The Stay Safe Online Blog
Kids are now bombarded with ways in which to avoid the real world and sink into the online realm, and the more time kids spend connected, the more they risk exposure to online threats, from cyberbullying to malware. Fortunately, there are ways parents can give their kids the freedom to enjoy the benefits of connected devices while ensuring they stay safe and act responsibly.
When it comes to data security and the real-life impact of identity theft, public awareness is at an all-time high. But there is still great confusion and ignorance about what it is, how it happens and what can be done to avoid the pitfalls of life after a data breach or personal compromise. Here are a few steps you can take to change how you conduct your affairs going forward.
Today, we are all digital citizens and need a strong knowledge base and skills to safely navigate our always-connected world. This week of National Cyber Security Awareness Month (NCSAM), we're sharing simple ways we can protect ourselves and those around us and what to do if impacted by a breach or cybercrime.
In support of week 2 of National Cyber Security Awareness Month, the National Cyber Security Alliance partnered with the U.S. Department of Homeland Security, the Council of Better Business Bureaus and the Federal Trade Commission to host a webinar on Oct. 8 on creating a culture of cybersecurity at work.
Millions of websites are compromised and infected with various forms of malware every year. Our guest blogger gives you an overview and discusses tools that can help you in the event of a breach.
In support of National Cyber Security Awareness Month, Praesidio Security Engineer Bill Creasey, shares five cybersecurity tips that any business can use to be safe online.
As we launch the third week of National Cyber Security Awareness Month (NCSAM), we hope you'll participate by helping promote a safer, more secure and more trusted Internet all month long. We're making it easy to support NCSAM 2015 by providing materials for each week that you can share at home, at work and school and in the community.
All businesses face cybersecurity challenges, which means that proactively protecting organizational assets, employees and consumers must be a priority for every business. Week 2 of National Cyber Security Awareness Month (NCSAM) is all about what any business can do to strengthen its cybersecurity posture. This #ChatSTC chat highlighted ways that business leaders can protect their organizations, their employees and consumers' data and how businesses can prepare for and respond to cybersecurity incidents.
Organizations need to think about the realities of today's cyber world and realize that very technologically sophisticated thieves may try to steal their information. Both hackers and trusted insiders are potential threats to an organization's sensitive information.
If you're concerned about keeping your business safe online, check out these quick tips on how best to have a real impact on cybersecurity.
The 2015 Cost of Data Breach study estimates that data breaches cost U.S. organizations an average of $6.5 million. Despite this, the 2015 Annual Shred-it Security Tracker Survey shows that information security is still a declining priority among American businesses. Here's what you should know.
With a few security basics and ongoing vigilance, businesses can be aware and defend against cyber attacks. Our guest blogger from the Payment Card Industry Security Standards Council shares a few key tips on protecting against social engineering attacks that should be part of your business' cybersecurity culture.
National Cyber Security Awareness Month (NCSAM) is a great reminder for us all to check our own online security. Oct. 6, 2015, marks the firstInternational #2FATuesday (#2FactorTuesday). The National Cyber SecurityAlliance (NCSA), the FIDO Alliance, Google, the National Strategy for TrustedIdentities in Cyberspace (NSTIC) and other experts gathered on a Twitter chat to encourage the world to get two steps ahead by turning on 2-factor authentication.
The bring your own device (BYOD) movement opens a proverbial can of worms when it comes to security. So how do agencies reconcile their need for security and their employees' dependency on their personal IP-based devices?
How can defenders cope with this barrage of social engineering opportunities? And how can businesses afford it? Here are three considerations for network defense that can strengthen any enterprise's posture against a breach from social cyber for little to no cost, allowing you to stay social AND safe.
Do your employees access their data and apps at home or on the road? Are you a small business owner who has leveraged free data storage? Do your customers log in to your website to order supplies or services?? And do you use online software services, like HR and payroll? If any of the situations above sound familiar, then in all likelihood you have a cloud-enabled service provider.
Oct. 6 is the first International #2FactorTuesday, an effort led by the National Cyber Security Alliance (NCSA) and the FIDO Alliance designed to raise international awareness for two-factor authentication as a means of enhancing the security of online accounts.
Week 2 of National Cyber Security Awareness Month (NCSAM) 2015 is underway, and this week we're focusing on creating a culture of cybersecurity at work. Cybersecurity must become a priority for every business and industry, and companies need to proactively protect their most vital assets, employees and customers.
As we launch the second week of National Cyber Security Awareness Month (NCSAM), we hope you'll participate by helping promote a safer, more secure and more trusted Internet all month long. We're making it easy to support NCSAM 2015 by providing materials for each week that you can share at home, at work and school and in the community.
Many businesses have intensified their focus on improved technology to strengthen IT security. However, machine-based security is only part of the picture. Here is how security-aware businesses can implement three considerations to better safeguard their information.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26