Blog Posts Tagged with "Security Awareness"

Bd07d58f0d31d48d3764821d109bf165

Clipboards, Confidence, and Information Security

September 17, 2012 Added by:Tripwire Inc

How do you teach paranoia and suspicion? We often hire people because of their willingness to help others, their good communication skills, their ability to be responsive, etc. As we work through securing our humans, we need to strike a balance – trust but verify, assist but not unquestioningly...

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

The Fine Print of Smartphone Privacy

September 14, 2012 Added by:Allan Pratt, MBA

How often do you think about your cell phone or smartphone privacy? Sure, you think about its physical security, but how often do you think about the security of your data? Your contacts, your email addresses, your location data, your apps, etc. You probably don’t think about this enough...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How to Handle a Credit Card Breach While Abroad

September 13, 2012 Added by:Robert Siciliano

A 60-day window covers two billing cycles, enough for most account-conscious consumers who keep an eye on their spending. Victims of fraudulent credit card charges only wind up paying the unauthorized charges if they fail to report the credit card fraud within 60 days...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Will the Rise of Tablets Affect Security Measures in the Workplace?

September 11, 2012 Added by:Robert Siciliano

While your company’s IT guy has a relative hold on the work laptops and desktops, and even some of the mobiles, he is quickly losing control when you bring your new Droid and connect it to the corporate network. Now he has to worry if that last app you downloaded will infect the network...

Comments  (0)

32137b352537f11c1efe063869f00e0e

Java, Flash, and the Choice of Usability Over Security

September 10, 2012 Added by:Le Grecs

Convenience vs. Security: My goal of not installing Flash and Java on a new system didn't last more than a few hours. Yet, as infosec professionals, following the disable unnecessary services philosophy, we advise not installing these types of applications for security reasons...

Comments  (0)

296634767383f056e82787fcb3b94864

Lockheed Martin's Rip-0ff of Your IP - By Contest Entry

September 08, 2012 Added by:Jeffrey Carr

Lockheed Martin has announced a contest which awards $50,000 to the winners of "Innovate The Future Challenge: How Might We Enable A More Secure Future For Our Planet?". They want you to share your ideas on how to solve that for free. Sound good? You'd better read the fine print...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

2012 Norton Cybercrime Report Presents a Worrisome Scenario

September 06, 2012 Added by:Pierluigi Paganini

With 556 million of victims per year, 2 of 3 adults have been victims of online crime in their lifetime, with a total economic loss of 110 Billion and an average cost per victim of $197. The trend demonstrates the need to put in place a massive awareness campaign...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security Metrics: Five Tips

September 03, 2012 Added by:Tripwire Inc

By Dwayne Melancon - I was in a session with someone who provides security consulting, picking his brain for what is working as he helps organizations translate security into something meaningful to the business. This is the paraphrased version

Comments  (0)

6462807771e81d9c33eb99307f5f3e77

Assessing Risk Management Culture to Better Understand the Characteristics of ERM Programs

August 27, 2012 Added by:Michele Westergaard

The past 24 months have seen a number of disasters bring risk management to the forefront of executives and board directors. Whether natural disasters such as the Japanese Tsunami or man-made such as the Gulf of Mexico oil spill, fat-tail disasters have created a renewed interest in enterprise risk management...

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks Increasingly Target Small Companies

August 26, 2012 Added by:Bill Gerneglia

Your company may not be the primary target, an attacker may use your organization as a stepping-stone to attack another. Don't be the weakest link in the supply chain. Information is power, the attackers know this, and successful attacks can result in significant financial loss...

Comments  (4)

B8db824b8b275afb1f4160f03cd3f733

Marketing to the Cynical, Skeptical, and Jaded

August 24, 2012 Added by:Jack Daniel

Words like engagement and community are overused by charlatans, marketing gurus, and social media experts- but if you cut the crap and actually engage the community, people will pay attention. Influencer is another abused term, but some people have more of a voice in the community than others. Ignoring people who aren’t ready to buy could be a very bad idea...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Misinformation and Manipulation in the Age of Social Media

August 21, 2012 Added by:Ben Rothke

Terms such as revolutionary, and groundbreaking are often used in reference to the web and social media. The web and social media have also been so for scammers, thieves, liars, manipulators, and the like who use social media in a big way. To avoid being caught in their lair, it is imperative to know the risks...

Comments  (1)

D13f77e036666dbd8f93bf5895f47703

The Day I Was Erased Digitally

August 17, 2012 Added by:Theresa Payton

It’s everyone’s worst night nightmare - everything digital in your life gets wiped out. Your phone, your computer, your tablet, every email address, social network profile. It really does happen, and most of you probably didn’t know that even techies and security experts worry about this happening to them...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Is a Password Enough? A Closer Look at Authentication

August 16, 2012 Added by:Robert Siciliano

Yahoo and LinkedIn were recently breached and usernames and passwords were stolen. These sites did something wrong that allowed those passwords to get hacked. However passwords themselves are too hackable. If multi-factor authentication was used, then the hacks may be a moot point and the data useless...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Relating Responsibility and Liability: At the Core of BYOD

August 15, 2012 Added by:Rafal Los

Does it make sense to repurpose "security awareness" to be inclusive of corporate and personal responsibility? Should we have users sign agreements that make them aware they are responsible, personally, when bad things happen as a result of their actions? Should there be HR actions against users who are reckless?

Comments  (0)

65be44ae7088566069cc3bef454174a7

Not Providing Education is the Dumbest Idea for Infosec

August 14, 2012 Added by:Rebecca Herold

Every year or so, an otherwise smart information security professional publishes some really bad information security advice about how awareness and training is a waste of time and money. Bottom line for all organizations: Humans have always been and will always be the weakest link in security...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »