We're going to discuss some of the steps you can take to make your home network a little more secure. Nothing is 100% foolproof, but there are steps you can take - using a layered approach - that will improve your online security and reduce your chances of becoming a victim.
The best way to tackle the wave of digital lawbreakers is to master the basics yourself. This quick guide to online safety will help you avoid becoming another victim in a long line of cybercrime and inspire confidence for you and your family to surf the Web safely.
OnGuardOnline.gov has some tips to help you protect your laptop - and the valuable stuff on it.
Valentine's Day is around the corner, and yes, romance is in the air. But the month of love also celebrates Safer Internet Day on Feb. 10. Show how much you care by sharing this short online safety Q&A with your loved one.
This Safer Internet Day, learn how you can identify and avoid falling victim to phishing attacks.
Almost anything we do can now be done over the Internet: pay bills, shop for appliances, go banking, apply for jobs or make appointments. But these websites with your personal information in their databases can be potential threats as well. So how can you protect your identity?
Passwords have been used for thousands of years. They are still here today, though, and have proved their staying power.
It may sound ridiculous at first, but a strategic deployment of the most common and visible form of personally identifiable information - the humble email address - might be enough to send a would-be identity thief packing to an easier mark.
Here are 10 ways to safeguard your information from the most common threats and vulnerabilities that put you, your family and your office at risk.
An anonymous, unnamed CEO for a popular transparency company whose mascot is a ghost is fond of saying "running a business these days would be easy - if it weren't for all the people and computers." It's a joke meant to add perspective to everyday problems - but it can also apply to just trying to comfortably exist in the "Information Age."
We need to prioritize the importance of developing a comprehensive plan for data privacy and student learning - one that is thoughtful, balanced and comprehensive. We don't want to get this wrong. We can't. Too much is at stake for this and the next generation of students.
It's time for a reality check: complete anonymity online is not possible. The myth distracts people from what they should really be looking for in privacy programs and services: transparency, trust, ease of use, performance and reliability.
Data never dies. And data doesn't have a conscience - this immortal resource comes with significant risk. Time for a closer look.
While constant connectivity has its benefits, the rise of mobile devices and the proliferation of WiFi networks can be a dangerous coupling. In fact, many WiFi hotspot users are unaware of the inherent risks that the technology poses - such as an increased risk of identity theft, hacking and compromised bank accounts.
Yeah, you got a new computer. So what's next? Securely migrating to a new computer can be done in just 5 steps.
The term "Big Data" carries a lot of weight. So what should we think when we hear news reporters and insiders talk about "Big Data"? How can we manage what we contribute to its vast (and seemingly scary) collection of information?
In 2014 there seemed to be a new data breach every week. In these breaches of credit card data, student information, Social Security numbers and corporate intellectual property, the personal information of many businesses' clients and employees was exposed. Here are five priorities to consider for your business as we embark on 2015.
Privacy is a personal notion - we all have different ideas of what it means to properly manage information about who we are and how we behave. We've gathered a few interesting points about worldwide privacy legislation which show that how much others know about who you are can depend largely on where you are.
The movie Big HIPAA 6 is about a robot that can scan humans, discovering everything from small scratches and bumps to the amount of serotonin in your body at the moment. That got me thinking about the implications to the Health Insurance Portability and Accountability Act (HIPAA) or other privacy concerns that come with this technology.
It's important to educate yourself and practice the best habits to keep your data secure. Learn more about cookies and how you can protect your personal information.
The beginnings of Chris "Biggie Smalls" Wallace can be traced to the streets of Bed-Stuy, Brooklyn. The neighborhood is only 9 miles away from the new data-driven Madison Avenue as the crow flies - but they're worlds apart in terms of culture. Still, Big Poppa and Big Data have more in common than you might think.
The folks at Dictionary.com chose "privacy" as their word of the year in 2013. It was a long journey to that distinction, during which it inexorably became the engine driving more companies than not. Privacy is the consumer-consequence manifestation of big data, which increasingly shapes approaches to marketing, product development and a vast array of services. In short, privacy has become a price of consumption.
The Internet is a big place where it's possible to come in contact with all sorts of people, many of them only looking out for their own interests. Fortunately, there is a good deal of technology devoted to making it possible for kids to surf, play games and shop for toys when the proper controls are in place. Here are some easy ways to give your kids safe access to the Internet.
There is a golden rule of customer data: you are responsible for all customer data that you request. Using this as a guideline, check out these best practices for taking care of customer data.
Privacy as a relevant everyday concept has been pushing its way into the mainstream, and the events of the last couple of years have accelerated that trend. It's unfamiliar territory for us - is privacy trendy?
A debilitating cyber attack on the U.S. electrical grid has yet to make headlines, but utility companies, federal agencies and state and local governments are increasingly engaged in dialogue and training around that eventuality, according to panelists at a recent discussion hosted by the Intelligence and National Security Alliance.
