by Cyber Guru | Mar 13, 2021 | Data Breach, Hackers, Podcast, Security Alert
In this episode cyber security experts from Aditi Group tell us about why things are not Golden at Coors this week. And you’ll learn about the hack that is sweeping the planet with Microsoft Exchange. This first Friday Happy Hour edition podcast uncovers network...
by Ted Mayeshiba | Jun 3, 2020 | Compliance, Hackers, HIPAA, Personal Privacy Invasion, Security Learning
Where Are You Most Vulnerable? Hackers understand that employees are often the weakest link in an organization’s security. That’s why 98% of cyber attacks rely on some type of social engineering, costing companies $billions every year. Are you familiar with these new...
by Ted Mayeshiba | Oct 22, 2019 | Data Breach, Hackers, Personal Privacy Invasion, Security Learning
For some of you, it has (prior to this) been routine to punch in your phone number as an identifier for “club reward” points at the grocery store or other retail location. Yet, for many of us, mobile phone numbers especially follow us from apartment to...
by Ted Mayeshiba | Oct 16, 2019 | Data Breach, Hackers, Personal Privacy Invasion, Security Alert
Wondered why you’ve likely seen a bunch of articles about cybersecurity recently? Well, we should think about cybersecurity once in a while! The linked article is a good general deep dive into how to think about keeping your family safe in this connected world....
by computer service | May 5, 2016 | Hackers, Security Learning
Today is the day. You’ve been putting it off for months or years. Your IT department harps on it. Your credit card companies and banks send out calls to update. And you may have automated messages or even lock-outs from more advanced systems, all geared to keep...
by computer service | Apr 22, 2016 | Hackers
60 Minute down under produced a James Bond style drama news story to tell us about two of the most dangerous cell phone exploits that are widely known by hackers and government agencies. It’s an entertaining overview of SS7 network flaw and how hackers use...