The Stay Safe Online Blog
When you visit a webpage, loads of information is traded back and forth between your browser and the web server. This transfer was designed to make sure that the server has all the information it needs to properly display the page you're looking at. But the architecture of the web means that all of this information is available on every single call. Learn more about what your browser communicates when you surf the web.
Data Privacy Day (DPD) is an international effort centered on "Respecting Privacy, Safeguarding Data and Enabling Trust," and your organization has a role to play. To get involved today, register your organization as a DPD Champion.
Finding the right balance when it comes to social media sharing isn't an easy feat, but there are several things you can do to protect your personal information on social media.
Step one for talking privacy is getting our vocabulary in order. So let's start with the basics and move on to several recent terms of endearment in the data management discussion.
The Identity Theft Resource Center (ITRC) recently held an event at Google's Washington, DC, office to release the results of its study, Identity Theft: The Aftermath 2013. ITRC's study features a look into identity theft through the eyes of a victim, and its results provide a snapshot of the victim experience.
It can't be ignored. Cybercrime is on the rise. Learn more about the layers of cybercrime and how you can help fight online threats.
Microsoft Safer Online's Internet's Most Wanted video series highlights five types of cyber threats, and we're blogging about a different threat each day this week. Learn more about today's threat, the Virus.
Learn ways to protect yourself from becoming a victim of identity theft, fraud, phishing and other crimes.
Microsoft Safer Online's Internet's Most Wanted video series highlights five types of cybercriminals and threats, and we're blogging about a different threat each day this week. Learn more about today's threat, the Spambot.
Safer Online by Microsoft''s Internet's Most Wanted video series highlights five types of cybercriminals and threats, and we're blogging about a different threat every day this week. Learn about today's threat, the Phisherman.
Microsoft's Internet's Most Wanted video series highlights five types of cybercriminals and threats. We'll be posting a different Internet's Most Wanted character every day this week. Learn more about today's threat, the Bully.
Microsoft Safer Online's Internet's Most Wanted video series highlights five types of cybercriminals and threats. We'll be posting a different Internet's Most Wanted character every day this week. Learn more about today's threat, the Identity Thief.
The National Cyber Security Alliance partnered with the U.S. Department of Homeland Security, Business Executives for National Security (BENS), the Retail Industry Leaders Association and Nasdaq to close the Nasdaq market on Tuesday, Oct. 21, in honor of National Cyber Security Awareness Month. We also held a luncheon on Wednesday, Oct. 22, “The Business of Cybersecurity: Lessons Learned and What’s Next?,” to discuss how the threat landscape has changed over time, the lessons learned and how industries can move forward.
Running a small business is risky, but ignoring the cybersecurity of the business is even riskier. With so much at stake, it behooves a small business owner to guard the company's assets as much as possible.
Smaller businesses can do much to minimize their cyber threat risks. Learn the steps SMBs can take to lower their risks of being targeted by cybercriminals.
Small businesses are the backbone of our economy, but they don't always have the best cybersecurity guidelines in place. We discussed ways small businesses can protect their organizations, customers and employees.
Guest blogger Katie Hurst discusses how National Cyber Security Awareness Month (NCSAM) Champion organization OpenSesame is celebrating NCSAM and staying safe online every day.
According to Cisco, there will be 50 billion Internet-connected devices by 2020. The Internet of Things - the ability of objects and devices to transfer data - is changing the way we use technology. In this Twitter chat, we discussed ways to secure all of your devices that connect to the Internet.
Google recently held its second "Security at Scale" event, "The Hacker Spectrum," in alignment with National Cyber Security Awareness Month's week 2 theme of secure IT development in its discussion of "hackers."
One click has the potential to leave you vulnerable. Learn how you can #ClickSmart to protect yourself against phishing, bad URLS, infected downloads and more.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26