Running a small business is risky, but ignoring the cybersecurity of the business is even riskier. With so much at stake, it behooves a small business owner to guard the company's assets as much as possible.
Smaller businesses can do much to minimize their cyber threat risks. Learn the steps SMBs can take to lower their risks of being targeted by cybercriminals.
Guest blogger Katie Hurst discusses how National Cyber Security Awareness Month (NCSAM) Champion organization OpenSesame is celebrating NCSAM and staying safe online every day.
Through simple behavioral and technological changes, individuals can greatly reduce their exposure to cyber threats. This National Cyber Security Awareness Month, our guest blogger from RoboForm is celebrating by providing online safety tools and tips.
STOP. THINK. CONNECT., which urges us to stop and think before we go online, is the perfect theme for NCSA’s cybersecurity education and awareness program, and the good news is that a little thinking goes a long way in keeping you safe.
While Internet security is a pervasive issue for all industries, schools deserve some extra attention. Along with the increased need for bandwidth to access online courses and tools, students and teachers are all too quick to share personal information through the internet. Schools need to carefully plan their network security in much the same way they plan their physical security. There has to be a good balance between access and security.
The new school year is in full swing and National Cyber Security Awareness Month is around the corner. What better time to talk to the kids in your life about online safety. Many of our readers are doing just that — and using Net Cetera: Chatting with Kids About Being Online as the basis for the conversation.
The growth of the Internet has introduced us to a much easier and convenient way of life. The Web has become our source of information, facilitates easier shopping and media consumption and allows us to connect with people on social media sites. Although social media sites such as Facebook, Twitter and Instagram provide convenient, beneficial features, it is important to understand their security and privacy implications and be smart about what you post on social media.
In a phishing scam, a cybercriminal sends an email that attempts to fraudulently acquire the recipient’s personal information. Learn more about phishing and what you can do about email vulnerabilities.
When it comes to tightening your Internet and computer privacy security, one crucial step you can take is to learn more about how your online activities leave confidential traces behind on your hard drive.
Why are tablet owners the top target of identity thieves? One reason is the unique design features of tablets make them perfect for sharing.
Data privacy is something that can be built into systems, taught to users of systems and valued by good old fashioned entrepreneurial techniques. All it takes is a little know how, creativity and the desire to build respect for data about people into technical solutions and organizations.
Cloud computing is used by virtually every organization because it's a convenient way to use applications and share data in a web-based environment. But there are also risks to consider, says Private WiFi's Jared Howe.
Private WiFi's Jillian Ryan delves into the data from its latest study by Harris Poll identifying WiFi users, practices and risks, and shares it all in a new infographic. A version of this blog appeared on Private WiFi's blog on April 3.
By now, we hope you know that hackers can steal your sensitive information any time you connect to a public WiFi network. But what you may not know is how fast they can do it. That's what WAFB 9 demonstrated in a hacking experiment on a university hotspot in Baton Rouge, Louisiana. What happened should be a wakeup call for hotspot users everywhere.
Recent surveys have revealed how generations view and address online safety and security concerns differently, writes Private WiFi's Jared Howe. A version of this blog originally appeared on Private WiFi's blog on March 6, 2014.
"Smiling feels easy and natural. However, this action is quite elaborate from a structural point of view," writes Jetico CEO Michael Waksman. "So the key to making data privacy more accessible would be to use software that allows encryption to be performed easily and naturally without even thinking about it."
"To avoid accidentally selling your identity on eBay or providing access to your bank accounts in the form of a broken tablet in the trash, you need to take secure measures to wipe the data clean," writes Frank Milia of IT Asset Management Group (ITAMG). "The good news is that many of the drive manufacturers have provided secure erasure utilities built into the disks."
SpiderOak's Chip Black takes a look back at Ted Nelson's seminal 1974 works on computing and how they're relevant as ever in online privacy discussions 40 years later.
"It's the start of a new year -- a time to look at our habits with fresh eyes, make positive changes and tackle life with renewed energy and enthusiasm," writes Linnette Attai of iKeepSafe. "It's also a great time to take a look at your digital footprint, and those of your children, and see if there are changes to be made there as well."
Heather M. Federman, Policy & Outreach Director at the Online Trust Alliance, provides her New Year "data resolutions" for businesses to open 2014.
Reputation.com's Leslie Hobbs covers how to create a positive personal and professional presence online. "The potential to make the Internet work for you exists," she writes. "it just requires a bit of legwork and a lot of thought."
