The Stay Safe Online Blog

Dec 9, 2014 5:25am
There is a golden rule of customer data: you are responsible for all customer data that you request. Using this as a guideline, check out these best practices for taking care of customer data.
Dec 4, 2014 7:56am
The Microsoft Innovation and Policy Center and the New York University (NYU) Information Law Institute recently partnered to host a symposium on student privacy in higher education entitled "Building Privacy into Data-Driven Education." The event examined the new ethical concerns, legal questions and institutional challenges raised by the growth in use of data-driven platforms at higher education institutions.
Dec 2, 2014 8:47am
Privacy as a relevant everyday concept has been pushing its way into the mainstream, and the events of the last couple of years have accelerated that trend. It's unfamiliar territory for us - is privacy trendy?
Nov 24, 2014 7:00am
A debilitating cyber attack on the U.S. electrical grid has yet to make headlines, but utility companies, federal agencies and state and local governments are increasingly engaged in dialogue and training around that eventuality, according to panelists at a recent discussion hosted by the Intelligence and National Security Alliance.
Nov 20, 2014 1:07pm
With millions of people online and connected - from grandkids to grandparents - it's more important than ever to help one another identify the online threats that target each generation. Let's discuss what preventative steps we can take to ensure cyber safety for all.
Nov 20, 2014 6:35am
As the holiday shopping bustle approaches, don't just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important!
Nov 18, 2014 12:20pm
At the Privacy Identity Innovation conference last week, Metanautix's Jim Adler proposed that, while transparency can be a good "disinfectant" for companies to adopt, "disinfectants sting." Adopting transparency is "meant to hurt a little." It’s a smart observation, and it’s worth exploring from both sides. Why does transparency sting, and is it worth the short-term pain?
Nov 11, 2014 7:28am
When you visit a webpage, loads of information is traded back and forth between your browser and the web server. This transfer was designed to make sure that the server has all the information it needs to properly display the page you're looking at. But the architecture of the web means that all of this information is available on every single call. Learn more about what your browser communicates when you surf the web.
Nov 6, 2014 1:08pm
Data Privacy Day (DPD) is an international effort centered on "Respecting Privacy, Safeguarding Data and Enabling Trust," and your organization has a role to play. To get involved today, register your organization as a DPD Champion.
Nov 5, 2014 7:14am
Finding the right balance when it comes to social media sharing isn't an easy feat, but there are several things you can do to protect your personal information on social media.
Nov 4, 2014 10:13am
Step one for talking privacy is getting our vocabulary in order. So let's start with the basics and move on to several recent terms of endearment in the data management discussion.
Nov 3, 2014 11:14am
The Identity Theft Resource Center (ITRC) recently held an event at Google's Washington, DC, office to release the results of its study, Identity Theft: The Aftermath 2013. ITRC's study features a look into identity theft through the eyes of a victim, and its results provide a snapshot of the victim experience.
Oct 31, 2014 1:10pm
It can't be ignored. Cybercrime is on the rise. Learn more about the layers of cybercrime and how you can help fight online threats.
Oct 31, 2014 6:56am
Microsoft Safer Online's Internet's Most Wanted video series highlights five types of cyber threats, and we're blogging about a different threat each day this week. Learn more about today's threat, the Virus.
Oct 30, 2014 1:16pm
Learn ways to protect yourself from becoming a victim of identity theft, fraud, phishing and other crimes.
Oct 30, 2014 7:21am
Microsoft Safer Online's Internet's Most Wanted video series highlights five types of cybercriminals and threats, and we're blogging about a different threat each day this week. Learn more about today's threat, the Spambot.
Oct 29, 2014 6:54am
Safer Online by Microsoft''s Internet's Most Wanted video series highlights five types of cybercriminals and threats, and we're blogging about a different threat every day this week. Learn about today's threat, the Phisherman.
Oct 28, 2014 5:36am
Microsoft's Internet's Most Wanted video series highlights five types of cybercriminals and threats. We'll be posting a different Internet's Most Wanted character every day this week. Learn more about today's threat, the Bully.
Oct 27, 2014 6:15am
Microsoft Safer Online's Internet's Most Wanted video series highlights five types of cybercriminals and threats. We'll be posting a different Internet's Most Wanted character every day this week. Learn more about today's threat, the Identity Thief.
Oct 24, 2014 1:32pm
The National Cyber Security Alliance partnered with the U.S. Department of Homeland Security, Business Executives for National Security (BENS), the Retail Industry Leaders Association and Nasdaq to close the Nasdaq market on Tuesday, Oct. 21, in honor of National Cyber Security Awareness Month. We also held a luncheon on Wednesday, Oct. 22, “The Business of Cybersecurity: Lessons Learned and What’s Next?,” to discuss how the threat landscape has changed over time, the lessons learned and how industries can move forward.

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26