The Stay Safe Online Blog
HIMSS recently released the results of the 2015 HIMSS Cybersecurity Survey. This study, which surveyed 297 individuals with cybersecurity responsibilities at healthcare organizations, gauged healthcare organizations' awareness of and readiness for cybersecurity incidents in an "era where significant security incidents are a regular occurrence."
We held a #ChatSTC Twitter chat with some of the leaders in online authentication. We discussed what two-factor authentication (otherwise known as two-step verification or multi-factor authentication) is, its benefits and how to enable it and the future of online authentication.
Q&A with Mike Garcia, acting director of the National Strategy for Trusted Identities in Cyberspace (NSTIC) National Program Office (NPO) at the National Institute of Standards and Technology (NIST)
The National Cyber Security Alliance conducted an interview with Mike Garcia, who recently became acting director at the National Strategy for Trusted Identities in Cyberspace (NSTIC) National Program Office (NPO) to discuss the NSTIC NPO's work, his new role and the organization's plans moving forward.
Phishing scams are becoming more dangerous and effective than ever. The ZapFraud team discusses ways to protect yourself and others against these dangerous, targeted attacks.
In a world filled with cyber threats, how can we stay safe when sharing information online? Here are some steps you can take to keep your personal data safe.
A single click is all that's needed for an adversary to reel in your data by grasping ahold of your machine. Network defenders can overcome these adversaries and help protect their organizations, employees and consumers by keeping in mind four golden rules.
School is out, summer is in high gear and many of us are preparing for well-deserved vacations. We hosted a #ChatDPD Twitter chat to talk about things you should know about your online safety on the go. From free airport WiFi to paying for that extra suitcase, we explored what you can do to avoid making yourself vulnerable to cybercriminals while you travel so you can focus on having a little R&R.
The RE: View is a look back at recent headlines that caught our attention and that senior executives and board members should consider when assessing and managing cyber risk.
Our carbon footprint impacts greatly on the environment; only, we don't realize it until we actually see the rising sea levels, melting glaciers and animals dying out. The same goes for our digital footprint: until we can see the damage we're potentially placing on our own security, we won't know where we're going wrong. With greenhouse emissions expected to be cut by at least 29 percent between now and 2020, the question is, can we do the same for cybercrime? If we all follow these simple steps, it's possible.
Online payments can be made in a variety of ways, but majority of the online financial transactions are done through secured payment gateways. Secure payment gateways, as the name suggests, are application service providers for ecommerce websites that authorize various financial transactions taking place on online stores for ensuring safety for both the retailers and the online buyers. Learn more about what these gateways are and how they help protect your online transactions.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38