Frances Henderson, CIPP, and Emma Fletcher, CIPP, deliver the second installment in the Council of Better Business Bureaus' series, "Privacy Basics for the Savvy Small Business", by discussing how companies should approach reviewing and updating their privacy policies.
"In the Digital Age, one way a victim can start to feel empowered again is through controlling her privacy," writes Reputation.com's Leslie Hobbs, who offers some guidance that anyone can use to guard their personal information.
In her second entry in the Data Privacy Day guest blog series, iKeepSafe's Linnette Attai expands on the conversation around data security and schools with a new paper that outlines concerns and serves as a guide for dialogue on assessing and implementing systems and practices.
Privacy specialist Andrew McDevitt of AvePoint explains why the global privacy community should rally around Data Privacy Day this January 28: to heighten public awareness of privacy concerns and promote strong data stewardship practices among individuals and businesses.
Private Wifi and the Identity Theft Resource Center have released a new infographic, "The Ultimate Guide to Staying Safe on Public Wifi", which offers insight into about the overall consumer privacy beliefs in WiFi hotspots.
David Dahl, director of development for the Crypton.io project at data encryption and storage service provider SpiderOak, provides the strategies he follows at home to maintain greater control over his online privacy.
"Smart companies - the ones that are looking not just one quarter from now or one year from now - are anticipating the rise of the New Privacy," writes Reputation.com's Leslie Hobbs. "So what should companies do to start down that path?"
Linnette Attai from iKeepSafe delves into the issue of how schools protect the student data they collect, and a new iKeepsafe resource, "Data Privacy and Schools: Outlining the Conversation." The paper is a launching pad for dialogue about how schools collect and manage student data, with the ultimate aim of easing the development of successful and compliant partnerships with third-party technology partners.
"Sharing your personal data can very much color your reputation, especially online," says Leslie Hobbs of Reputation.com. "In fact, the two often go hand-in-hand so take a judicious approach to revealing your personal details. Here's how."
If you could ask a hacker how to protect yourself from his or her intrusions into your devices and data, what would you ask? McAfee's Taylor Tompkins details her first encounter with a white-hat hacker.
"Privacy advocates, regulators and others raise worthwhile concerns about the growing Internet of Things," writes guest blogger Jason Meyer. "What happens when the data these devices capture about us misrepresents us or include errors that skew our profiles?"
Tom Flynn, Vice President, Identity and Access Security, at Gemalto North America shares a new infographic naming the top five threats facing eBanking in the United States, but most importantly, the four tips the public should follow to thwart them.
Armor for Android security researcher James Green breaks down the mobile threat landscape to Android OS and importance of updates to protect your device from infection.
Karen Clark of SecurityChoice.com looks at how pop culture, and one summer movie in particular, opens the door to talking to pre-teens and teens about safe online behavior.
McAfee blogger Taylor Tompkins looks at how to adjust the settings for downloading apps on some of today's most popular smartphones.
Tech consultant Geoff Kenyon offers five ways to protect your personal information when connecting to public Wi-Fi networks, including a digital security quiz to evaluate how well you safeguard your identity.
Philip Alexander, founder of Data Privacy Network, offers advice on how you can protect your identity and personal information while on summer vacation.
John Skorick, Founder and CEO of personal privacy company MyAKA.com, LLC, discusses how your mobile phone number can be an access point to invading your privacy, and methods to securing both.
Tuesday, May 7 was Password Day, as Intel, McAfee, the Department of Homeland Security and others provided tips and advice regarding strong password creation and memorization. The following is a partial transcript edited for brevity and clarity.
Jeff Bermant, Founder and CEO of Virtual World Computing, offers a number of tools and tips to provide for safe web browsing and to protect children from victmization, online and off.
Amy Hebert, Consumer Education Specialist at the U.S. Federal Trade Commission, offers the infographic on children and mobile safety, "Keeping Up with Kids' Apps." It includes four things your kid's apps might do -- but might not tell you.
Michael Waksman, CEO of Jetico, a company that provides military-standard data protection software to the U.S. Department of Defense, offers his tips on how exactly to make your passwords 'long and strong'.
As a user, if you have never taken Facebook's impact on your privacy, reputation and security seriously, it's now time to do so.
When you work with personal data on a Windows computer, your privacy and identity are at risk. We will show you a few basic things you should keep in mind, to make sure your privacy and identity are always protected.
As businesses and organizations upgrade to the newest wireless devices, every day thousands of used mobile devices are being replaced and companies run the risk of inadvertently compromising confidential internal information contained on these devices.
Consumers today cannot avoid all risks, but there are a number of practical steps they can take to minimize the threats of viruses, credit card fraud and identity theft.
Every day, kids face a myriad of online decisions- which friend requests to accept, whether to forward time-limited and self-destructing images (have you heard of Snapchat?), whether to talk to someone online they don't know, even whether to join classmates in bullying someone.
With the rise of big data come big challenges, including how to deal with increasingly challenging privacy issues. To help protect information, which has become the currency of the 21st century, here are 10 resolutions for your enterprise to adopt in 2013.
Data Privacy Day is approaching, and as part of our awareness campaign, we wanted to review some of the best practices for safe password selection and management. It is surprising but true that even in today’s security-conscious environment, the word “password” and the sequence “123456” remain some of the most common passwords!
Getting a backup can be a hard thing to do because you don't know where to start. But don't give up just yet!
As increasing amounts of personal data are held on small, mobile devices, the risk of having that data stolen is also increasing.
Protection and separation of personal and public data in transit, in storage and at rest should not require extensive education and behavioral modification.
Symantec's mission to inspire confidence in a connected world requires that we ensure both our own operations and those of our customers are safe and secure. As the leading global information security company, this is not an easy task.
Teachers and parents need to commit to protecting their kids’ smartphones and teaching them how to use them safely. These 5 tips will help parents, teachers and kids work together to use the classroom as a place to learn how to take advantage of mobile opportunities while preventing the risks.
While the primary concern is always being able to provide shelter and food for you and your loved ones during severe weather, it is also important to have a plan in place for when your technology devices stop working.
In addition to supporting this National Cyber Security Alliance campaign and showing our commitment to cybersecurity through our involvement with the Champions program, miiCard is using this month to remind our members how to keep safe in their different online activities from shopping, social and dating to banking.
Looking past how cell-phone crazy this generation of kids has become, one question still remains – when can your child handle a mobile phone and the responsibilities that come with owning a phone?
We store our email and social accounts, access to mobile banking, photos, contacts and more, on our smartphones – so protecting it is more important than ever!
Airports, restaurants, coffee shops, businesses, dentists, libraries and even public parks offer public access to Wi-Fi for free. But surfing unsecured hotspots can open your data pipeline to some very unsavory characters.
Cyber Tours engage all segments of the community – from individuals and non-profit organizations to government entities and businesses- in cybersecurity events and activities.
A typical child in the 21st century is practically raised on technology.
In today's hyper-connected society, it seems that everyone knows just about everything about everyone. The amount of personal information we share online is staggering.
When you work with sensitive data, no matter what field you're in, regular cyber security checks are a must. Practicing routine 'cyber hygiene' will help protect against spillage or loss of your sensitive data.
We recently featured a blog post about the importance of setting bank alerts to prevent identity theft. Often times, the most convenient option for consumers is mobile alerts, which sends a text message to the account holder when their account is charged.
The Multi-State Information Sharing and Analysis Center (MS-ISAC) has launched a national Cyber Security Pledge campaign to encourage citizens to declare their commitment to using good practices for staying safe on the Internet.
Millions of dollars are spent each year trying to protect business and government assets and networks from cyber attacks.
Now that this unusually hot summer is coming to a close, you may be going back to school with a new computer, or you may be the parent of such a student. No doubt you know that you should install a good antivirus program. What more do you need to know? Ever heard of rogue antivirus? If you use a PC, you are particularly vulnerable to this pernicious attack.
Over the last year, a trend has emerged in these complaints: consumers are being increasingly victimized by online businesses that aggressively market their services as one thing but bury in the fine print their actual services, which are far less desirable.
Reputable software publishers want you to use their software and recommend it to other people. This is why they spend money creating a quality product with good technical support.
Whether you are traveling for work or pleasure, the last thing you want to think about is having your identity stolen.
There are steps that we can take to help prevent things like cyberbullying on social networking sites.
While finding a job today is hard, job-related scams and schemes seem to be all around us. To prevent job seekers from going through the pain of dealing with some of the more common online job scams, the SiteJabber community has flagged some common types of sites that are best avoided.
Being a victim of fraud can be an overwhelming experience for anyone. Not only do you have to worry about the financial implications of the fraud, many people feel embarrassed for having fallen victim.