About
Articles by Tony
-
Marketing: The Essential Fuel and Engine for Business Success
Marketing: The Essential Fuel and Engine for Business Success
By Tony Bradley
-
Unveiling the (Marketing) Elephant in the Room
Unveiling the (Marketing) Elephant in the Room
By Tony Bradley
Activity
-
Well, well, well... Jamie Dimon and Marc Benioff aren't going to like this news. #science #wfh #rto #futureofwork https://lnkd.in/gnBVipe7
Well, well, well... Jamie Dimon and Marc Benioff aren't going to like this news. #science #wfh #rto #futureofwork https://lnkd.in/gnBVipe7
Liked by Tony Bradley
-
PayPal makes it so easy for hackers to take over a customer's #paypal account just by adding the hacker's email? When the customer calls them at…
PayPal makes it so easy for hackers to take over a customer's #paypal account just by adding the hacker's email? When the customer calls them at…
Liked by Tony Bradley
-
Remember to always value yourself enough to have the courage to walk away from individuals who fail to acknowledge your true worth and appreciate…
Remember to always value yourself enough to have the courage to walk away from individuals who fail to acknowledge your true worth and appreciate…
Liked by Tony Bradley
Experience & Education
Licenses & Certifications
Publications
-
2023-2024 SLED Cybersecurity Priorities Report
NuHarbor Security
This report is created to advise and empower SLED cybersecurity leaders. It provides data-driven insights from senior leaders, analysts, and experts, identifying trends and successes that are defining a new generation of cybersecurity visionaries.
-
Prevent Checkmate: Executing an Effective CTEM Program
Epiphany Systems
Epiphany’s CTEM eBook is a free resource that explains how to use Continuous Threat Exposure Management to improve your cybersecurity strategy. It describes the elements that comprise a CTEM program and describes how the Epiphany Intelligence Platform automates and enables effective continuous threat exposure management.
-
Ransomware: The True Cost to Business (2022)
Cybereason
Ransomware began as little more than a new type of malware exploit with a different payload—generating revenue by extorting payment from victims—but it has evolved into a complex business model. The malware payload is just one element of the much larger ransomware operation, or RansomOp, that make today’s attacks far more sophisticated and insidious. The study also once again finds that ‘it doesn’t pay-to-pay’ a ransom demand, as 80% of organizations that paid were hit by ransomware a second…
Ransomware began as little more than a new type of malware exploit with a different payload—generating revenue by extorting payment from victims—but it has evolved into a complex business model. The malware payload is just one element of the much larger ransomware operation, or RansomOp, that make today’s attacks far more sophisticated and insidious. The study also once again finds that ‘it doesn’t pay-to-pay’ a ransom demand, as 80% of organizations that paid were hit by ransomware a second time, with 68% saying the second attack came less than a month later and threat actors demanded a higher ransom amount...
Other authorsSee publication -
Organizations at Risk: Ransomware Attackers Don’t Take Holidays
Cybereason
Organizations at Risk: Ransomware Attackers Don’t Take HolidaysOrganizations at Risk: Ransomware Attackers Don’t Take Holidays
Cybereason · Nov 17, 2021Cybereason · Nov 17, 2021
Show publication
The lack of preparedness for ransomware attacks on weekends and holidays has a significant impact on victim organizations, with 60% of respondents saying they resulted in longer periods to assess the scope of an attack, 50% saying they required more time to mount an effective response, and 33%…Organizations at Risk: Ransomware Attackers Don’t Take HolidaysOrganizations at Risk: Ransomware Attackers Don’t Take Holidays
Cybereason · Nov 17, 2021Cybereason · Nov 17, 2021
Show publication
The lack of preparedness for ransomware attacks on weekends and holidays has a significant impact on victim organizations, with 60% of respondents saying they resulted in longer periods to assess the scope of an attack, 50% saying they required more time to mount an effective response, and 33% indicating they required a longer period to fully recover from the attack. On the human side of the equation, 86% of respondents indicated they have missed a holiday or weekend activity because of a ransomware attack, a situation that can factor into employee job satisfaction and potential burnout. One surprising finding in the study included 70% of respondents confessing that they have been intoxicated while responding to a ransomware attack during a weekend or holiday, a risk factor that many organizations may not have accounted for in their incident response planning...Other authorsSee publication -
Ransomware: The True Cost to Business (2021)
Cybereason
The global research report Ransomware: The True Cost to Business, reveals that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and even closure of the business altogether. Paying a ransom demand does not guarantee a successful recovery, does not prevent the attackers from hitting the victim organization again, and in the…
The global research report Ransomware: The True Cost to Business, reveals that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and even closure of the business altogether. Paying a ransom demand does not guarantee a successful recovery, does not prevent the attackers from hitting the victim organization again, and in the end only exacerbates the problem by encouraging more attacks. Getting in front of the threat by adopting a prevention-first strategy for early detection will allow organizations to stop disruptive ransomware before they can hurt the business.
