SORT BY Relevancy
On November 20 my guest will be Brian Rauer, Executive Director of the Mid-Hudson (NY) Better Business Bureau and General Counsel of the Better Business Bureau serving Metropolitan New York. Earlier experience includes the Manhattan based law firm of Plunkett & Jaffe, P.C. Mr. Rauer serves on the Westchester County Consumer Advisory Council and was formerly on the Administrative Law Judge/Hearing Officer roster for the Westchester County Human Rights Commission. He previously served on the Board of Directors of the NY County Lawyers’ Assn. (NYCLA) and on the House of Delegates of the NY State Bar Association. He is a past Chair of the NYCLA Cyberspace Law Committee. He previously served on the Board of Directors of the Association for Conflict Resolution-Greater NY Chapter and the Board of Directors of the NY State Dispute Resolution Assn. Mr. Rauer formerly hosted/presented a regular segment on a nationally syndicated radio show and has presented an extensive array of programs on hot topics of public interest, including privacy/security, ID theft prevention and ethical business practice. He is a Magna Cum Laude graduate of Tulane Law School, receiving the Tulane Law Dean's Medal and selection for the Order of the Coif. Mr. Rauer earned his B.S. degree, Summa Cum Laude, in Business Administration.
The Internet has grown business at a rate before unknown. But it has also created security threats and issues that can compromise the integrity of your business. Listen in as Video Broadcast Services President, Marcia Hawkins and Vice President, Kyle Clouse discuss how you can avoid data security issues and keep your business and personal information safe.
This week we'll discuss data security with John Martin and the team from First Watch Technologies!
John will share best practices in keeping your brand and business safe from data breaches and other technology threats. Join us Wednesday at 8pm ET!
Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe. It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.
Joining us will be Randy Roberts, President of Digital Security Advisors. DSA provides expertise to understand, design and implement controls needed to provide a secure network. With global enterprise experience our team can help your organization design or redesign your network so that it actively assist your team secure your assets. We discuss Sony, Home Depot and JP Morgan Chase data breaches.
Connect with Randy: www.linkedin.com/in/rsroberts
Data security is a hot C-suite and board level topic as more and more companies make unflattering news when they’ve been hacked and valuable information gets stolen and misused.
What two factors are essential for keeping your data safe? How safe is the Cloud? How do you create unique passwords you can actually remember? What’s the first thing you should do if you believe your computer has been hacked?
Discover the answers by joining host Hanna Hasl-Kelchner as she welcomes Randy Gilmore, Security Consultant from Protus3, a security consulting, investigations, and design firm with a commitment to provide comprehensive programs and controls so clients will have the assets and stability to prosper.
Rusty has been involved in countless computer forensic cases . . . think of it as CSI Cyber but happening to a business near you.
Since it’s always smarter and cheaper to learn from other people’s mistakes it pays to tune on for his powerful tips and strategies to help keep your valuable data safe.
This program is proudly sponsored by the Legal Leverage® Academy, a div. of Business M.O., LLC.
4 Essential Pieces to Any Small Business BYOD Strategy
Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.
We’ve come a long way. Today, businesses really have no choice but to let employees use personal devices for work purposes. Blurred lines now make it difficult to differentiate between what is professional and what is personal. A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.
Naturally, security and privacy issues are a concern since these devices synch to the company network. Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to but smaller businesses have limited resources.
A Smarter Approach to Mobile Device Management
More people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime.
Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction.
But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?
Why SMBs Must Proactively Address the Threat of Mobile Hacks
More cyber criminals are targeting small-to-medium sized businesses. One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place. Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets.
This is a real cause for concern since data breaches have the ability to put many already financially challenged SMBs out of business.
If customer/client data has been breached, there could be potential litigation costs, and naturally, lost goodwill and an irreparable hit to brand or company reputation. In part 2, we will discuss why this is a must!
3 Things to Consider Before Jumping Into BYOD
You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.
Brought to you by The American Public Safety Training Institute (TAPSTI) www.tapsti.org, this 2 hour session will review the work of Mark Sauter and James Carafano and their excellent textbook entitled “Homeland Security” (2012, 2nd ed.). This seminar includes a historical review of the Department of Homeland Security (DHS) from its early colonial legacy, to the Cold War, and then into its transition into its current form as the result of 9/11. Contemporary homeland security includes a huge array of challenges as our society becomes more technologically oriented and, as a result, more susceptible to targeting. We are dependent on stability in a very unstable world and, for the first real time, a very small group of people can wreak tremendous havoc. This seminar focuses on the change from national security being one that assumed the "homeland" was safe from its own people and the dangers were from outside our own borders to the present day where there can be no assumptions made where the next attack will come from.
Welcome to The History of Jet Skis! Where we will share with special guests the memories, races, rescues, industry, triumphs and rides with us as we build your Jetski community to preserve the heritage and legacy for future generations to enjoy. We are constantly added new content, so visit often! We appreciate your participation, together we can chronicle the data from the early years of the sport and industry, so the present generation knows where we came from.
Guest presenter: Joe Ballistrea
Host Joe Ballistrea shares his early influences and experiences during the formative years of the jet ski racing scene in Southern California
Host: Shawn Alladio
Which Generation are you?
1. First Generation-1973-1979
2. Second Generation 1980-1989
3. Third Generation 1990-1999
4. Fourth Generation 2000-2009
5. Fifth Generation 2010+
Join Host Live Chats
- Black Whole Radio (3 chatters)