QR Codes: Scanners Beware! Here’s How to Protect Yourself

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
QR Codes:

 

      • QR codes can be extremely dangerous if we are not vigilant about checking where they resolve to.
      • QR codes can and are used repeatedly at every stage of attacks. They have proven to be quite effective with phishing attacks.

Continue reading “QR Codes: Scanners Beware! Here’s How to Protect Yourself”

Cybersecurity Is Changing: What Security Issues You Need to Know About

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Multifactor Authentification:

    • Workforce Shortage. As cybercrimes continue to increase at exponential rates this segment of the workforce is not growing fast enough to meet the demand.  It is estimated that 700,000 people joined the cybersecurity workforce in 2021, however, 2.7 million more were needed. Businesses are moving much slower to attract these workers than is required and obtaining talent in this sector will become increasingly difficult.

Continue reading “Cybersecurity Is Changing: What Security Issues You Need to Know About”

Money: Avoid Getting Scammed

Available for Interviews: Suzanne Powell

Suzanne Powell Suzanne is the founder of Capital Strategies Group, and acting Vice-President of Meridian Wealth Management. She is also the author of the newly released book, The Ultimate Money Moves for Women Over 50.

What Suzanne Powell could say on
How to Avoid Getting Scammed:

    • Keep one credit card with fraud protection at a low balance and use it for any internet purchases that are not a major retailer. 
    • Do not use your debit card for any internet purchases ever.

Continue reading “Money: Avoid Getting Scammed”

Multifactor Authentification: How secure is it? (The Real Dangers in the APP Store)

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Multifactor Authentification:

We all know that we are encouraged to use multifactor authentication, which we recommend as well but how good is it really? Can it be compromised? The answer can come as a shock when we look at the security of cell phones. 

Continue reading “Multifactor Authentification: How secure is it? (The Real Dangers in the APP Store)”

Zombie Cookies! Accept or Deny Them When Surfing the Internet?

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Zombie Cookies and How to Best Protect Your System:

    • Cookies are not inherently dangerous however they can be used in a malicious manner. 
    • Persistent cookies remain on a computer indefinitely, Persistent cookies are used for two primary purposes:

Continue reading “Zombie Cookies! Accept or Deny Them When Surfing the Internet?”

President Biden Warns of Russian Cyber Attacks. Here’s What to Do

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Protection Against Cyber Attacks:

The threat on infrastructure has taken on additional significance in the eyes of government agencies for this announcement to come from President Biden. The Whitehouse is pretty much begging you to stop ignoring the warnings and act now.

Not sure this applies to you? It does!

Continue reading “President Biden Warns of Russian Cyber Attacks. Here’s What to Do”

Cybersecurity: How to Safely Use Your Credit Card Online

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Safely Using Your Credit Card Online:

    • Online checkouts are a top priority for hackers and you should NEVER use a debit card for online purchases. To mitigate risk always use a credit or prepaid card to shop online. Your money is insured for fraudulent withdrawal in either event, but when you use a debit card you actually lose the cash until it’s resolved.

Continue reading “Cybersecurity: How to Safely Use Your Credit Card Online”

The 4 Biggest Cybersecurity Risks Businesses Face

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Top Cybersecurity Threats:

1. Phishing Attacks

Phishing attacks remain the most damaging and widespread threat to personal and business data. Phishing accounts for over 90% of breaches and has grown 65% in the last year. Phishing attacks are much more sophisticated and are much more convincing when pretending to be legitimate contacts. The issue is difficult to combat because social engineering attacks human behavior and not technology weaknesses. 

Continue reading “The 4 Biggest Cybersecurity Risks Businesses Face”

Doorbell Cams: How to Mitigate the Privacy Risks They Pose

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Doorbell Cameras:

      • Doorbell cams and Home security cameras pose as much if not more risk than benefit.
      • In some cases, if an attacker gains access to these devices they can gain access to the video feed and microphones. This creates several risks even if the cameras are not inside the house.

Continue reading “Doorbell Cams: How to Mitigate the Privacy Risks They Pose”

Stealth Mode or Incognito Mode for Your Web Browsing. How Private Is It Really?

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Incognito Web Browsing:

    • Incognito or private mode will keep your local browsing private, but it won’t stop your ISP, school, or employer from seeing where you’ve been online. In fact, your employer or school has access to all your browsing activity no matter what you do. 

Continue reading “Stealth Mode or Incognito Mode for Your Web Browsing. How Private Is It Really?”