As the holiday shopping bustle approaches, don't just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important!
At the Privacy Identity Innovation conference last week, Metanautix's Jim Adler proposed that, while transparency can be a good "disinfectant" for companies to adopt, "disinfectants sting." Adopting transparency is "meant to hurt a little." It’s a smart observation, and it’s worth exploring from both sides. Why does transparency sting, and is it worth the short-term pain?
When you visit a webpage, loads of information is traded back and forth between your browser and the web server. This transfer was designed to make sure that the server has all the information it needs to properly display the page you're looking at. But the architecture of the web means that all of this information is available on every single call. Learn more about what your browser communicates when you surf the web.
Finding the right balance when it comes to social media sharing isn't an easy feat, but there are several things you can do to protect your personal information on social media.
Step one for talking privacy is getting our vocabulary in order. So let's start with the basics and move on to several recent terms of endearment in the data management discussion.
It can't be ignored. Cybercrime is on the rise. Learn more about the layers of cybercrime and how you can help fight online threats.
Running a small business is risky, but ignoring the cybersecurity of the business is even riskier. With so much at stake, it behooves a small business owner to guard the company's assets as much as possible.
Smaller businesses can do much to minimize their cyber threat risks. Learn the steps SMBs can take to lower their risks of being targeted by cybercriminals.
Guest blogger Katie Hurst discusses how National Cyber Security Awareness Month (NCSAM) Champion organization OpenSesame is celebrating NCSAM and staying safe online every day.
Through simple behavioral and technological changes, individuals can greatly reduce their exposure to cyber threats. This National Cyber Security Awareness Month, our guest blogger from RoboForm is celebrating by providing online safety tools and tips.
STOP. THINK. CONNECT., which urges us to stop and think before we go online, is the perfect theme for NCSA’s cybersecurity education and awareness program, and the good news is that a little thinking goes a long way in keeping you safe.
While Internet security is a pervasive issue for all industries, schools deserve some extra attention. Along with the increased need for bandwidth to access online courses and tools, students and teachers are all too quick to share personal information through the internet. Schools need to carefully plan their network security in much the same way they plan their physical security. There has to be a good balance between access and security.
The new school year is in full swing and National Cyber Security Awareness Month is around the corner. What better time to talk to the kids in your life about online safety. Many of our readers are doing just that — and using Net Cetera: Chatting with Kids About Being Online as the basis for the conversation.
The growth of the Internet has introduced us to a much easier and convenient way of life. The Web has become our source of information, facilitates easier shopping and media consumption and allows us to connect with people on social media sites. Although social media sites such as Facebook, Twitter and Instagram provide convenient, beneficial features, it is important to understand their security and privacy implications and be smart about what you post on social media.
In a phishing scam, a cybercriminal sends an email that attempts to fraudulently acquire the recipient’s personal information. Learn more about phishing and what you can do about email vulnerabilities.
When it comes to tightening your Internet and computer privacy security, one crucial step you can take is to learn more about how your online activities leave confidential traces behind on your hard drive.
Why are tablet owners the top target of identity thieves? One reason is the unique design features of tablets make them perfect for sharing.
Data privacy is something that can be built into systems, taught to users of systems and valued by good old fashioned entrepreneurial techniques. All it takes is a little know how, creativity and the desire to build respect for data about people into technical solutions and organizations.
Cloud computing is used by virtually every organization because it's a convenient way to use applications and share data in a web-based environment. But there are also risks to consider, says Private WiFi's Jared Howe.
Private WiFi's Jillian Ryan delves into the data from its latest study by Harris Poll identifying WiFi users, practices and risks, and shares it all in a new infographic. A version of this blog appeared on Private WiFi's blog on April 3.
By now, we hope you know that hackers can steal your sensitive information any time you connect to a public WiFi network. But what you may not know is how fast they can do it. That's what WAFB 9 demonstrated in a hacking experiment on a university hotspot in Baton Rouge, Louisiana. What happened should be a wakeup call for hotspot users everywhere.
Recent surveys have revealed how generations view and address online safety and security concerns differently, writes Private WiFi's Jared Howe. A version of this blog originally appeared on Private WiFi's blog on March 6, 2014.
"Smiling feels easy and natural. However, this action is quite elaborate from a structural point of view," writes Jetico CEO Michael Waksman. "So the key to making data privacy more accessible would be to use software that allows encryption to be performed easily and naturally without even thinking about it."
"To avoid accidentally selling your identity on eBay or providing access to your bank accounts in the form of a broken tablet in the trash, you need to take secure measures to wipe the data clean," writes Frank Milia of IT Asset Management Group (ITAMG). "The good news is that many of the drive manufacturers have provided secure erasure utilities built into the disks."
