Quality Plus Consulting - Breakfast Bytes
Technology
11 security vulnerabilities highlight the necessity of viable network layer security strategy
Real world examples of small business security compliance problems
Evaluate your purchases to see if they have UPnP and understand why you should not buy devices that use UPnP technology
How easy is it to not get hacked?
Location services issues and how it relates to personal physical security
Email security and cyber risk insurance
The dark side of smart cities
Why bidding out IT jobs often fails
SIM Jacking
Vehicles and privacy issues
Wireless security, wireless TCO, 3-2-1 backup strategy, MFA and IP access control strategies
What to do in the event of a cyber attack
PrintNightmare and business risk
Tough talk about cybersecurity insurance and ransomware incidents
Understanding the concepts of the last mile and the last inch
Exposed Colonial Pipeline
Privacy problems with IoT and wearables and bluetooth
Hackers compiled data from a bunch of breaches and it's in a reusable script
What is involved in a secure endpoint strategy?
Assessing and understanding counterparty risk
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Acquired