The Stay Safe Online Blog
David Dahl, director of development for the Crypton.io project at data encryption and storage service provider SpiderOak, provides the strategies he follows at home to maintain greater control over his online privacy.
This may be the most wonderful time of the year, but it's also a time of increased opportunity for cybercrime. Intel, McAfee and others joined STOP. THINK. CONNECT. to discuss how to protect our digital lives during holiday season, as we travel, shop online, and unwrap newly gifted devices.
"Smart companies - the ones that are looking not just one quarter from now or one year from now - are anticipating the rise of the New Privacy," writes Reputation.com's Leslie Hobbs. "So what should companies do to start down that path?"
One of my favorite NCSAM events was our STOP. THINK. CONNECT. Online Safety School Assembly, which took place at the Gertz-Ressler High School in Los Angeles during our Cyber Education and the Next Generation of Cyber Leaders-themed week.
Linnette Attai from iKeepSafe delves into the issue of how schools protect the student data they collect, and a new iKeepsafe resource, "Data Privacy and Schools: Outlining the Conversation." The paper is a launching pad for dialogue about how schools collect and manage student data, with the ultimate aim of easing the development of successful and compliant partnerships with third-party technology partners.
The open and increasingly social nature of the Internet offers big benefits, and big risks. Data Privacy Day hosted a Twitter chat Nov. 13 to talk about how you can share responsibly while protecting your personal information online. Guests included @STOPTHNKCONNECT, @iKeepSafe, and @Reputation_com.
"Sharing your personal data can very much color your reputation, especially online," says Leslie Hobbs of Reputation.com. "In fact, the two often go hand-in-hand so take a judicious approach to revealing your personal details. Here's how."
If you could ask a hacker how to protect yourself from his or her intrusions into your devices and data, what would you ask? McAfee's Taylor Tompkins details her first encounter with a white-hat hacker.
"As any business executive whose organization has been victimized by cyber wrongdoers knows, suffering from a cyber-attack of any significance can be frustrating at best, and devastating at worst," write Joseph V. DeMarco and Alexis Tandeau, partner and foreign legal intern, respectively, at DeVore & DeMarco LLP. "Tempting as it may be, however, under current law, 'hacking back' can cause substantial legal harm as well as reputational backlash when done without carrying out an extremely careful factual and legal analysis of the proposed activity."
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26