QR Codes: Scanners Beware! Here’s How to Protect Yourself

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
QR Codes:

 

      • QR codes can be extremely dangerous if we are not vigilant about checking where they resolve to.
      • QR codes can and are used repeatedly at every stage of attacks. They have proven to be quite effective with phishing attacks.

Continue reading “QR Codes: Scanners Beware! Here’s How to Protect Yourself”

Money: Avoid Getting Scammed

Available for Interviews: Suzanne Powell

Suzanne Powell Suzanne is the founder of Capital Strategies Group, and acting Vice-President of Meridian Wealth Management. She is also the author of the newly released book, The Ultimate Money Moves for Women Over 50.

What Suzanne Powell could say on
How to Avoid Getting Scammed:

    • Keep one credit card with fraud protection at a low balance and use it for any internet purchases that are not a major retailer. 
    • Do not use your debit card for any internet purchases ever.

Continue reading “Money: Avoid Getting Scammed”

Multifactor Authentification: How secure is it? (The Real Dangers in the APP Store)

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Multifactor Authentification:

We all know that we are encouraged to use multifactor authentication, which we recommend as well but how good is it really? Can it be compromised? The answer can come as a shock when we look at the security of cell phones. 

Continue reading “Multifactor Authentification: How secure is it? (The Real Dangers in the APP Store)”

President Biden Warns of Russian Cyber Attacks. Here’s What to Do

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Protection Against Cyber Attacks:

The threat on infrastructure has taken on additional significance in the eyes of government agencies for this announcement to come from President Biden. The Whitehouse is pretty much begging you to stop ignoring the warnings and act now.

Not sure this applies to you? It does!

Continue reading “President Biden Warns of Russian Cyber Attacks. Here’s What to Do”

Cybersecurity: How to Safely Use Your Credit Card Online

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Safely Using Your Credit Card Online:

    • Online checkouts are a top priority for hackers and you should NEVER use a debit card for online purchases. To mitigate risk always use a credit or prepaid card to shop online. Your money is insured for fraudulent withdrawal in either event, but when you use a debit card you actually lose the cash until it’s resolved.

Continue reading “Cybersecurity: How to Safely Use Your Credit Card Online”

5 Scary Internet Mistakes We Commonly Make

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
The Common Internet Mistakes We Make:

We have all heard the reports or possibly done business with a company that’s been breached. Our digital security issues are not going away.  The truth is we can do a great deal to protect our data just by changing some of our online behaviors. Here are 5 easily correctable mistakes being made when we are online:

Continue reading “5 Scary Internet Mistakes We Commonly Make”

4 Dangers of Using USB Thumb Drives and How to Secure Data

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm. 

What Paul Tracey can say in an interview on
Thumb Drives:

 1. Malware potential. USB drives are a great way to make malware portable without breaking in through your internet access.  If USB access is open on your computers anyone can slip one in and in less time than you can make a single cup of coffee, have all of your data on the cloud.  Unfortunately, we are finding that this not only comes from bad actors adding malware on a regular drive but also from the supply chain. This is where the drive comes infected from the factory. Some attackers have also targeted electronic devices directly, and have infected items such as electronic picture frames and USB devices during production. When users buy the infected products and plug them into their computers, malware is installed on their computers.

Continue reading “4 Dangers of Using USB Thumb Drives and How to Secure Data”

5 Things Business Can Do Right Now in the Extended COVID Environment

Available for Interviews:  Marc Freedman

Marc Freedman is Certified Expense Reduction Consultant advising businesses on keeping more of the money they make. He is also the author of Expense to Profit: Eliminate The Costs That Sabotage Your Growth.

Talking Points / What Mark Freedman can say in an interview:

 1. Remote Solutions. With most of your workforce working remotely, review your “new normal” solutions. 

 2. Office Leases. As a business owner you can reduce your office footprint by renegotiating leases.

Continue reading “5 Things Business Can Do Right Now in the Extended COVID Environment”

Hackers, Phishing, and Social Engineering: Protection With These Cyber Tips

Available for Interviews Phil Crowley

Philip P. Crowley, is a dedicated attorney who has been handling legal matters for pharmaceutical, biomedical, medical devices, information technology and other technology companies for over 30 years. He has also spent nearly 25 years on the board of trustees of the Stevens Institute of Technology, with substantial involvement in the oversight of academic innovation and entrepreneurship.

 

Talking Points from Phil Crowley
on How to Practice Good Online Hygiene

Hackers are threatening to  reveal personal details of some of the very famous clients of NYC attorney Allen Grubman, e.g. Elton John, Lady Gaga and Barbara Streisand.  We don’t yet know the details of how the hackers gained access to the system or what data they have. Nonetheless, the incident reminds us to exercise good “online hygiene” habits, i.e. cybersecurity, especially as more workers are working from home, either on business computers or home computers.

Continue reading “Hackers, Phishing, and Social Engineering: Protection With These Cyber Tips”