SpiderOak's Chip Black takes a look back at Ted Nelson's seminal 1974 works on computing and how they're relevant as ever in online privacy discussions 40 years later.
"It's the start of a new year -- a time to look at our habits with fresh eyes, make positive changes and tackle life with renewed energy and enthusiasm," writes Linnette Attai of iKeepSafe. "It's also a great time to take a look at your digital footprint, and those of your children, and see if there are changes to be made there as well."
Heather M. Federman, Policy & Outreach Director at the Online Trust Alliance, provides her New Year "data resolutions" for businesses to open 2014.
Reputation.com's Leslie Hobbs covers how to create a positive personal and professional presence online. "The potential to make the Internet work for you exists," she writes. "it just requires a bit of legwork and a lot of thought."
Frances Henderson, CIPP, and Emma Fletcher, CIPP, deliver the second installment in the Council of Better Business Bureaus' series, "Privacy Basics for the Savvy Small Business", by discussing how companies should approach reviewing and updating their privacy policies.
"In the Digital Age, one way a victim can start to feel empowered again is through controlling her privacy," writes Reputation.com's Leslie Hobbs, who offers some guidance that anyone can use to guard their personal information.
In her second entry in the Data Privacy Day guest blog series, iKeepSafe's Linnette Attai expands on the conversation around data security and schools with a new paper that outlines concerns and serves as a guide for dialogue on assessing and implementing systems and practices.
Privacy specialist Andrew McDevitt of AvePoint explains why the global privacy community should rally around Data Privacy Day this January 28: to heighten public awareness of privacy concerns and promote strong data stewardship practices among individuals and businesses.
Private Wifi and the Identity Theft Resource Center have released a new infographic, "The Ultimate Guide to Staying Safe on Public Wifi", which offers insight into about the overall consumer privacy beliefs in WiFi hotspots.
David Dahl, director of development for the Crypton.io project at data encryption and storage service provider SpiderOak, provides the strategies he follows at home to maintain greater control over his online privacy.
"Smart companies - the ones that are looking not just one quarter from now or one year from now - are anticipating the rise of the New Privacy," writes Reputation.com's Leslie Hobbs. "So what should companies do to start down that path?"
Linnette Attai from iKeepSafe delves into the issue of how schools protect the student data they collect, and a new iKeepsafe resource, "Data Privacy and Schools: Outlining the Conversation." The paper is a launching pad for dialogue about how schools collect and manage student data, with the ultimate aim of easing the development of successful and compliant partnerships with third-party technology partners.
"Sharing your personal data can very much color your reputation, especially online," says Leslie Hobbs of Reputation.com. "In fact, the two often go hand-in-hand so take a judicious approach to revealing your personal details. Here's how."
If you could ask a hacker how to protect yourself from his or her intrusions into your devices and data, what would you ask? McAfee's Taylor Tompkins details her first encounter with a white-hat hacker.
"Privacy advocates, regulators and others raise worthwhile concerns about the growing Internet of Things," writes guest blogger Jason Meyer. "What happens when the data these devices capture about us misrepresents us or include errors that skew our profiles?"
Tom Flynn, Vice President, Identity and Access Security, at Gemalto North America shares a new infographic naming the top five threats facing eBanking in the United States, but most importantly, the four tips the public should follow to thwart them.
Armor for Android security researcher James Green breaks down the mobile threat landscape to Android OS and importance of updates to protect your device from infection.
Karen Clark of SecurityChoice.com looks at how pop culture, and one summer movie in particular, opens the door to talking to pre-teens and teens about safe online behavior.
McAfee blogger Taylor Tompkins looks at how to adjust the settings for downloading apps on some of today's most popular smartphones.
Tech consultant Geoff Kenyon offers five ways to protect your personal information when connecting to public Wi-Fi networks, including a digital security quiz to evaluate how well you safeguard your identity.
Philip Alexander, founder of Data Privacy Network, offers advice on how you can protect your identity and personal information while on summer vacation.
John Skorick, Founder and CEO of personal privacy company MyAKA.com, LLC, discusses how your mobile phone number can be an access point to invading your privacy, and methods to securing both.
Tuesday, May 7 was Password Day, as Intel, McAfee, the Department of Homeland Security and others provided tips and advice regarding strong password creation and memorization. The following is a partial transcript edited for brevity and clarity.
Jeff Bermant, Founder and CEO of Virtual World Computing, offers a number of tools and tips to provide for safe web browsing and to protect children from victmization, online and off.
Amy Hebert, Consumer Education Specialist at the U.S. Federal Trade Commission, offers the infographic on children and mobile safety, "Keeping Up with Kids' Apps." It includes four things your kid's apps might do -- but might not tell you.
