Feb 29, 2020 | Apple, Apple, Attack Vectors, Best Practices, Big Tech, Cybercrime, Cybersecurity, Hackers, Hacking, iMac, iPad, Laptops, Mac Pro, MacBook, Malware, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Security First, Tablet, Technology, Updates
Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe Apple designs their computers with a security-first mindset but that does not mean that they are not able to be compromised by enterprising cybercriminals. Although, just like with all news...
Feb 8, 2020 | 5G, Attack Vectors, Best Practices, Business, Internet, IoT, Networking, Networking, Patching, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Technology, Tracking, Updates, updates and patches
5G Will Be Built-In to Almost Every Device Later This Year — Is Your Security Stance Ready? With 5G on the horizon, we are starting to see a significant expansion of the “Internet of Things” — and it is creating a huge security challenge for businesses! A...
Jan 25, 2020 | Attack Vectors, audit logs, Best Practices, Big Tech, Business, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Hacking, Legacy Systems, Microsoft, Microsoft, Microsoft, Operating Systems, Patching, Privacy, Radio Show, Radio_Show, safety, Security, Security, Security Alerts, Technology, Updates, Windows 7, Zero-Day
No Security for Windows 7 After Today Are you using Windows 7? Did you know some of the largest firms in the country (even large financial institutions) are still using it? Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...
Jan 18, 2020 | Applications, Big Tech, browsers, Business, Compliance, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Firefox, Government, Hackers, Hacking, Hacking, Homeland Security, Internet, Legacy Systems, Malware, Mozilla Firefox, Nationstates, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, Vulnerabilities, warnings, Zero-Day
Zero-Day Browser Vulnerabilities “This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...