions rising, but I think they’re missing the fact that a major cyberattack could be just as damaging – and hackers are already laying the...
Aug 24, 2019 | Best Practices, Biometrics, Business, Code-Breaking, Consumer, Cybercrime, Cybersecurity, Databases, Encryption, Hacking, Monitoring, Privacy, Radio Show, Radio_Show, Security, Security, Technology
You Can Change Your Password but You Can’t Change Your Fingerprints The biggest known biometric data breach to date was reported recently when researchers managed to access a 23-gigabyte database of more than 27.8m records including fingerprint and facial...
Aug 24, 2019 | Best Practices, Business, Cybercrime, Hackers, Malware, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Security, Security, Technology
Ransomware Attacks Strike 20% of Americans Cybercriminals have been using ransomware to profit off of unprepared victims for more than a decade. Ransomware rose to infamy when the WannaCry and NotPetya attacks struck the world. Recently, attackers have...
Aug 17, 2019 | Best Practices, Business, Cybercrime, CyberTraining, Employees, Employees, Hackers, Hacking, Hacking, Liability, Malware, Malware, Passwords, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Regulatory Compliance, scam, Security, Security, Technology
Phishing — Best Practices One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...
Aug 3, 2019 | Business, Cybersecurity, Employees, Employees, Radio Show, Radio_Show, Security
Retain Employees Increase Security People, processes, and technology: the three most important components of security operations. Processes can be designed and documented, technology can be purchased and implemented, but people are most often the X...