Other authorsSee publication -
Unified Communications for Dummies
For Dummies (Wiley)
Discover what Unified Communications can do for your business
In our increasingly mobile world, communication must be effective, global, and available through multiple technologies seamlessly. Unified Communications logically blends and combines previously separate services and features, making communication possible by any means, with anyone, using any of your devices.
This complex topic is perfect for a book dedicated to making everything easier! Unified Communications For…Discover what Unified Communications can do for your business
In our increasingly mobile world, communication must be effective, global, and available through multiple technologies seamlessly. Unified Communications logically blends and combines previously separate services and features, making communication possible by any means, with anyone, using any of your devices.
This complex topic is perfect for a book dedicated to making everything easier! Unified Communications For Dummies introduces you to the many advantages this technology offers your business and shows you how to develop a strategy for bringing it about.
Unified Communications is a new paradigm for working and communicating efficiently and collaboratively
This book explains the features available with Unified Communications and how they can create new capabilities to drive customer satisfaction
Shows how Unified Communications encompasses office and mobile phones, voicemail, instant messaging, fax, Internet phone calls, texting, and even Web conferencing
Provides a step-by-step approach for creating a Unified Communications strategy
Offers tips for improving the implementation process
Shares real-world examples of how Unified Communications is being used today
Unified Communications For Dummies shows you how to meet business needs with this emerging, cutting-edge solution.Other authorsSee publication -
PCI Compliance (Understand and Implement Effective PCI Data Security Standard Compliance)
Syngress
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or…
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.
*PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data
*Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant
*The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needsOther authorsSee publication -
Essential Computer Security (Everyone's Guide to E-mail, Internet, and Wireless Security)
Syngress
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.
-
Hacker's Challenge 3
McGraw-Hill / Osborne
Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more…
Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.
Other authorsSee publication
Organizations
-
Microsoft MVP
-
-
Recommendations received
68 people have recommended Tony
Join now to viewMore activity by Tony
-
Whitepaper: What CFOs Should Know about Ransomware: A #CFO must ensure that resources are allocated to support #security initiatives while promoting…
Whitepaper: What CFOs Should Know about Ransomware: A #CFO must ensure that resources are allocated to support #security initiatives while promoting…
Liked by Tony Bradley
-
Call me a geek, but I love seeing these videos. And having been part of the Zscaler family in 2023, I know this years ZenithLive was a fantastic way…
Call me a geek, but I love seeing these videos. And having been part of the Zscaler family in 2023, I know this years ZenithLive was a fantastic way…
Liked by Tony Bradley
-
My 5-step business plan: 1. Share Free Insights: Build a loyal community on social media by providing valuable insights and establishing yourself…
My 5-step business plan: 1. Share Free Insights: Build a loyal community on social media by providing valuable insights and establishing yourself…
Liked by Tony Bradley
-
Normally when I confront a notorious hacker with connections to their real-life identity, I get fed a bunch of unlikely explanations for why those…
Normally when I confront a notorious hacker with connections to their real-life identity, I get fed a bunch of unlikely explanations for why those…
Liked by Tony Bradley
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Tony Bradley in United States
362 others named Tony Bradley in United States are on LinkedIn
See others named Tony Bradley