Items Tagged with "Security Awareness"


1789975b05c7c71e14278df690cabf26

Getting Physical: Hot Summer Security

July 16, 2010 Added by:Pete Herzog

OSSTMM 3 requires that you don't look to the threat to prepare your security plan because it's too easy to only make changes which affect a small portion of the threats. That's especially true when you consider how unpredictable human behavior can be...

Comments  (10)

37d5f81e2277051bc17116221040d51c

Security Cameras Can Speak Volumes

July 15, 2010 Added by:Robert Siciliano

Cameras are everywhere. We are on camera at most retails stores, banks, ATMs, busy intersections, highways, downtown areas and in neighborhoods. It keeps the honest people honest and the bad guys in-check or in jail...

Comments  (0)

37d5f81e2277051bc17116221040d51c

My Laptop Security Travel Ordeal

July 11, 2010 Added by:Robert Siciliano

When we got to the resort we were swarmed with hotel help/bellmen pulling our bags out of the van. As I’m counting bags and kids on my way back to the van to get my two other bags, the van drove away. My laptop and backpack were still in the front seat...

Comments  (5)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (003)

July 11, 2010 Added by:Christophe Veltsos

Who said: "The biggest vulnerability we face today and the future is not the thing that the technical security person would think of, like a botnet or technical flaw, but the misperception of risk..."?

Comments  (0)

F520f65cba281c31e29c857faa651872

Securing Against the Malware Torrent

July 11, 2010 Added by:Rahul Neel Mani

As cloud computing makes inroads around the globe, new security issues keep emerging. In an exclusive conversation, Juan Santana, CEO of Spain-based Panda Security shares his thoughts with CTO Forum's Dominic K...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Organizational Security: Is Your Door Wide Open?

June 29, 2010 Added by:Katie Weaver-Johnson

Last Tuesday at about 2:00 AM, I woke up to the doorbell ringing and knocking on our front door. While I was initially a little startled, my next thought was, “Why isn’t our ferocious guard dog barking?”

Comments  (3)

49afa3a1bba5280af6c4bf2fb5ea7669

FaaS: Fraud as a Service

April 14, 2010 Added by:Mike Meikle

In working with various clients on the topic of security, a common theme has emerged. Management and employees still labor under the perception that fraud is still the purview of unorganized individuals with an axe to grind against a specific company. 

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

AntiMistake Software – Preventing Human Error and Lack of Awareness

April 07, 2010 Added by:Katie Weaver-Johnson

Successful organizations realize antivirus software must be installed on all PCs.  Antivirus software works well if updates are automatic and ongoing (as new risks and threats are identified) to prevent expensive damages to PCs, information and reputations. 

Comments  (1)

7ac151cecb6d5053d7cf4c7fa1ac596e

Data Security - It's a responsibility, not an option...

April 07, 2010 Added by:Ian Barrs

"We need to talk about security, it's becoming an issue." This is a line that would draw a blank on many a CEOs face, even today. "We've got strong password policies, and no-one's allowed to use USBs", the CEO may burble. If that's your last line of defence, and you merely trust people to follow the rules, you're heading for trouble.

Comments  (0)

0f48ebb4a6ca02dbf5141affdbfa6898

Security Consciousness Raising

February 06, 2010 Added by:Bill Wildprett, CISSP, CISA

I’ve been thinking about Security Awareness and different ways of teaching it as a mindset.  We infosec folks think about it all the time, cultivating it as part of our general focus on situational awareness; the general public, corporate and government leaders, SMBs – not as much, perhaps.

Comments  (1)


From the Web

The Year Of The Mega Data Breach

November 24, 2009 from: Office of Inadequate Security

According to the Identity Theft Resource Center, government agencies and businesses reported 435 breaches as of Nov. 17, on track to show a 50% drop from the number of breaches reported in 2008. That would make 2009 the first year that the number of reported data breaches has dropped since 2005, when the ITRC started counting.

Comments  (2)


From the Web

Report: Data Breaches Hike Fraud Risk 400%

November 02, 2009 from: Office of Inadequate Security

Because data breaches have become such commonplace incidents, there is concern that people have become desensitized to the potential harm they face upon receiving a notification letter from an organization informing them that sensitive information has been lost or misappropriated.

Comments  (0)


From the Web

Call Spoofing: So easy, even famous people do it!

October 26, 2009 from: hackyourself.net

A simple but effective call spoofing technique has hit the main stream. Former high profile Dolce & Gabbana publicist Ali Wise used a phone call spoofing service called SpoofCard to listen to her ex-boyfriend's voicemails. The service hides the phone number you're calling fro...

Comments  (0)

Page « < 12 - 13 - 14 - 15 - 16 > »