The Stay Safe Online Blog
Leading identity theft experts from The Identity Theft Council, National Consumers League, ID Theft Resource Center, PRIVATE WIFI and NCSA discussed the steps you can take to protect your personal information and how to respond if you become a victim of identity theft.
Private WiFi's Jillian Ryan delves into the data from its latest study by Harris Poll identifying WiFi users, practices and risks, and shares it all in a new infographic. A version of this blog appeared on Private WiFi's blog on April 3.
By now, we hope you know that hackers can steal your sensitive information any time you connect to a public WiFi network. But what you may not know is how fast they can do it. That's what WAFB 9 demonstrated in a hacking experiment on a university hotspot in Baton Rouge, Louisiana. What happened should be a wakeup call for hotspot users everywhere.
The ever-changing ways kids interact online has made it difficult for parents to keep pace with the latest safety and security advice. PRIVO, Savvy Cyber Kids, iKeepSafe, the FTC and the Center on Media and Child Health joined NCSA to discuss tips for parents and share resources.
Recent surveys have revealed how generations view and address online safety and security concerns differently, writes Private WiFi's Jared Howe. A version of this blog originally appeared on Private WiFi's blog on March 6, 2014.
One dilemma for companies may be the way "cyber" is used as an umbrella term for a vast set of threats, says John Glowacki, chief strategy and information officer at Protexit. Originally posted January 23, 2014.
The National Cyber Security Alliance, RSA Conference, U.S. Dept. of Homeland Security, Microsoft, McAfee, Juniper Security and others discussed public-private efforts to promote online safety education and resources, live from the RSA Conference 2014 in San Francisco.
To help understand how shoppers are behaving in their stores, retailers are contracting statistical modeling firms that collect and analyze data many shoppers may not even realize they're providing through their smartphones. The growth of the Mobile Location Analytics (MLA) industry has raised questions about the specific information being collected, how it’s being used, and to what extent, if at all, consumers are aware this is happening.
Regular investments in cybersecurity are as essential today as stone walls were to a medieval city, says Eric Brown, CIO, NCI Building Systems, Inc.
"Smiling feels easy and natural. However, this action is quite elaborate from a structural point of view," writes Jetico CEO Michael Waksman. "So the key to making data privacy more accessible would be to use software that allows encryption to be performed easily and naturally without even thinking about it."
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30