Blog Posts Tagged with "Security Awareness"


Congress Proposes Sales Tax For Internet Sales

August 04, 2010 Added by:Michael Volkov

So far, 23 states have adopted streamlined tax systems to collect taxes and generate revenues, RILA said. Critics of the change argue closing the loophole on purchases made over the Internet would mean a tax increase for Americans...

Comments  (1)


Bullet Proof Hosting: Financing and Payment

August 02, 2010 Added by:Nathaniel Markowitz

Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis is a method used by organizations to maximize effectiveness. Generally, these groups analyze internal and external factors to generate strategies to strengthen their business or organizational model...

Comments  (0)


The Windows Support Scam

July 30, 2010 Added by:Simon Heron

Recent articles published in the Guardian have revealed that fraudsters are continuing to cold call people, claiming to be a Windows support tech and getting the users to give them remote access to their PCs...

Comments  (3)


US at High Risk for Computer Attack

July 30, 2010 Added by:Global Knowledge

Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...

Comments  (2)


Effective WiFi Neighborhood Watch Programs

July 26, 2010 Added by:Christopher Burgess

Neighborhood Watch groups typically focus on observation and awareness as a means of preventing crime and employ strategies that range from simply promoting social interaction and watching out for each other to active patrols by groups of citizens...

Comments  (0)


What To Do With Old Hard Disks

July 26, 2010 Added by:Rod MacPherson

If you keep your old hard disk you will always have access to it as a point in time backup of what your old system had installed and what files you had at the time of your upgrade...

Comments  (3)


Dr. InfoSec's Quotes of the Week (004)

July 25, 2010 Added by:Christophe Veltsos

Who said: "Anyone who visits a social networking site should know that it's a business model. The service is not free. We users pay for it with our private data..."?

Comments  (1)


Washington Post Launches Top Secret America

July 23, 2010 Added by:Lee Mangold

So let me ask the Islanders some questions: Do you think this is responsible reporting? Is it right to publish the locations of the Nations secrets to the world? If you're outside of the US, how would you feel about this in your country?

Comments  (4)


What is “Swatting” And How Do I Protect My Family

July 16, 2010 Added by:Robert Siciliano

SWAT is Special Weapons and Tactics. Those are the guys and gals in all black with the headgear and big guns. Caller ID spoofing technologies are used as a tool to disguise the caller and send law enforcement officers on bogus calls...

Comments  (0)


Getting Physical: Hot Summer Security

July 16, 2010 Added by:Pete Herzog

OSSTMM 3 requires that you don't look to the threat to prepare your security plan because it's too easy to only make changes which affect a small portion of the threats. That's especially true when you consider how unpredictable human behavior can be...

Comments  (10)


Security Cameras Can Speak Volumes

July 15, 2010 Added by:Robert Siciliano

Cameras are everywhere. We are on camera at most retails stores, banks, ATMs, busy intersections, highways, downtown areas and in neighborhoods. It keeps the honest people honest and the bad guys in-check or in jail...

Comments  (0)


My Laptop Security Travel Ordeal

July 11, 2010 Added by:Robert Siciliano

When we got to the resort we were swarmed with hotel help/bellmen pulling our bags out of the van. As I’m counting bags and kids on my way back to the van to get my two other bags, the van drove away. My laptop and backpack were still in the front seat...

Comments  (5)


Dr. InfoSec's Quotes of the Week (003)

July 11, 2010 Added by:Christophe Veltsos

Who said: "The biggest vulnerability we face today and the future is not the thing that the technical security person would think of, like a botnet or technical flaw, but the misperception of risk..."?

Comments  (0)


Securing Against the Malware Torrent

July 11, 2010 Added by:Rahul Neel Mani

As cloud computing makes inroads around the globe, new security issues keep emerging. In an exclusive conversation, Juan Santana, CEO of Spain-based Panda Security shares his thoughts with CTO Forum's Dominic K...

Comments  (0)


Organizational Security: Is Your Door Wide Open?

June 29, 2010 Added by:Katie Weaver-Johnson

Last Tuesday at about 2:00 AM, I woke up to the doorbell ringing and knocking on our front door. While I was initially a little startled, my next thought was, “Why isn’t our ferocious guard dog barking?”

Comments  (3)


FaaS: Fraud as a Service

April 14, 2010 Added by:Mike Meikle

In working with various clients on the topic of security, a common theme has emerged. Management and employees still labor under the perception that fraud is still the purview of unorganized individuals with an axe to grind against a specific company. 

Comments  (0)

Page « < 12 - 13 - 14 - 15 - 16 > »