The Stay Safe Online Blog
Just like death and taxes, the DDoS threat has reached the level of “unavoidable fact” for the day-to-day of digital businesses and operators. As an industry, the tech sector needs to take this challenge very seriously.
With the shopping season well underway, hackers are cooking up schemes to secure their own holiday cheer. Don’t get too caught up in the holiday frenzy and ignore these basic security guidelines while you shop online.
Guest author Chad Fisher addresses the security concerns associated with online shopping this season by discussing a baby boomer's shopping habits, concerns and safety precautions.
NCSA encourages everyone to take key steps for shopping safely and securely online this season.
Do these 5 things to protect your customers’ data before Small Business Saturday.
#CyberAware is a monthly newsletter – created for families – by the National Cyber Security Alliance (NCSA). This month, we’re sharing resources to help you protect your smart devices at home and on the go and talk to your kids about cybersecurity careers along with recent online safety news.
Hacking has become not just a worry but a constant, tangible threat to people, companies and governments. But one area of hacking that had not hit the public consciousness until very recently is the very real potential of car hacking.
The RE: View is a look back at recent headlines that caught our attention and that senior executives and board members should consider when assessing and managing cyber risk.
Like the theme for National Cyber Security Awareness Month, protecting small businesses is a shared responsibility between the businesses and government. Government plays a dual role as an educator and if need be an enforcer.
As National Cyber Security Awareness Month comes to a close, National Critical Infrastructure Security and Resilience Month begins in November. This chat discussed the connection between the cyber and physical worlds and the importance of protecting and securing our nation’s critical infrastructure and simple cyber tips for individuals looking to do their part to protect our critical infrastructure from cyber threats.
The 2016 U.S. presidential election is a global phenomenon, but candidates aren’t the only ones vying to connect with the people. Behind the scenes, stealthy cybercriminals are immersing themselves in the political banter, gathering information and intel to drive their own agendas.
As the lines between the human and technology continue to blur, we are impacted by a growing ecosystem of third parties – many of whom we do not even realize are touching us. This third-party ecosystem offers both an opportunity and risk to the cybersecurity of critical infrastructure.
The framework provided by the Center for Media Literacy presents educators and students with a way for understanding how systematic companies are with obtaining information and how we as consumers need to be responsible participants in this ongoing dynamic. The five key concepts and questions of authorship, format, audience, content and purpose are gateways for a broader discussion on mediated environments.
“Apptitude” isn’t just about being able to use technology; it’s also about knowing how to use it responsibly.
This #ChatSTC Twitter chat discussed how you can take security precautions and protect your personal information as the world of cutting-edge technologies continues to grow.
Oct. 31 is the last day of National Cyber Security Awareness Month, and as the month comes to a close we hope you will continue to promote a safer, more secure and more trusted internet all year long. The National Cyber Security Alliance has online safety materials that you can share at home, at work and school and in the community.
For the fifth year in a row, the National Cyber Security Alliance (NCSA) and Nasdaq partnered to host their Cybersecurity Summit in honor of National Cyber Security Awareness Month (NCSAM) on Monday, Oct. 24.
As customers balance the increasing need to use connected devices with the risks of losing touch with where their personal information is going, they will have a harder and harder time determining where to draw the line between protection and enablement of our technology-driven, day-to-day lives. It's a company's responsibility to protect customer information with adequate security and privacy measures.
The State of Our Connected Lives’ Devices: Understanding the Security Risks & How to Defend Against Them
The proliferation of connected devices is staggering. As the use of these connected devices in our everyday lives continues to increase, it’s important that we all understand the potential security risks associated with our connected lives and how to better protect ourselves and our families against these potential threats.
With predictions putting the number of connected devices somewhere between 28 billion to more than 50 billion by 2020, now is the time to educate and eradicate security issues.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29