Items Tagged with "Security Awareness"


D13f77e036666dbd8f93bf5895f47703

Savvy and Secure Shopping for the Holiday Season

November 19, 2010 Added by:Theresa Payton

Before you start your online shopping, make sure you have the latest web browser and update your virus protection. Avoid making purchases if you are using free wireless and you cannot validate the security and privacy of your transaction. Never give payment or personal information via email...

Comments  (1)

1f2f664e68a603b3c54890fbbcd37857

Security Awareness in a Connected World

November 16, 2010 Added by:Mark Gardner

In a new more open internet age, where privacy is somewhat discarded, the threat to the enterprise is increased, because of the blurring between home and work. It is only by shouting above the noise to get the security message across, can the enterprise be protected...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Is Your Incident Reporting System Putting Your Organization At Risk?

November 11, 2010 Added by:Katie Weaver-Johnson

Is your incident reporting system working against you? Lessons learned continue to show that organizations find themselves in reaction mode more than they are in prevention mode. How can this be when most every organization claims to have an incident reporting system in place?

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Five Things: Protect Your Webmail Account

November 10, 2010 Added by:Robb Reck

Take a moment and ensure that all your internet email accounts are secure. Go through these steps and maybe you can avoid being awakened in the morning, like my wife did, to find that your mother is seriously concerned that you got involved in some shady dealings in Cyprus...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Five Sneaky Credit Card Scams

November 04, 2010 Added by:Robert Siciliano

You hand your card to a clerk, and they have a card reading wedge device that looks like this. The device may be wrapped around a band on their ankle. They bend over and make it look like they are fixing a sock, once they swipe the card through, they can make charges on your card...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (012)

October 31, 2010 Added by:Christophe Veltsos

Who said: "In short, like every other major new weapons system introduced since the slingshot, Stuxnet creates new strengths as well as new vulnerabilities for the states that may wield it..."?

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Security Awareness Training - At Age 5?

October 23, 2010 Added by:Katie Weaver-Johnson

Before you hand over that phone to provide some extra entertainment when you get stuck in line at a restaurant, you may want to make sure all other applications are locked down, you have signed out of your email and other social networking sites...

Comments  (1)

C787d4daae33f0e155e00c614f07b0ee

Information Security as the Status Quo

October 21, 2010 Added by:Robb Reck

Effective security is created, implemented and maintained by the technical folks who create and manage the systems and applications themselves. In order to achieve a secure environment we need to move beyond the outdated model that goes something like this...

Comments  (2)

37d5f81e2277051bc17116221040d51c

On the Internet, FREE is a Dangerous Four Letter Word

October 16, 2010 Added by:Robert Siciliano

The risk of fraud increases significantly when including the words free and MP3 in the same search query. When you add the word free to a search for ringtones, your risk increases by 300%. Cybercriminals lure users with words like free in order to infect their PCs with malicious software...

Comments  (2)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (011)

October 15, 2010 Added by:Christophe Veltsos

Who said: "Information security is perhaps the hardest technical field on the planet. Nothing is stable, surprise is constant, and all defenders work at a permanent, structural disadvantage compared to the attackers..."?

Comments  (0)

11146d62a6c31fb9fac8ac8ac991e08d

There is No Incentive to End Security Apathy

October 11, 2010 Added by:Andy Willingham

I’m all for protecting peoples accounts no matter what type they are. After all I am in Information Security for a reason. The problem is that protecting accounts requires the user to want to protect it. We can’t continue to hold their hands and fix all of their problems for them...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Log Out, Log Out - I repeat, LOG OUT!

October 08, 2010 Added by:Robert Siciliano

One of the most common causes of data breaches is failure to properly log out of public PCs. Some PC admins install password managers that prompt the user to save login credentials. If you are on someone else’s PC and get this kind of pop-up, read it carefully before just clicking buttons...

Comments  (7)

Dd9902bc56a9d85cdc62c00083ea4871

Is Your Janitor Cleaning Out Your Sensitive Information?

September 30, 2010 Added by:Katie Weaver-Johnson

A janitor was recently arrested for removing boxes of records from a health care clinic. Interested only in getting money for the paper, the janitor sold 14 boxes of patient records to a recycling center for $40. This janitor was not interested for identity theft, but the next one might be…

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Tales From a Non-Security Professional End User

September 28, 2010 Added by:Brent Huston

I remember when I thought: Information security? Sure. A bunch of geeks patrolling their networks. I had seen the movie Hackers, after all. I had no idea of the breadth and depth of information security. Any piece of technology that you use that has sensitive data stored can be stolen...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Are You Your Own Chief Security Officer?

September 25, 2010 Added by:Robert Siciliano

In my home environment, I’m the CSO. My belief is everyone has a job to do in personal safety. No matter what, you must protect yourself and family from the bad-guy. The hard part about this part time job is it requires a bit of thought...

Comments  (2)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (010)

September 24, 2010 Added by:Christophe Veltsos

Who said: "Considering the anonymity of cyberspace, cybercrime may in fact be one of the most dangerous criminal threats ever. A vital component in fighting transnational crime must therefore include the policing of information security.."?

Comments  (0)

Page « < 11 - 12 - 13 - 14 - 15 > »