Reduce Your Risk of Becoming a Cyber Crime Victim

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Staying Cyber Secure:

Internet security threats such as malware, ransomware, botnets, Wi-Fi threats, phishing, hacking, data loss, malicious websites . . . What can we do to protect ourselves from cyber attacks?!

Continue reading “Reduce Your Risk of Becoming a Cyber Crime Victim”

6 Paramount Points When It Comes to Cybersecurity Today

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Doorbell Cameras:

1) It is more important to ensure your business is protected from cyber criminals now than ever.

The probability that a business will be attacked is 100% if the business has any device PC, laptop, cell phone, or IoT device that connects to the internet.

Continue reading “6 Paramount Points When It Comes to Cybersecurity Today”

4 Dangers of Using USB Thumb Drives and How to Secure Data

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm. 

What Paul Tracey can say in an interview on
Thumb Drives:

 1. Malware potential. USB drives are a great way to make malware portable without breaking in through your internet access.  If USB access is open on your computers anyone can slip one in and in less time than you can make a single cup of coffee, have all of your data on the cloud.  Unfortunately, we are finding that this not only comes from bad actors adding malware on a regular drive but also from the supply chain. This is where the drive comes infected from the factory. Some attackers have also targeted electronic devices directly, and have infected items such as electronic picture frames and USB devices during production. When users buy the infected products and plug them into their computers, malware is installed on their computers.

Continue reading “4 Dangers of Using USB Thumb Drives and How to Secure Data”

Data Privacy and Data Security: Why You Need Both

Available for Interviews: Phil Crowley.

Philip P. Crowley, is a dedicated attorney who has been handling legal matters for pharmaceutical, biomedical, medical devices, information technology and other technology companies for over 30 years. He has also spent nearly 25 years on the board of trustees of the Stevens Institute of Technology, with substantial involvement in the oversight of academic innovation and entrepreneurship.

 

What Phil Crowley Can Say in an Interview:

Data privacy deals with the ownership and restrictions on the use of data acquired from others. It also deals with the processes and procedures needed to maintain the privacy of that data. Data security deals with the  details of protecting data from unauthorized disclosure or use. 

Continue reading “Data Privacy and Data Security: Why You Need Both”