The Stay Safe Online Blog
Cloud computing is used by virtually every organization because it's a convenient way to use applications and share data in a web-based environment. But there are also risks to consider, says Private WiFi's Jared Howe.
Consumers are becoming less naive regarding data about them being collected and shared, but they should become more knowledgeable about how those processes work and the risks involved, NCSA executive director Michael Kaiser told the Privacy Piracy Radio Show on 88.9 FM KUCI in Irvine, CA.
The RE: View is a bimonthly look back at the headlines that caught the attention of our RE: Cyber contributors that senior executives and Board members should consider when assessing and managing cyber risk.
William J. Brunkhardt, chief technology strategist at Cyber Sciences Corporation, reviews what we know and what companies should be aware of regarding the Heartbleed bug.
Leading identity theft experts from The Identity Theft Council, National Consumers League, ID Theft Resource Center, PRIVATE WIFI and NCSA discussed the steps you can take to protect your personal information and how to respond if you become a victim of identity theft.
Private WiFi's Jillian Ryan delves into the data from its latest study by Harris Poll identifying WiFi users, practices and risks, and shares it all in a new infographic. A version of this blog appeared on Private WiFi's blog on April 3.
By now, we hope you know that hackers can steal your sensitive information any time you connect to a public WiFi network. But what you may not know is how fast they can do it. That's what WAFB 9 demonstrated in a hacking experiment on a university hotspot in Baton Rouge, Louisiana. What happened should be a wakeup call for hotspot users everywhere.
The ever-changing ways kids interact online has made it difficult for parents to keep pace with the latest safety and security advice. PRIVO, Savvy Cyber Kids, iKeepSafe, the FTC and the Center on Media and Child Health joined NCSA to discuss tips for parents and share resources.
Recent surveys have revealed how generations view and address online safety and security concerns differently, writes Private WiFi's Jared Howe. A version of this blog originally appeared on Private WiFi's blog on March 6, 2014.
One dilemma for companies may be the way "cyber" is used as an umbrella term for a vast set of threats, says John Glowacki, chief strategy and information officer at Protexit. Originally posted January 23, 2014.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35