CBS 11 DFW interviews Shawn Tuma who explains that when you are given a free service or product to use, you and your data are the real product. By now everyone has now heard of — and likely used — Zoom for staying connected during the COVID-19 pandemic. In what may have been a brilliant strategy … Continue reading Understanding the Cyber and Privacy Risks of Zoom and Tips For Using It More Securely
If you are a healthcare provider, you need to prepare yourself now for the new reality that, when hackers get into your network, they will contact your patients to put pressure on you to pay their ransom demands — usually after they have encrypted your network. Here is an example from a recent case that … Continue reading Healthcare Providers – Are You Prepared for Hackers to Tell Your Patients About Your Ransomware and Data Breach?
Go here to read: Texas Businesses Must Implement and Maintain Reasonable Cybersecurity Safeguards According to State Attorney General
The most important lesson about Apple’s iOS group FaceTime debacle that you are not hearing about should be a wake up call for everyone (Tuma explains this glitch on WFLA in Tampa, FL): If Apple, through a programming glitch, has the ability to allow someone to use your iOS device as a microphone to listen … Continue reading The Most Important Lesson You Are Not Hearing About Apple’s iOS FaceTime Glitch
The most likely “cyber attack” that your company will face will come in the form of an email. One of the most common forms of email attack is the business email compromise (BEC) and the most popular time of the year for the W-2 version of BEC is right now -- tax season. Read the … Continue reading Protect Your Company Against W-2 Business Email Compromise Attacks During Tax Season