Feb 1, 2020 | Access Controls, Anti-Virus, Applications, Attack Vectors, Audit Logs, Best Practices, Business, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Disaster_Preparedness, Hackers, Hacking, Hacking, Incident Response, Legacy Systems, Liability, Malware, Monitoring, Operating Systems, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Updates, Zero-Day
Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure. Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered. That means that they were not designed...
Feb 1, 2020 | Best Practices, Biometrics, Business, Cyber breaches, cyberattacks, Data Brokers, Data Storage, Databases, Facial Recognition, Facial Recognition, False Positives, Hacking, Hacking, ID Theft, Internet, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Social Networking, Technology, Unsecured
Concerns About Effectiveness and Privacy and Limiting Facial Recognition Adoption Facial Recognition is not a perfect technology and still needs some time before being widely used in societal applications until we get our hands around the issues of privacy, safety and...
Jan 25, 2020 | Best Practices, Business, Cable Companies, Charter Cable, Internet, Internet Service Providers, Radio Show, Radio_Show, Security, Security, Security, Security Services, Smart Home, Technology, Utilities
Home Security and Alarm Systems Useless After Charter Cable Pulls Plug What happens when a cable company shuts down a product they previously sold to customers? What happens when they refuse to refund customers for proprietary products they purchased to support the...
Jan 25, 2020 | Attack Vectors, audit logs, Best Practices, Big Tech, Business, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Hacking, Legacy Systems, Microsoft, Microsoft, Microsoft, Operating Systems, Patching, Privacy, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Technology, Updates, Windows 7, Zero-Day
No Security for Windows 7 After Today Are you using Windows 7? Did you know some of the largest firms in the country (even large financial institutions) are still using it? Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...
Jan 18, 2020 | Business, Cyber breaches, Cybercrime, Cybersecurity, CyberTraining, Data Assets, Employees, Employment, Human Element, Identity Theft, Insider Threat, Internet, Passwords, Phishing, Phishing, Privacy, Radio Show, Radio_Show, Security, Smishing, Technology, Vishing, Vulnerabilities
Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...