The Stay Safe Online Blog
William J. Brunkhardt, chief technology strategist at Cyber Sciences Corporation, reviews what we know and what companies should be aware of regarding the Heartbleed bug.
Leading identity theft experts from The Identity Theft Council, National Consumers League, ID Theft Resource Center, PRIVATE WIFI and NCSA discussed the steps you can take to protect your personal information and how to respond if you become a victim of identity theft.
Private WiFi's Jillian Ryan delves into the data from its latest study by Harris Poll identifying WiFi users, practices and risks, and shares it all in a new infographic. A version of this blog appeared on Private WiFi's blog on April 3.
By now, we hope you know that hackers can steal your sensitive information any time you connect to a public WiFi network. But what you may not know is how fast they can do it. That's what WAFB 9 demonstrated in a hacking experiment on a university hotspot in Baton Rouge, Louisiana. What happened should be a wakeup call for hotspot users everywhere.
The ever-changing ways kids interact online has made it difficult for parents to keep pace with the latest safety and security advice. PRIVO, Savvy Cyber Kids, iKeepSafe, the FTC and the Center on Media and Child Health joined NCSA to discuss tips for parents and share resources.
Recent surveys have revealed how generations view and address online safety and security concerns differently, writes Private WiFi's Jared Howe. A version of this blog originally appeared on Private WiFi's blog on March 6, 2014.
One dilemma for companies may be the way "cyber" is used as an umbrella term for a vast set of threats, says John Glowacki, chief strategy and information officer at Protexit. Originally posted January 23, 2014.
The National Cyber Security Alliance, RSA Conference, U.S. Dept. of Homeland Security, Microsoft, McAfee, Juniper Security and others discussed public-private efforts to promote online safety education and resources, live from the RSA Conference 2014 in San Francisco.
To help understand how shoppers are behaving in their stores, retailers are contracting statistical modeling firms that collect and analyze data many shoppers may not even realize they're providing through their smartphones. The growth of the Mobile Location Analytics (MLA) industry has raised questions about the specific information being collected, how it’s being used, and to what extent, if at all, consumers are aware this is happening.
Regular investments in cybersecurity are as essential today as stone walls were to a medieval city, says Eric Brown, CIO, NCI Building Systems, Inc.
"Smiling feels easy and natural. However, this action is quite elaborate from a structural point of view," writes Jetico CEO Michael Waksman. "So the key to making data privacy more accessible would be to use software that allows encryption to be performed easily and naturally without even thinking about it."
David Hoffman was one of the driving forces behind the observation of Data Privacy Day in the United States and Canada in 2008, so it should come as no surprise Intel's global privacy officer delivered one of the most memorable comments of the 2014 Data Privacy Day Kickoff Event Jan. 28 at The Pew Charitable Trusts in Washington, D.C.
This Tuesday, February 11th, is Safer Internet Day, a worldwide awareness effort to make the Internet a safer place and to harness the power of the Internet for good.
"For those who would frame data privacy as the individual-versus-corporations or individual-versus-government, there are more constructive approaches to protecting privacy than adversarial ones," writes NCSA executive director Michael Kaiser on the annual observation of Data Privacy Day. "And that's why the theme of Data Privacy Day is Respecting Privacy, Safeguarding Data and Enabling Trust."
"To avoid accidentally selling your identity on eBay or providing access to your bank accounts in the form of a broken tablet in the trash, you need to take secure measures to wipe the data clean," writes Frank Milia of IT Asset Management Group (ITAMG). "The good news is that many of the drive manufacturers have provided secure erasure utilities built into the disks."
In the last #ChatDPD before Data Privacy Day Jan. 28, iKeepSafe, SpiderOak, ISACA and the International Association of Privacy Professionals joined NCSA to discuss best practices for businesses regarding privacy ethics and good data stewardship.
SpiderOak's Chip Black takes a look back at Ted Nelson's seminal 1974 works on computing and how they're relevant as ever in online privacy discussions 40 years later.
Today, Target announced that has NCSA joined a coalition Target is creating with the National Cyber-Forensics and Training Alliance (NCFTA), and the Better Business Bureau (BBB) to initiate an education campaign to help people stay safer online.
"It's the start of a new year -- a time to look at our habits with fresh eyes, make positive changes and tackle life with renewed energy and enthusiasm," writes Linnette Attai of iKeepSafe. "It's also a great time to take a look at your digital footprint, and those of your children, and see if there are changes to be made there as well."
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24