The Stay Safe Online Blog
Google recently held its second "Security at Scale" event, "The Hacker Spectrum," in alignment with National Cyber Security Awareness Month's week 2 theme of secure IT development in its discussion of "hackers."
One click has the potential to leave you vulnerable. Learn how you can #ClickSmart to protect yourself against phishing, bad URLS, infected downloads and more.
Through simple behavioral and technological changes, individuals can greatly reduce their exposure to cyber threats. This National Cyber Security Awareness Month, our guest blogger from RoboForm is celebrating by providing online safety tools and tips.
STOP. THINK. CONNECT., which urges us to stop and think before we go online, is the perfect theme for NCSA’s cybersecurity education and awareness program, and the good news is that a little thinking goes a long way in keeping you safe.
Building security into information technology products is key to improving cybersecurity. But sometimes, the software and apps we use on our devices have vulnerabilities. We'll teach you what to look for when creating and downloading these products.
While Internet security is a pervasive issue for all industries, schools deserve some extra attention. Along with the increased need for bandwidth to access online courses and tools, students and teachers are all too quick to share personal information through the internet. Schools need to carefully plan their network security in much the same way they plan their physical security. There has to be a good balance between access and security.
We're kicking off National Cyber Security Awareness Month with a chat about the simple measures everyone can take to stay safer and more secure online.
National Cyber Security Awareness Month (NCSAM) 2014 kicked off with a launch event in Nashville Oct. 1. Check out some of the event highlights and videos!
October 1 marks the first day of National Cyber Security Awareness Month (#NCSAM). Here is a compilation of some tweets from our launch event at the NASCIO Conference in Nashville, Tenn.
The Project to Get Older Adults online (Project GOAL) and the Time Warner Cable Research Program on Digital Communications recently held an event to release and discuss “Closing Online Access Gaps for Older Adults,” a paper that examines the ongoing challenges of broadband access and adoption for older adults. The event featured a summary of the paper’s findings and a panel discussion of both the challenges faced with getting older adults online and the potential solutions that can help close this digital divide.
Google recently held a “Security at Scale” event, part of a series designed to provide insight into how the technology company works to protect its users and their information and make the Internet safer for everyone.
Post your commitment to the ethical and innovative use of data on social media to help meet the goal of 100,000 pledges by Data Privacy Day (Jan. 28, 2015)!
The new school year is in full swing and National Cyber Security Awareness Month is around the corner. What better time to talk to the kids in your life about online safety. Many of our readers are doing just that — and using Net Cetera: Chatting with Kids About Being Online as the basis for the conversation.
As we celebrate the 9th annual National Health IT (NHIT) Week (Sept. 15-19, 2014), it is a good time to remember the importance of and the relationship between cyber security, online safety and health IT. Healthcare organizations are constantly advancing in technology, and because they handle sensitive patient information it is especially important for health organizations to have strong cyber security practices.
The growth of the Internet has introduced us to a much easier and convenient way of life. The Web has become our source of information, facilitates easier shopping and media consumption and allows us to connect with people on social media sites. Although social media sites such as Facebook, Twitter and Instagram provide convenient, beneficial features, it is important to understand their security and privacy implications and be smart about what you post on social media.
In a phishing scam, a cybercriminal sends an email that attempts to fraudulently acquire the recipient’s personal information. Learn more about phishing and what you can do about email vulnerabilities.
As the new school year approaches, it is important for families to brush up on online safety and ensure they are staying safe online. Here are a few ways you can protect yourself and your family this school year.
The Advisory Committee to the Congressional Internet Caucus recently held an event and panel discussion about the May 2014 “right to be forgotten” ruling in Europe. Since May, many concerns have been raised regarding how the “right to be forgotten,” intended to protect citizens’ privacy, could limit access to important information and compromise transparency. Additionally, some have voiced concerns about how the ruling could impact American Internet users in the event that search engines deleted requested results not only within the EU but globally.
When it comes to tightening your Internet and computer privacy security, one crucial step you can take is to learn more about how your online activities leave confidential traces behind on your hard drive.
The Center for Democracy & Technology (CDT) recently held the first event in a series that tackles various aspects of our digital lives, focusing on emerging technologies and the transformation of traditional industries through technology and data. This series asks participants to consider the ways that being “always on” impacts us and how we relate to each other.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25