The Stay Safe Online Blog
Have you thought about how many things in your home connect to the Internet? "Smart" devices now include everything from thermostats to cars to umbrellas, and our digital lives evolve as we connect to more apps and devices. In Week 4 of National Cyber Security Awareness Month (NCSAM), we had a #ChatSTC chat to discuss how to protect ourselves and our information as we adopt emerging technologies.
Do you know where all the data collected about your behaviors is being stored? Do you know what it’s being used for? Chances are, you don't. And that means that existing issues of privacy and security are only going to get more complex in the IoT era.
Whether it's computer-equipped safety goggles for hands-free warehouse work, a fitness band to encourage employee activity and curtail healthcare costs or a shipping container with a temperature sensor to keep food fresh, connected devices are shifting from "gadgets" to go-to productivity tools for more effective businesses and workforces. When it comes to securing the varied connected devices that make up the Internet of Things (IoT), however, it can get a bit hairy.
In the same way you would wash your hands after contact with someone sick, there are ways to stay virus-free in the social media world.
The growing Internet of Things has the potential to make our lives more efficient and convenient and help us gain valuable insights. But that's only if the manufacturers behind these innovations take security (and privacy) seriously.
It's week 4 of National Cyber Security Awareness Month, which is all about Your Evolving Digital Life. This week we'll highlight where we were, where we are today and how we can keep our digital lives safer and more secure with emerging technology.
If you've ever had your information exposed in a data breach, you know it can be stressful. But what happens if your child’s personal information is exposed, too?
Forming good mobile security habits now can protect you from hackers and from expensive or dangerous situations if the wrong person gets ahold of your phone. Follow these steps to keep your phone and your personal information safe.
Online security is a shared responsibility, but how much responsibility is the typical American household taking for its online safety? ESET thought National Cyber Security Awareness Month would be a good time to pose that question and used a survey to find answers, some of which may surprise you.
There are many ways parents can educate their kids on good cyber habits, whether they're using social media, playing games or shopping online. Week 3 of National Cyber Security Awareness Month is about staying protected while we are always connected, and this #ChatSTC chat provided parents with tips on helping kids use technology more safely and securely and raising good digital citizens.
Each year, the Identity Theft Resource Center (ITRC) tracks the consumer calls that come into its 24-hour toll-free call center to build a clear picture of the threats to the public's identity safety. The annual report, called the Aftermath report, follows up with identity theft victims who are willing to talk about how identity theft has impacted their lives and what the long-term effects may be.
We live on our smartphones, and much of our daily lives can be conducted through these computers in our pockets. It stands to reason that we should be aware of how much information these devices contain and why we need to secure them. If you want a place to start, here are three quick tips to get you on the right road to staying safe on mobile devices
Kids are now bombarded with ways in which to avoid the real world and sink into the online realm, and the more time kids spend connected, the more they risk exposure to online threats, from cyberbullying to malware. Fortunately, there are ways parents can give their kids the freedom to enjoy the benefits of connected devices while ensuring they stay safe and act responsibly.
When it comes to data security and the real-life impact of identity theft, public awareness is at an all-time high. But there is still great confusion and ignorance about what it is, how it happens and what can be done to avoid the pitfalls of life after a data breach or personal compromise. Here are a few steps you can take to change how you conduct your affairs going forward.
Today, we are all digital citizens and need a strong knowledge base and skills to safely navigate our always-connected world. This week of National Cyber Security Awareness Month (NCSAM), we're sharing simple ways we can protect ourselves and those around us and what to do if impacted by a breach or cybercrime.
In support of week 2 of National Cyber Security Awareness Month, the National Cyber Security Alliance partnered with the U.S. Department of Homeland Security, the Council of Better Business Bureaus and the Federal Trade Commission to host a webinar on Oct. 8 on creating a culture of cybersecurity at work.
Millions of websites are compromised and infected with various forms of malware every year. Our guest blogger gives you an overview and discusses tools that can help you in the event of a breach.
In support of National Cyber Security Awareness Month, Praesidio Security Engineer Bill Creasey, shares five cybersecurity tips that any business can use to be safe online.
As we launch the third week of National Cyber Security Awareness Month (NCSAM), we hope you'll participate by helping promote a safer, more secure and more trusted Internet all month long. We're making it easy to support NCSAM 2015 by providing materials for each week that you can share at home, at work and school and in the community.
All businesses face cybersecurity challenges, which means that proactively protecting organizational assets, employees and consumers must be a priority for every business. Week 2 of National Cyber Security Awareness Month (NCSAM) is all about what any business can do to strengthen its cybersecurity posture. This #ChatSTC chat highlighted ways that business leaders can protect their organizations, their employees and consumers' data and how businesses can prepare for and respond to cybersecurity incidents.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28