Items Tagged with "Security Awareness"


1b061b1cec6b5898e5326992d9461610

Infosec Subjectivity: No Black and White

June 04, 2012 Added by:Dave Shackleford

Overall, here’s the rub: There are almost no security absolutes. Aside from some obvious things like bad coding techniques, the use of WEP, hiring Ligatt Security to protect you, etc... Everything else is in information security the gray area...

Comments  (1)

C64d6029dda7a794e966cb3f6f6b5534

Cookies: Should We Really Like Them?

June 01, 2012 Added by:Ahmed Saleh

You should acknowledge that Cookies are widely used and can't really be avoided. If you wish to enjoy your internet surfing experience by navigating to “cookie creating websites” you should have a clear understanding of how cookies operate, and how to protect them from being abused...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Five Things a Healthcare CIO Can Do to Improve Security

May 31, 2012 Added by:Danny Lieberman

In a complex healthcare organization, large scale security awareness training is a hopeless waste of resources considering the increasing number of options that people have (Facebook, smartphones..) to cause damage to the business. Security awareness will lose every time it comes up against an iPad or Facebook...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Segmenting Safe Zones in IPv6

May 24, 2012 Added by:Jayson Wylie

IPv6 has created a vast address space and only portions are taken up by the typical allocations. A paid for, theme based, segmented and constrained IPv6 sub-network would provide users with some feeling of safety in an environment where that is not offered today...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

FBI Guidance on Avoiding Internet-Based Fraud

May 21, 2012 Added by:Infosec Island Admin

Listed below are tips to protect your business, yourself and your family from various forms of Internet fraud. For information on the most common complaints and scams, see the annual reports of the Internet Crime Complaint Center a partnership of the FBI and the NWCCC...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Logging: Opening Pandora's Box - Part 4 - Awareness

May 20, 2012 Added by:Rafal Los

Awareness is the ability to know, understand and react to various types of events in near-real-time in order to defend your enterprise. Whether you're defending it from performance failures, functionality failures, or security failures is dependent on the group you work in...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Spring Cleaning Your PC

May 18, 2012 Added by:Robert Siciliano

If your PC is bogged down with software and your desktop is jammed with icons and documents, then your PC is next to useless as a productivity tool. Even scarier is you have lost track of your files have sensitive information exposed. Follow these tips for a cleaner, faster machine...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

On Proper System Hardening

May 16, 2012

When a system or device has been properly hardened, all unnecessary bells and whistles are turned off, disabled, or simply ripped out, leaving only the bare minimum needed to run the service. This creates a much smaller surface area to attack...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

Who Are You Preaching to Anyway?

May 15, 2012 Added by:Neira Jones

Hard core security conferences continue to happen and continue to be successful, and long may it continue. We still need the techies to make sure we have the right tech to support the people and processes in our businesses. We also need the techies to try and keep ahead of the bad guys...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

IC3: 2011 Internet Crime Report

May 15, 2012 Added by:Pierluigi Paganini

IC3 represents a perfect example of how technological services could help in the prevention and analysis of criminal activities, and highlights that the real weapon against Internet crime is awareness and information sharing...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

FBI Guidance of Combating the Insider Threat

May 15, 2012 Added by:Infosec Island Admin

The thief who is harder to detect and who could cause the most damage is the insider — the employee with legitimate access. They may steal solely for personal gain or be a “spy”—someone who is stealing company information or products in order to benefit another organization or country...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Treat Passwords Like Cash

May 14, 2012 Added by:Danny Lieberman

Every Web site and business application has a different algorithm and password policy. For users, who need to maintain strong passwords using 25 different policies on 25 different systems sites, it’s impossible to maintain a strong password policy without making some compromises...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Twitter Hack! Five Ways to Avoid Being a Victim of Phishing

May 12, 2012 Added by:Brent Huston

Twitter is downplaying a security breach that exposed tens of thousands of user emails and passwords. The compromised Twitter accounts could have been the result of phishing attacks. Whenever you read about such breaches, it is always a good idea to change your password...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Five Concerns Surrounding Pinterest

May 10, 2012 Added by:Allan Pratt, MBA

At the current time, there are no privacy or security settings similar to Facebook or Google Plus, and boards cannot be made private, similar to customized Facebook lists or customized Google Plus circles. The bottom line is that anyone with Internet access can view your boards...

Comments  (5)

Ad5130e786d13531cc0f2cde32dacd0f

Aren’t all Security Professionals Evangelists?

May 08, 2012 Added by:Andrew Weidenhamer

I often wonder is Evangelist the right title for some individuals. Considering that the main audience for a “Security Evangelist” is the security community, I’m not entirely sure how much conversion is actually happening as we all understand the importance of security...

Comments  (2)

4ff49873e3fed9a24adf0d37ae00b780

It's Summer Blockbuster Season Again - Time to get Prepared

May 08, 2012 Added by:Lee Munson

One of the most used tricks that black hat hackers use during this time of year is to piggyback off of the advertising of big budget movies. There are a lot of ways that you can leverage attacks with this type of advertising and believe me they use all of them...

Comments  (0)

Page « < 5 - 6 - 7 - 8 - 9 > »