Michael Waksman, CEO of Jetico, a company that provides military-standard data protection software to the U.S. Department of Defense, offers his tips on how exactly to make your passwords 'long and strong'.
As a user, if you have never taken Facebook's impact on your privacy, reputation and security seriously, it's now time to do so.
When you work with personal data on a Windows computer, your privacy and identity are at risk. We will show you a few basic things you should keep in mind, to make sure your privacy and identity are always protected.
As businesses and organizations upgrade to the newest wireless devices, every day thousands of used mobile devices are being replaced and companies run the risk of inadvertently compromising confidential internal information contained on these devices.
Consumers today cannot avoid all risks, but there are a number of practical steps they can take to minimize the threats of viruses, credit card fraud and identity theft.
Every day, kids face a myriad of online decisions- which friend requests to accept, whether to forward time-limited and self-destructing images (have you heard of Snapchat?), whether to talk to someone online they don't know, even whether to join classmates in bullying someone.
With the rise of big data come big challenges, including how to deal with increasingly challenging privacy issues. To help protect information, which has become the currency of the 21st century, here are 10 resolutions for your enterprise to adopt in 2013.
Data Privacy Day is approaching, and as part of our awareness campaign, we wanted to review some of the best practices for safe password selection and management. It is surprising but true that even in today’s security-conscious environment, the word “password” and the sequence “123456” remain some of the most common passwords!
Getting a backup can be a hard thing to do because you don't know where to start. But don't give up just yet!
As increasing amounts of personal data are held on small, mobile devices, the risk of having that data stolen is also increasing.
Protection and separation of personal and public data in transit, in storage and at rest should not require extensive education and behavioral modification.
Symantec's mission to inspire confidence in a connected world requires that we ensure both our own operations and those of our customers are safe and secure. As the leading global information security company, this is not an easy task.
Teachers and parents need to commit to protecting their kids’ smartphones and teaching them how to use them safely. These 5 tips will help parents, teachers and kids work together to use the classroom as a place to learn how to take advantage of mobile opportunities while preventing the risks.
While the primary concern is always being able to provide shelter and food for you and your loved ones during severe weather, it is also important to have a plan in place for when your technology devices stop working.
In addition to supporting this National Cyber Security Alliance campaign and showing our commitment to cybersecurity through our involvement with the Champions program, miiCard is using this month to remind our members how to keep safe in their different online activities from shopping, social and dating to banking.
Looking past how cell-phone crazy this generation of kids has become, one question still remains – when can your child handle a mobile phone and the responsibilities that come with owning a phone?
We store our email and social accounts, access to mobile banking, photos, contacts and more, on our smartphones – so protecting it is more important than ever!
Airports, restaurants, coffee shops, businesses, dentists, libraries and even public parks offer public access to Wi-Fi for free. But surfing unsecured hotspots can open your data pipeline to some very unsavory characters.
Cyber Tours engage all segments of the community – from individuals and non-profit organizations to government entities and businesses- in cybersecurity events and activities.
A typical child in the 21st century is practically raised on technology.
In today's hyper-connected society, it seems that everyone knows just about everything about everyone. The amount of personal information we share online is staggering.
When you work with sensitive data, no matter what field you're in, regular cyber security checks are a must. Practicing routine 'cyber hygiene' will help protect against spillage or loss of your sensitive data.
We recently featured a blog post about the importance of setting bank alerts to prevent identity theft. Often times, the most convenient option for consumers is mobile alerts, which sends a text message to the account holder when their account is charged.
The Multi-State Information Sharing and Analysis Center (MS-ISAC) has launched a national Cyber Security Pledge campaign to encourage citizens to declare their commitment to using good practices for staying safe on the Internet.
Millions of dollars are spent each year trying to protect business and government assets and networks from cyber attacks.
Now that this unusually hot summer is coming to a close, you may be going back to school with a new computer, or you may be the parent of such a student. No doubt you know that you should install a good antivirus program. What more do you need to know? Ever heard of rogue antivirus? If you use a PC, you are particularly vulnerable to this pernicious attack.
Over the last year, a trend has emerged in these complaints: consumers are being increasingly victimized by online businesses that aggressively market their services as one thing but bury in the fine print their actual services, which are far less desirable.
Reputable software publishers want you to use their software and recommend it to other people. This is why they spend money creating a quality product with good technical support.
Whether you are traveling for work or pleasure, the last thing you want to think about is having your identity stolen.
There are steps that we can take to help prevent things like cyberbullying on social networking sites.
While finding a job today is hard, job-related scams and schemes seem to be all around us. To prevent job seekers from going through the pain of dealing with some of the more common online job scams, the SiteJabber community has flagged some common types of sites that are best avoided.
Being a victim of fraud can be an overwhelming experience for anyone. Not only do you have to worry about the financial implications of the fraud, many people feel embarrassed for having fallen victim.