The Stay Safe Online Blog
"As any business executive whose organization has been victimized by cyber wrongdoers knows, suffering from a cyber-attack of any significance can be frustrating at best, and devastating at worst," write Joseph V. DeMarco and Alexis Tandeau, partner and foreign legal intern, respectively, at DeVore & DeMarco LLP. "Tempting as it may be, however, under current law, 'hacking back' can cause substantial legal harm as well as reputational backlash when done without carrying out an extremely careful factual and legal analysis of the proposed activity."
"Privacy advocates, regulators and others raise worthwhile concerns about the growing Internet of Things," writes guest blogger Jason Meyer. "What happens when the data these devices capture about us misrepresents us or include errors that skew our profiles?"
There is probably no technology that has changed the way we stay connected more profoundly and completely than the rise of the mobile Internet. As we move forward with our education and awareness efforts to make Internet users – and by extension, the Internet as a whole – safer and more secure, we’re paying particular attention to the powerful computing devices that so many of us carry in our pockets.
Every year on or around January 28, companies, nonprofits, schools and government agencies celebrate Data Privacy Day (DPD) by educating employees, customers and constituents about privacy. I hope you'll join us in recognizing Data Privacy Day in 2014. Now is the time to start planning how to make the most of DPD and show your commitment to respecting privacy, safeguarding data and enabling trust.
Regardless of industry or sector, corporations and other organizations of all sizes must assess and mitigate risks associated with network vulnerabilities arising from cybercrime, cyber espionage or the inadvertent loss of data, says Joseph V. DeMarco, partner at DeVore & DeMarco LLP.
For the fifth and final #ChatSTC of National Cyber Security Awareness Month, STOP. THINK. CONNECT. convened public and private sector partners in securing our critical infrastructure to discuss these essential networks and how to protect them.
Tom Flynn, Vice President, Identity and Access Security, at Gemalto North America shares a new infographic naming the top five threats facing eBanking in the United States, but most importantly, the four tips the public should follow to thwart them.
In his opening keynote presentation at the Michigan Cyber Summit on Oct. 25, Michigan Governor Rick Snyder addressed one of the most pressing cybersecurity issues facing government and industry officials - how to enhance the coordinated sharing of information about known cyber threats, especially attacks that have resulted in actual disruption or data loss.
In recognition of the fourth week of National Cyber Security Awareness Month's focus on cybercrime, STOP. THINK. CONNECT. hosted a Twitter Chat discussing ways to foil cybercriminals' attempts and what to do if you become a victim. This is an edited transcript for brevity and clarity.
You should not hire "generic good workers" for your security defense, argue Eric Brown and William Yarberry. Instead, ask yourself the following questions when looking for security leadership.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31