Ransomware 101: Don’t Be a Victim

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Ransomware:

We should all know by now that ransomware is a threat to everyone, not just companies.

The data tells us that 95% of ransomware attacks originate with social engineering and phishing emails. So if we want to mitigate the majority of risks, social media and email hygiene are a necessity. 

Continue reading “Ransomware 101: Don’t Be a Victim”

5 Scary Internet Mistakes We Commonly Make

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
The Common Internet Mistakes We Make:

We have all heard the reports or possibly done business with a company that’s been breached. Our digital security issues are not going away.  The truth is we can do a great deal to protect our data just by changing some of our online behaviors. Here are 5 easily correctable mistakes being made when we are online:

Continue reading “5 Scary Internet Mistakes We Commonly Make”

The 4 Biggest Cybersecurity Risks Businesses Face

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Top Cybersecurity Threats:

1. Phishing Attacks

Phishing attacks remain the most damaging and widespread threat to personal and business data. Phishing accounts for over 90% of breaches and has grown 65% in the last year. Phishing attacks are much more sophisticated and are much more convincing when pretending to be legitimate contacts. The issue is difficult to combat because social engineering attacks human behavior and not technology weaknesses. 

Continue reading “The 4 Biggest Cybersecurity Risks Businesses Face”

Hackers, Phishing, and Social Engineering: Protection With These Cyber Tips

Available for Interviews Phil Crowley

Philip P. Crowley, is a dedicated attorney who has been handling legal matters for pharmaceutical, biomedical, medical devices, information technology and other technology companies for over 30 years. He has also spent nearly 25 years on the board of trustees of the Stevens Institute of Technology, with substantial involvement in the oversight of academic innovation and entrepreneurship.

 

Talking Points from Phil Crowley
on How to Practice Good Online Hygiene

Hackers are threatening to  reveal personal details of some of the very famous clients of NYC attorney Allen Grubman, e.g. Elton John, Lady Gaga and Barbara Streisand.  We don’t yet know the details of how the hackers gained access to the system or what data they have. Nonetheless, the incident reminds us to exercise good “online hygiene” habits, i.e. cybersecurity, especially as more workers are working from home, either on business computers or home computers.

Continue reading “Hackers, Phishing, and Social Engineering: Protection With These Cyber Tips”