
Safety Can't Be an Afterthought with Kris Burkhardt
Most businesses rely on some type of software, either for scheduling, payment, banking, customer lists, or something else. It's important to know where this information is stored and what would happen...
14 Aug 202446min

Child Safety Tips with Steve Lazarus
Is it right for parents to be the ones to have to put limits on their children's screen time or to monitor the content they consume? Knowing the impact of social media and kids can influence the decis...
7 Aug 202430min

Fraud: Not Going Away with Steve Lenderman
Synthetic IDs can be used to open fake accounts, but without a person to file the fraud claim, how should companies deal with this type of deceit? There is no crime where someone doesn't need to pay f...
31 Juli 202439min

Phishing Attack Awareness and Training with Josh Bartolomie
Criminals do their own recon to study how vendors craft their emails and how they can structure them to match. Scammers know employees are busy and that they want to act promptly on requests, but they...
24 Juli 202444min

Consumer Education for Fraud Protection with Doug Shadel
Some scammers love the challenge of deceiving those they target while others are forced to scam. Those that thrive off of destroying others try to heighten your emotions very quickly. Both excited and...
17 Juli 202453min

Educating Teens About Technology is Necessary with Clayton Cranford
Please stop yourself from saying, "This could never happen to me or my family." We can all have vulnerable blindspots when it comes to those we love being exploited or endangered. Even the best traine...
10 Juli 202455min

Protecting Financial Accounts From Scams and Fraud with John Buzzard
Thieves used to rob banks and steal physical money, but in a digital world, it is much easier to sit behind a keyboard and deceive you into giving it to them. Fortunately, there are specific things yo...
3 Juli 202448min

AI: Doomsday vs. A Very Bad Day with Dr. Robert Blumofe
After a data breach, many criminals are beginning to use deep learning AI to categorize the information they have stolen. They're using a steady amount of micro attacks on individuals and businesses a...
26 Juni 202449min





















