John Stengel had the pleasure of going on Today’s Real Talk Podcast with host Justin A. Ckezepis to discuss the dangers of the internet
As many of us in the cybersecurity space, we are concerned with privacy. We do not like to be tracked and we certainly don’t want ads targeted to us based on searches we are doing, especially those we do for research. That is the thing Brave wants you to realize more than anything. If you use their browser, called Brave, it can block ads, trackers, and fingerprint methods. And it actually works really well. This browser will work on any desktop or mobile platform.
In the cybersecurity world, Internet of Things (IoT) is the current hot topic. It is amazing how these little devices can dominate so much of the attention of the cybercriminal and cybersecurity industry. The reasons are simple. IoT devices are incredibly insecure and bad actors are looking for ways to manipulate these weaknesses.
If your firewall cannot scan HTTPS traffic, known as Deep Packet Inspection (DPI), you will not be able to detect the majority of the threats on web traffic.
Beware of technology resellers that always recommend one product and never modify their recommendations. Selling cyber security should not be about order taking. It should be about recommending secure products that work really well.
A data breach is bound to happen to every company. It is just a matter of when. Here are two new data breaches announced this week and some food for though.
Hardware and software vendors want to collect your device feedback and usage statistics. This is a major privacy concern. it is not anonymous by any means.
The statistics are staggering when in comes to cyber attacks.
Every cyber security event shoudl be treated like an attack. Not following the trail of evidence will only increase the severity of an attack.
Cyber Security and Data Backups are not unrelated. In fact, they are closely related.
Insurance will not necessarily cover you in the event of a cyber breach. You need to understand what sets to perform to be covered.
There is a rapid adoption taking place of multi-factor authentication. Are you looking at this?