Cybersecurity Is Changing: What Security Issues You Need to Know About

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Multifactor Authentification:

    • Workforce Shortage. As cybercrimes continue to increase at exponential rates this segment of the workforce is not growing fast enough to meet the demand.  It is estimated that 700,000 people joined the cybersecurity workforce in 2021, however, 2.7 million more were needed. Businesses are moving much slower to attract these workers than is required and obtaining talent in this sector will become increasingly difficult.

Continue reading “Cybersecurity Is Changing: What Security Issues You Need to Know About”

President Biden Warns of Russian Cyber Attacks. Here’s What to Do

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Protection Against Cyber Attacks:

The threat on infrastructure has taken on additional significance in the eyes of government agencies for this announcement to come from President Biden. The Whitehouse is pretty much begging you to stop ignoring the warnings and act now.

Not sure this applies to you? It does!

Continue reading “President Biden Warns of Russian Cyber Attacks. Here’s What to Do”

Doorbell Cams: How to Mitigate the Privacy Risks They Pose

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Doorbell Cameras:

      • Doorbell cams and Home security cameras pose as much if not more risk than benefit.
      • In some cases, if an attacker gains access to these devices they can gain access to the video feed and microphones. This creates several risks even if the cameras are not inside the house.

Continue reading “Doorbell Cams: How to Mitigate the Privacy Risks They Pose”

Stealth Mode or Incognito Mode for Your Web Browsing. How Private Is It Really?

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Incognito Web Browsing:

    • Incognito or private mode will keep your local browsing private, but it won’t stop your ISP, school, or employer from seeing where you’ve been online. In fact, your employer or school has access to all your browsing activity no matter what you do. 

Continue reading “Stealth Mode or Incognito Mode for Your Web Browsing. How Private Is It Really?”

6 Ways You Can Protect Your Privacy on Workplace Computers

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Workplace Computers:

Sometimes it’s easy to forget that that computer you work on day in and day out is not really yours. You might think that your personal life is none of their business, but technically, it is! That means, that everything you do on it is subject to your employer’s information. Here are 6 things you would be wise to avoid or pay attention to when using your employer’s devices:

Continue reading “6 Ways You Can Protect Your Privacy on Workplace Computers”

4 Dangers of Using USB Thumb Drives and How to Secure Data

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm. 

What Paul Tracey can say in an interview on
Thumb Drives:

 1. Malware potential. USB drives are a great way to make malware portable without breaking in through your internet access.  If USB access is open on your computers anyone can slip one in and in less time than you can make a single cup of coffee, have all of your data on the cloud.  Unfortunately, we are finding that this not only comes from bad actors adding malware on a regular drive but also from the supply chain. This is where the drive comes infected from the factory. Some attackers have also targeted electronic devices directly, and have infected items such as electronic picture frames and USB devices during production. When users buy the infected products and plug them into their computers, malware is installed on their computers.

Continue reading “4 Dangers of Using USB Thumb Drives and How to Secure Data”

Data Privacy and Data Security: Why You Need Both

Available for Interviews: Phil Crowley.

Philip P. Crowley, is a dedicated attorney who has been handling legal matters for pharmaceutical, biomedical, medical devices, information technology and other technology companies for over 30 years. He has also spent nearly 25 years on the board of trustees of the Stevens Institute of Technology, with substantial involvement in the oversight of academic innovation and entrepreneurship.

 

What Phil Crowley Can Say in an Interview:

Data privacy deals with the ownership and restrictions on the use of data acquired from others. It also deals with the processes and procedures needed to maintain the privacy of that data. Data security deals with the  details of protecting data from unauthorized disclosure or use. 

Continue reading “Data Privacy and Data Security: Why You Need Both”