Blog Posts Tagged with "Security Awareness"

B44a73900ca3197c2d8f148e303b3faa

Using NLP to Go Beyond “SMART” Goals

March 04, 2011 Added by:Brad Bemis

SMART goals are supposed to be Specific, Measurable, Achievable, Realistic, and Time-based. That seems pretty reasonable, so what’s missing? Neuro-Linguistic Programming introduces the concept of using a ‘well-formed’ outcome process – a process that makes your SMART goals even smarter...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Protecting Children on the Internet

February 04, 2011 Added by:Robert Siciliano

Parents who lack experience with the Internet, computers, or mobile phones must learn the basics before they can adequately monitor their children’s habits. A parent’s discomfort or unfamiliarity with technology is no excuse to let a child run wild on the Internet...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Getting Buy-In for Information Security

January 24, 2011 Added by:Robb Reck

The goal is an organization with workers who are focused on information security across all departments. Sitting in the CISO's office coming up with great ideas for security with a few InfoSec members will never be enough. We need employees thinking of security as a crucial part of their work...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Eight Essential Tips for a Secure 2011

December 30, 2010 Added by:Headlines

The list includes the obvious and not so obvious steps every user of online and mobile devices should implement. Grier's recommendations are simple, quick to employ, and can be accomplished at little or no cost to consumers...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Eleven Tips for Secure Online Shopping

December 22, 2010 Added by:Robert Siciliano

Here are eleven tips to have a safe online shopping experience during the holiday season: Avoid spoofed websites - Common sense says any time you receive an offer via an e-mail automatically be suspicious. The same goes with offers via tweets and messages received in any social media site...

Comments  (7)

3e35900ae6facc6c146a85c435c71d82

Deceptive Emails - This Time From SAP

December 08, 2010 Added by:Ben Rothke

I just received an email from VeriSign that shows they did remove all misleading language. But SAP seems not to have learned the same lesson. The subject line of ‘Get a $10 Gift card by completing IFRS Survey’ is clearly deceptive...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Security Issues Should You Worry About?

December 02, 2010 Added by:Robert Siciliano

For many of the issues we worry about the chances of them happening might be 1 in a 100,000 or 1 in 10 million. Your chances of something bad happening may equate to the same statistics as winning the lottery, which is very slim, but you still might play the number...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Savvy and Secure Shopping for the Holiday Season

November 19, 2010 Added by:Theresa Payton

Before you start your online shopping, make sure you have the latest web browser and update your virus protection. Avoid making purchases if you are using free wireless and you cannot validate the security and privacy of your transaction. Never give payment or personal information via email...

Comments  (1)

1f2f664e68a603b3c54890fbbcd37857

Security Awareness in a Connected World

November 16, 2010 Added by:Mark Gardner

In a new more open internet age, where privacy is somewhat discarded, the threat to the enterprise is increased, because of the blurring between home and work. It is only by shouting above the noise to get the security message across, can the enterprise be protected...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Is Your Incident Reporting System Putting Your Organization At Risk?

November 11, 2010 Added by:Katie Weaver-Johnson

Is your incident reporting system working against you? Lessons learned continue to show that organizations find themselves in reaction mode more than they are in prevention mode. How can this be when most every organization claims to have an incident reporting system in place?

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Five Things: Protect Your Webmail Account

November 10, 2010 Added by:Robb Reck

Take a moment and ensure that all your internet email accounts are secure. Go through these steps and maybe you can avoid being awakened in the morning, like my wife did, to find that your mother is seriously concerned that you got involved in some shady dealings in Cyprus...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Five Sneaky Credit Card Scams

November 04, 2010 Added by:Robert Siciliano

You hand your card to a clerk, and they have a card reading wedge device that looks like this. The device may be wrapped around a band on their ankle. They bend over and make it look like they are fixing a sock, once they swipe the card through, they can make charges on your card...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (012)

October 31, 2010 Added by:Christophe Veltsos

Who said: "In short, like every other major new weapons system introduced since the slingshot, Stuxnet creates new strengths as well as new vulnerabilities for the states that may wield it..."?

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Security Awareness Training - At Age 5?

October 23, 2010 Added by:Katie Weaver-Johnson

Before you hand over that phone to provide some extra entertainment when you get stuck in line at a restaurant, you may want to make sure all other applications are locked down, you have signed out of your email and other social networking sites...

Comments  (1)

C787d4daae33f0e155e00c614f07b0ee

Information Security as the Status Quo

October 21, 2010 Added by:Robb Reck

Effective security is created, implemented and maintained by the technical folks who create and manage the systems and applications themselves. In order to achieve a secure environment we need to move beyond the outdated model that goes something like this...

Comments  (2)

37d5f81e2277051bc17116221040d51c

On the Internet, FREE is a Dangerous Four Letter Word

October 16, 2010 Added by:Robert Siciliano

The risk of fraud increases significantly when including the words free and MP3 in the same search query. When you add the word free to a search for ringtones, your risk increases by 300%. Cybercriminals lure users with words like free in order to infect their PCs with malicious software...

Comments  (2)

Page « < 10 - 11 - 12 - 13 - 14 > »
Most Liked