Similar Posts
Using Voice to Authenticate You is Risky
ByadminThe CEO of OpenAI is echoing what I have been saying for years and that is that using your voice to authenticate you, for example for access to your bank account, is risky and that shortly any OpenAI customer will be able to spoof that, maybe for $20 a month. Learn more at the links.
Cyber Insurance – Hard to Get, Harder to Keep
ByadminIf you have tried to get cyber risk insurance recently, you know that it is a whole new world. After years of collecting premiums, insurance companies have had to write checks. A lot of checks. They don’t like that so much. As a result, premiums have gone up, coverage has gone down, underwriting has become…
Impact of Cybersecurity on Mergers and Acquisitions
ByadminWe often get asked about how a seller’s cybersecurity practices impact business valuation and related to that, how a lack of cybersecurity due diligence on the part of the buyer impacts overall risk. Here are two very public examples of that; one favorable to the buyer, the other favorable to the seller. If you are…
Why Don’t You Use a Password Manager?
ByadminI came across a recent survey that said that the vast majority of companies still don’t provide centrally managed password managers or require that they be used. Learn why this is a problem and what you should do about it. Audio Video
Do You Know What a Quishing Attack is? Hackers Do!
ByadminQuishing is the act of using malicious QR codes to launch a cyber attack and, apparently, it is very popular. So popular the FBI and the FTC are sending out alerts. Why is it popular? Listen and find out.
The Risk of BYOD – Non-Managed Devices
ByadminMany companies allow, encourage and/or require employees to use personally owned devices. While it seems that, at least in the short term, this is a money saving and morale boosting move, in the long term, it may be an existential threat to the company. In this post we are going to use one company who…