Blog Posts Tagged with "Security Awareness"

11146d62a6c31fb9fac8ac8ac991e08d

There is No Incentive to End Security Apathy

October 11, 2010 Added by:Andy Willingham

I’m all for protecting peoples accounts no matter what type they are. After all I am in Information Security for a reason. The problem is that protecting accounts requires the user to want to protect it. We can’t continue to hold their hands and fix all of their problems for them...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Log Out, Log Out - I repeat, LOG OUT!

October 08, 2010 Added by:Robert Siciliano

One of the most common causes of data breaches is failure to properly log out of public PCs. Some PC admins install password managers that prompt the user to save login credentials. If you are on someone else’s PC and get this kind of pop-up, read it carefully before just clicking buttons...

Comments  (7)

Dd9902bc56a9d85cdc62c00083ea4871

Is Your Janitor Cleaning Out Your Sensitive Information?

September 30, 2010 Added by:Katie Weaver-Johnson

A janitor was recently arrested for removing boxes of records from a health care clinic. Interested only in getting money for the paper, the janitor sold 14 boxes of patient records to a recycling center for $40. This janitor was not interested for identity theft, but the next one might be…

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Tales From a Non-Security Professional End User

September 28, 2010 Added by:Brent Huston

I remember when I thought: Information security? Sure. A bunch of geeks patrolling their networks. I had seen the movie Hackers, after all. I had no idea of the breadth and depth of information security. Any piece of technology that you use that has sensitive data stored can be stolen...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Are You Your Own Chief Security Officer?

September 25, 2010 Added by:Robert Siciliano

In my home environment, I’m the CSO. My belief is everyone has a job to do in personal safety. No matter what, you must protect yourself and family from the bad-guy. The hard part about this part time job is it requires a bit of thought...

Comments  (2)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (010)

September 24, 2010 Added by:Christophe Veltsos

Who said: "Considering the anonymity of cyberspace, cybercrime may in fact be one of the most dangerous criminal threats ever. A vital component in fighting transnational crime must therefore include the policing of information security.."?

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Kids, Social Media, Device Security, and Malware

September 22, 2010 Added by:Christopher Burgess

In 2010, back-to-school preparations no doubt will include a technology component, often times more than one technology. So here are a few safety tips to help your student stay safe as they prepare and use their electronic media devices back at school...

Comments  (0)

7af56c65866a442699d6dd1dfb02b528

Cybercrime Victims Feel Ripped Off

September 20, 2010 Added by:Eli Talmor

Securing identity solutions against misuse is paramount. Security ensures confidentiality, integrity, and availability of identity solutions: Strong cryptography, use of open and well-vetted security standards, and the presence of auditable security processes are critical...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Killer Computer Viruses

September 15, 2010 Added by:Robert Siciliano

Technology plays a role in many aspects of our lives, and when that technology is corrupted, the results can be disastrous. Consider the extent to which hospitals, banks, water treatment facilities, electrical grids, airports, gas stations, and even roads rely on technology...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Got Go Bag? Musings on Physical Security

September 10, 2010 Added by:shawn merdinger

While we most often think about security issues from the information protection viewpoint on Infosec Island, it's useful to review physical security scenarios. If you had to get up now and leave because of an emergency, what would you bring with you to survive for 72 hours with no support?

Comments  (2)

Ebb72d4bfba370aecb29bc7519c9dac2

Monthly Security Blog Round-Up for August 2010

September 08, 2010 Added by:Anton Chuvakin

Blogs are stateless and people often pay attention only to what they see today. Thus a lot of useful security reading material gets lost. These monthly round-ups is my way of reminding people about interesting blog content. If you are too busy to read the blogs, at least read these...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (009)

September 06, 2010 Added by:Christophe Veltsos

Who said, "In the cyber world, if someone launches an attack, you might not be sure who is behind it and you don’t know what the intent is. In the military world, they make a distinction between information gathering and an actual attack..."?

Comments  (1)

D13f77e036666dbd8f93bf5895f47703

Is Your Kid Ready for Email?

September 02, 2010 Added by:Theresa Payton

Eight hours a day! And we’re not talking about your work day. We’re talking about the time your kids spend surfing the net, on a smartphone, TV or electronic devices. Your kid also wants their own email account but is this smart or even safe?

Comments  (4)

6d1c762d9c16395a7e258d098091ee00

Cyber Defense Weekly: USDAs $10m Cybersecurity Contract

August 31, 2010 Added by:Cyber Defense Weekly

Agriculture has been defined as part of the US' critical infrastructure. A $10 million award to ManTech for security monitoring, alerting, and response is small, but then USDA is one of the smaller Federal Agencies. Look for more such contracts here...

Comments  (0)

E973b16363b3de77b360563237df7e32

Secure Information Disposal Procedures

August 30, 2010 Added by:Bozidar Spirovski

Your organization bought computers, used them and now it's time to discard them. Most old hardware is donated to schools or is simply auctioned off. All that data contains a lot of confidential information, and it is essential that such data is properly erased so it cannot be recovered...

Comments  (0)

C7159a557369b66632c4b54bf746b69e

Security Awareness: Social Engineering Part One

August 30, 2010 Added by:Sean Inman

Like fraudsters generally, social engineers take advantage of human gullibility. In a corporate context, social engineering is a factor in many information security incidents, including those perpetrated by insiders...

Comments  (0)

Page « < 11 - 12 - 13 - 14 - 15 > »