Blog Posts Tagged with "Olympics"

F29746c6cb299c1755e4087e6126a816

Teenage Olympics: Pouts, Pot and Piddle

August 12, 2012 Added by:Kelly Colgan

Identity theft is one area where the ignorance of children and their parents can be more costly than a wobbly landing or delayed start off the blocks. It can hamper their ability to secure funding to attend college or buy a car, and to land a job. Children aren’t the only ones who are vulnerable to identity theft...

Comments  (1)

F29746c6cb299c1755e4087e6126a816

Online Threats That Will Throw You Off the Security Balance Beam

August 09, 2012 Added by:Kelly Colgan

We can’t sugarcoat it, because there’s more at stake for online users than going for gold or settling for silver. One blip on the beam or pratfall on the pommel can make a bank-account balance drop faster than an icy judge’s score. And it’ll take more than a Wheaties box to build it back...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

The Bad Guys Know You’re an Olympics Addict

August 08, 2012 Added by:Kelly Colgan

The emerging theme from these Summer Games: There’s a general lack of awareness among consumers and end users about possible threats when they’re online. Even with corporate security professionals on high alert, it is ultimately end users and consumers who will make the choice that infects the system...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

DHS: Cybersecurity Awareness and the Summer Olympics

July 19, 2012 Added by:Infosec Island Admin

Hackers frequently take advantage of highly-publicized events and popular news to get users to click on fraudulent links and unknowingly download malware onto their computers, smart phones, tablets, and other wireless devices. To avoid these online scams, it's important to follow these practices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Security for 2012 Olympics Focus of Business Continuity Forum

March 19, 2012 Added by:Headlines

"The market-wide exercise showed that the banking community is prepared to handle some aspects of a cyber attack, but must shore up other areas. I encourage all managers to think about whether they are have adequate, practical plans in place..."

Comments  (2)