Scott Aurnou

Why remote working strategies creates cyber-security challenges

Scott Aurnou joins Jim Blasingame to reveal how to prevent potential cyber-security challenges that are created when employees work from home over non-secure networks and with family computers.

More interviews with Scott Aurnou »See all

How the government cyber-security forces guard the U.S. election
Scott Aurnou joins Jim Blasingame to report on how the government cyber-security entities break down the election process into three different elements and strategies.
Scott Aurnou joins Jim Blasingame to discuss the increased ransomware attacks on small businesses, and how to avoid becoming a victim.
Scott Aurnou joins Jim Blasingame to report on the evolution of ransomware, including an increased focus on small businesses, plus how to deal with such an attack, from prevention to paying.
Scott Aurnou joins Jim Blasingame to report on how the government cyber-security entities break down the election process into three different elements and strategies.
Scott Aurnou joins Jim Blasingame to discuss how Big Tech, like Facebook, Twitter, etc. are complying with the 20th century Communications Decency Act in the much more complicated 3rd decade of the 21st century.