Blog Posts Tagged with "Security Awareness"

B64e021126c832bb29ec9fa988155eaf

Windows 8 Security in Action: Part 1

November 04, 2012 Added by:Dan Dieterle

Is Windows 8 the next operating system for your enterprise? In this article, we will take a quick look at Microsoft’s new OS – Windows 8. We will see some of the new security features that make it more secure than its predecessor Windows 7...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Does it Make Sense to Keep Changing Your Passwords?

October 31, 2012 Added by:Rafal Los

I'm running a small experiment on myself in which I've set up an account on a public, high-traffic web-based system out there that has a ton of my personal information. I've not changed my password in almost 6 months, but I still feel relatively good and certain that I am the only one who has access to my stuff...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Ask The Experts: Online Banking

October 24, 2012 Added by:Brent Huston

Instead of using your actual name as your login, why not use something different that is hard to guess and doesn’t reveal anything about your identity? It always pays to make it as tough on the cyber-criminals as possible..

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Paying Lip Service (Mostly) to User Education

October 24, 2012 Added by:Fergal Glynn

The connection between improved security and user education is so well-established as to be almost axiomatic. Better technology, coding practices and testing can only accomplish so much. So what’s being done about the dearth of solid user education?

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Hacktivists Using Shortened Links to Hide Malware Servers

October 15, 2012 Added by:Dan Dieterle

“Most did not recognise that people using fake profiles, perhaps masquerading as school friends, could capture information and movements. Few consider the possibilities of data mining and how patterns of behaviour can be identified over time..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

It’s National Cyber Security Awareness Month

October 11, 2012 Added by:Robert Siciliano

There are few pseudo holiday celebration days or months that truly get my attention. But National Cyber Security Awareness Month is the one month a year that consumers are reminded by news reporters, government agencies, non-profits and companies that security is everyone’s responsibility...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Six Questions to Ask Before Posting to Social Networks

October 10, 2012 Added by:Rebecca Herold

Every day I see yet another situation where employees misused, abused or otherwise accused social media sites to the chagrin of their employers. Businesses need to make a coordinated effort, using a combination of policies, training and technology to mitigate the risks of workers using social media sites...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

October Is National Cyber Security Month

October 01, 2012 Added by:Allan Pratt, MBA

No information is guaranteed to be 100% breach-free. You must be vigilant when it comes to knowing what information about you is online. No business entity is solely responsible for securing the Internet. You play the most important role in protecting your own digital life...

Comments  (0)

E6fba550184963cb20ac46502a1fa1ee

Social Engineering: What the Heck Was I Doing? Part 1

September 26, 2012 Added by:Will Tarkington

The method I used for this particular tactic was to monitor the conversational rhythm. Then inject into it and take it over allowing me to guide the conversation. The skill set that allows you to walk into a conversation and take it over can’t be understated...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Malicious Websites: The Web is a Dangerous Place

September 25, 2012 Added by:Robert Siciliano

McAfee’s latest Threats Report shows a growth in malicious websites replacing botnets as the primary infection mechanism. This means that by just simply visiting a website you could be exposed to malicious things that can do harm to your computer, mobile device, finances or identity...

Comments  (2)

D13f77e036666dbd8f93bf5895f47703

What Exactly is Internet Safety Anyhow?

September 23, 2012 Added by:Theresa Payton

What does Internet safety mean to the average person? It may vary depending upon age, how you use the internet, and the type of work that you do that involves the digital world. Here are some sobering statistics that might give you a perspective...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Clipboards, Confidence, and Information Security

September 17, 2012 Added by:Tripwire Inc

How do you teach paranoia and suspicion? We often hire people because of their willingness to help others, their good communication skills, their ability to be responsive, etc. As we work through securing our humans, we need to strike a balance – trust but verify, assist but not unquestioningly...

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

The Fine Print of Smartphone Privacy

September 14, 2012 Added by:Allan Pratt, MBA

How often do you think about your cell phone or smartphone privacy? Sure, you think about its physical security, but how often do you think about the security of your data? Your contacts, your email addresses, your location data, your apps, etc. You probably don’t think about this enough...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How to Handle a Credit Card Breach While Abroad

September 13, 2012 Added by:Robert Siciliano

A 60-day window covers two billing cycles, enough for most account-conscious consumers who keep an eye on their spending. Victims of fraudulent credit card charges only wind up paying the unauthorized charges if they fail to report the credit card fraud within 60 days...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Will the Rise of Tablets Affect Security Measures in the Workplace?

September 11, 2012 Added by:Robert Siciliano

While your company’s IT guy has a relative hold on the work laptops and desktops, and even some of the mobiles, he is quickly losing control when you bring your new Droid and connect it to the corporate network. Now he has to worry if that last app you downloaded will infect the network...

Comments  (0)

32137b352537f11c1efe063869f00e0e

Java, Flash, and the Choice of Usability Over Security

September 10, 2012 Added by:Le Grecs

Convenience vs. Security: My goal of not installing Flash and Java on a new system didn't last more than a few hours. Yet, as infosec professionals, following the disable unnecessary services philosophy, we advise not installing these types of applications for security reasons...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »