The Stay Safe Online Blog
Recent surveys have revealed how generations view and address online safety and security concerns differently, writes Private WiFi's Jared Howe. A version of this blog originally appeared on Private WiFi's blog on March 6, 2014.
One dilemma may be in the way "cyber" is used as an umbrella term for a vast set of threats. Originally posted January 23, 2014.
The National Cyber Security Alliance, RSA Conference, U.S. Dept. of Homeland Security, Microsoft, McAfee, Juniper Security and others discussed public-private efforts to promote online safety education and resources, live from the RSA Conference 2014 in San Francisco.
To help understand how shoppers are behaving in their stores, retailers are contracting statistical modeling firms that collect and analyze data many shoppers may not even realize they're providing through their smartphones. The growth of the Mobile Location Analytics (MLA) industry has raised questions about the specific information being collected, how it’s being used, and to what extent, if at all, consumers are aware this is happening.
Regular investments in cybersecurity are as essential today as stone walls were to a medieval city.
"Smiling feels easy and natural. However, this action is quite elaborate from a structural point of view," writes Jetico CEO Michael Waksman. "So the key to making data privacy more accessible would be to use software that allows encryption to be performed easily and naturally without even thinking about it."
David Hoffman was one of the driving forces behind the observation of Data Privacy Day in the United States and Canada in 2008, so it should come as no surprise Intel's global privacy officer delivered one of the most memorable comments of the 2014 Data Privacy Day Kickoff Event Jan. 28 at The Pew Charitable Trusts in Washington, D.C.
This Tuesday, February 11th, is Safer Internet Day, a worldwide awareness effort to make the Internet a safer place and to harness the power of the Internet for good.
"For those who would frame data privacy as the individual-versus-corporations or individual-versus-government, there are more constructive approaches to protecting privacy than adversarial ones," writes NCSA executive director Michael Kaiser on the annual observation of Data Privacy Day. "And that's why the theme of Data Privacy Day is Respecting Privacy, Safeguarding Data and Enabling Trust."
"To avoid accidentally selling your identity on eBay or providing access to your bank accounts in the form of a broken tablet in the trash, you need to take secure measures to wipe the data clean," writes Frank Milia of IT Asset Management Group (ITAMG). "The good news is that many of the drive manufacturers have provided secure erasure utilities built into the disks."
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24