Apr 27, 2020 | Asset Management, Backup, Business, Business Email Compromise, CEO, Compliance, Computers, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data Assets, Data Loss, Data Storage, Disaster Recovery, Employees, Employment, Employment, Executives, Firewalls, Hacking, Hard Disks, Hiring, Incident Response, Intellectual Property Theft, Intricate Data Systems, IT Professional, Laptops, Legacy Systems, Managed Security Services Provider (MSSP), Networking, Patching, Ransomware, Routers, Security, Security Alerts, Shadow-IT, Software As A Service, Technology, Technology, Third - Party, Updates, VPN
Overcoming the Critical Cybersecurity Talent Shortage Businesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...
Mar 21, 2020 | Anti-Virus, Attack Vectors, Biological Viruses, Business, CoronaVirus, Coronavirus, Government, Internet, Malware, News, Phishing, Radio Show, Radio_Show, Security, Signature-Based, Technology, Zero-Day
Malware Infecting PC’s of Those Just Wanting More Coronavirus Infection Information Cybercriminals are constantly changing their tactics and creating new ways to spread their malware to hack and exploit users. With the coronavirus acting as a pandemic and spreading...
Aug 17, 2019 | Best Practices, Business, Cybersecurity, Cybersecurity Professional, CyberTraining, Employees, Employees, Employment, Future Workforce, Radio Show, Radio_Show, Regulatory Compliance, Resources, Security, Security, Security Assessments, Security Services, Technology
Want To Be A Security Pro —- Tips Here! As cyber criminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are currently nearly 3 million unfilled cybersecurity jobs...
Jul 14, 2019 | Business, Cybersecurity, CyberTraining, Email, Email, Employees, Hacking, Radio Show, Radio_Show, Security
Someone’s Phishing for You! Black Hats are out there casting a line for you and hoping to land their “Phish” This type of social engineering relies on a simple human trait – trust. By playing on this trust, they can manipulate you into falling for their...
Jun 8, 2018 | Podcast, Radio Show
The importance of Training: TTWCP Daily Podcast- 2018-06-08 http://traffic.libsyn.com/cptt/The_Importance_Of_Training_-_Winter_Olympic_Training_During_The_Summer.m4a DOWNLOAD TRANSCRIPT Subscribe to iTunes On This Episode… Today a short discussion on training...