Blog Posts Tagged with "Security Awareness"

D53ddb574ebf68fcd3a4fcc6d5fb257a

Congress Proposes Sales Tax For Internet Sales

August 04, 2010 Added by:Michael Volkov

So far, 23 states have adopted streamlined tax systems to collect taxes and generate revenues, RILA said. Critics of the change argue closing the loophole on purchases made over the Internet would mean a tax increase for Americans...

Comments  (1)

63b96d79afc327c98a13c614670feca0

Bullet Proof Hosting: Financing and Payment

August 02, 2010 Added by:Nathaniel Markowitz

Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis is a method used by organizations to maximize effectiveness. Generally, these groups analyze internal and external factors to generate strategies to strengthen their business or organizational model...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

The Windows Support Scam

July 30, 2010 Added by:Simon Heron

Recent articles published in the Guardian have revealed that fraudsters are continuing to cold call people, claiming to be a Windows support tech and getting the users to give them remote access to their PCs...

Comments  (3)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

US at High Risk for Computer Attack

July 30, 2010 Added by:Global Knowledge

Seventy-four percent of respondents believe that a network attack on the government’s IT infrastructure is expected in the next year. While there is much to debate with regard to these findings, there is a need for greater network security...

Comments  (2)

16443e0c6f6e4a400fd0164b3c406170

Effective WiFi Neighborhood Watch Programs

July 26, 2010 Added by:Christopher Burgess

Neighborhood Watch groups typically focus on observation and awareness as a means of preventing crime and employ strategies that range from simply promoting social interaction and watching out for each other to active patrols by groups of citizens...

Comments  (0)

314f19f082e69886c20e31c70fe6dceb

What To Do With Old Hard Disks

July 26, 2010 Added by:Rod MacPherson

If you keep your old hard disk you will always have access to it as a point in time backup of what your old system had installed and what files you had at the time of your upgrade...

Comments  (3)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (004)

July 25, 2010 Added by:Christophe Veltsos

Who said: "Anyone who visits a social networking site should know that it's a business model. The service is not free. We users pay for it with our private data..."?

Comments  (1)

Af2769c2480db78c589b811b428782b0

Washington Post Launches Top Secret America

July 23, 2010 Added by:Lee Mangold

So let me ask the Islanders some questions: Do you think this is responsible reporting? Is it right to publish the locations of the Nations secrets to the world? If you're outside of the US, how would you feel about this in your country?

Comments  (4)

37d5f81e2277051bc17116221040d51c

What is “Swatting” And How Do I Protect My Family

July 16, 2010 Added by:Robert Siciliano

SWAT is Special Weapons and Tactics. Those are the guys and gals in all black with the headgear and big guns. Caller ID spoofing technologies are used as a tool to disguise the caller and send law enforcement officers on bogus calls...

Comments  (0)

1789975b05c7c71e14278df690cabf26

Getting Physical: Hot Summer Security

July 16, 2010 Added by:Pete Herzog

OSSTMM 3 requires that you don't look to the threat to prepare your security plan because it's too easy to only make changes which affect a small portion of the threats. That's especially true when you consider how unpredictable human behavior can be...

Comments  (10)

37d5f81e2277051bc17116221040d51c

Security Cameras Can Speak Volumes

July 15, 2010 Added by:Robert Siciliano

Cameras are everywhere. We are on camera at most retails stores, banks, ATMs, busy intersections, highways, downtown areas and in neighborhoods. It keeps the honest people honest and the bad guys in-check or in jail...

Comments  (0)

37d5f81e2277051bc17116221040d51c

My Laptop Security Travel Ordeal

July 11, 2010 Added by:Robert Siciliano

When we got to the resort we were swarmed with hotel help/bellmen pulling our bags out of the van. As I’m counting bags and kids on my way back to the van to get my two other bags, the van drove away. My laptop and backpack were still in the front seat...

Comments  (5)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (003)

July 11, 2010 Added by:Christophe Veltsos

Who said: "The biggest vulnerability we face today and the future is not the thing that the technical security person would think of, like a botnet or technical flaw, but the misperception of risk..."?

Comments  (0)

F520f65cba281c31e29c857faa651872

Securing Against the Malware Torrent

July 11, 2010 Added by:Rahul Neel Mani

As cloud computing makes inroads around the globe, new security issues keep emerging. In an exclusive conversation, Juan Santana, CEO of Spain-based Panda Security shares his thoughts with CTO Forum's Dominic K...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Organizational Security: Is Your Door Wide Open?

June 29, 2010 Added by:Katie Weaver-Johnson

Last Tuesday at about 2:00 AM, I woke up to the doorbell ringing and knocking on our front door. While I was initially a little startled, my next thought was, “Why isn’t our ferocious guard dog barking?”

Comments  (3)

49afa3a1bba5280af6c4bf2fb5ea7669

FaaS: Fraud as a Service

April 14, 2010 Added by:Mike Meikle

In working with various clients on the topic of security, a common theme has emerged. Management and employees still labor under the perception that fraud is still the purview of unorganized individuals with an axe to grind against a specific company. 

Comments  (0)

Page « < 12 - 13 - 14 - 15 - 16 > »
Most Liked