The Stay Safe Online Blog
Just as one man's trash can be another man's treasure, one person's creepy can be another person's helpful. As Data Privacy Day gets closer, it's a good time to brush up on your privacy know-how and the importance of protecting personal information.
The RE: View is a look back at headlines that caught our attention last month and that senior executives and board members should consider when assessing and managing cyber risk.
Many be unaware of the importance of privacy and protecting your personal information in helping to avoid having your identity stolen. Our guest blogger shares a few tips for protecting yourself from hackers and cybercriminals.
Connected devices are fast becoming a dime a dozen. From cars to cameras to watches, the Internet of Things (IoT) presents amazing new opportunities while introducing additional security challenges. Ultimately, proper attention to security is one of the best ways an enterprise can best serve its customers.
Kids need to understand both the risks and benefits of cyber technology, so that they can build it far beyond our imagination in the future, just like how the Internet's founders built the foundation for what we have now.
Today cybersecurity is one of the most important fields in technology and yet, despite its importance, many women and professionals of color are largely unaware that this career opportunity exists.
62 percent of organizations worldwide need more cybersecurity professionals at a time when the global cybersecurity talent gap is widening. Employers are looking towards young adults, a generation raised behind a keyboard, as a prime piece of the solution.
As National Cyber Security Awareness Month (NCSAM) comes to a close, it's a great time to think about the future of jobs in the cybersecurity field. Week 5 of NCSAM is about cybersecurity education and career opportunities. In this #ChatSTC chat, we talked about what it means to be a cyber professional, shared tips for students and professionals looking to get into the cybersecurity field and discussed how young people can prepare to join the cybersecurity workforce.
Security training should foster not only the desire but also the ability to practice safe computing. Training experiences should reach beyond awareness to help users develop real skills that will help them to be cyber-safe.
Hackers will always try to find security vulnerabilities within our products, and if they find a way in, they can spread malware, take control of your systems and steal your confidential and valuable data. With your organization and customer loyalty at risk, it's vital you take all the steps you can to secure your systems.
Technology is not the only critical element of a trusted security process; a holistic security conversation includes people and processes as well.
Superheroes fuel our fantasies. But what if they really did exist? And what if you could become one yourself? Our guest blogger discusses a new superhero, Cyber Avenger, and how you can help protect the Internet.
The sheer number of white papers, conferences and PowerPoint decks touting new tools and blinking lights causes many organizations to fixate on these seemingly easy fixes to cyber breaches while ignoring the most fundamental aspect of their enterprise security. Technology alone can't defend your network: it's all about the people.
Cybercrime is an increasingly serious issue both in the United States and globally; the estimated annual cost of global cybercrime has reached $100 billion. Our guest blogger discusses the history of cybercrime, recent cyber breaches and the need for more cybersecurity professionals.
Not having enough professionals in the cyber workforce poses risks to both our national security and economy. It is essential that young people graduate from schools prepared to enter the workforce and adulthood using technology safely, securely, ethically and productively.
The National Cyber Security Alliance (NCSA) kicked off Week 4 of National Cyber Security Awareness Month (NCSAM) at the Nasdaq MarketSite.
Cybersecurity isn't just about protecting the IT infrastructure of a company. It's about protecting the business itself: the information, processes, procedures and day-to-day activities that define a company.
By now, it's common knowledge that the interconnectedness that stems from the Internet of Things (IoT) brings with it a multitude of benefits. But like most things in life, the benefits IoT provides come with their own set of vulnerabilities.
Have you thought about how many things in your home connect to the Internet? "Smart" devices now include everything from thermostats to cars to umbrellas, and our digital lives evolve as we connect to more apps and devices. In Week 4 of National Cyber Security Awareness Month (NCSAM), we had a #ChatSTC chat to discuss how to protect ourselves and our information as we adopt emerging technologies.
Do you know where all the data collected about your behaviors is being stored? Do you know what it’s being used for? Chances are, you don't. And that means that existing issues of privacy and security are only going to get more complex in the IoT era.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29