The Stay Safe Online Blog
The National Cyber Security Alliance and the Better Business Bureau encourage everyone to make digital spring cleaning an annual ritual to help protect their personal data. Get your online life in order this spring – and protect your, your company’s and your family’s sensitive information – by cleansing cyber clutter. This Twitter chat discussed simple steps consumers and organizations can take to be more #CyberAware this spring and all year round.
Even if you swear off all smart home technology, you probably still have everyday devices in your home that are susceptible to hacking. Learn about devices to look out for and how to protect them.
#CyberAware is a family-friendly newsletter from the National Cyber Security Alliance. This month, we’re sharing resources to help you clear out cyber clutter and test your online safety knowledge, information about tools you can use to protect children online and recent online safety news.
“A More Perfect Internet: Digital Incivility, Cyber-Violence and Fake News” was the second program in a series led by the George Washington University Law School's Global Internet Freedom and Human Rights Project. The event brought together practitioners, academics and student-experts to identify, address and explore ways to combat online pitfalls like cyber-violence, hoaxes and misinformation.
Fortunately, there are many ways to protect your home whilst smart home security protocols catch up with the market. Here are some simple but effective ways to protect your home, family and devices.
The RE: View is a look back at recent headlines that caught our attention and that senior executives and board members should consider when assessing and managing cyber risk.
In credit card skimming, a cybercriminal uses a malicious electronic device which ‘skims’ through your credit card data once the magnetic strip of your card is in contact with it and steals information from it in order to take control of your account. Learn basic safety measures that can help you avoid becoming a victim.
In an effort to test Americans’ cyber awareness, Pew surveyed 1,055 adult internet users living in the United States, asking them 13 questions covering many of the general concepts and basic building blocks of protecting oneself online.
Safeguarding against a data breach – and preparing for one – is something small business owners really need to have on their radar. The good news is that there are some effective, if not infallible, defenses small business owners can easily – and inexpensively – implement.
Phishing emails can harm businesses whose identities are spoofed. Don’t want that to happen to your business? Read the new Staff Perspective from the Federal Trade Commission, "Businesses Can Help Stop Phishing and Protect their Brands Using Email Authentication."
The George Washington University Law School’s Global Internet Freedom and Human Rights Project recently hosted a seminar, “A More Perfect Internet: Addressing Digital Incivility, Cyber-Violence and ‘Fake News,’” supported by the Microsoft Technology and Human Rights Center. Read our event recap here.
Tax Day is only a month away, and the filing deadline will be here before you know it. With tax identity theft on the rise, this busy online timeframe is prime for cyber thieves and their devious online scams. This #ChatSTC Twitter chat discussed how you can better spot cyber tricks this tax season, the steps you can take to proactively protect your information and what to do if you fall victim to tax identity theft.
A Strategic Approach to Cybersecurity Risk Management: Highlights from the Nasdaq & NCSA Cybersecurity Summit
The National Cyber Security Alliance (NCSA) and Nasdaq recently partnered to host the Nasdaq & NCSA Cybersecurity Summit in an effort to educate businesses about strategically managing cybersecurity risks and building a company-wide culture of cybersecurity.
Now, even our vehicles – essential parts of our day-to-day lives – are connected to the internet, and while cars’ collection, storage and use of data can help make life more convenient and efficient, they also present security and privacy risks. It’s important to know what information our cars collect, how they use our data and how we can manage our privacy and identities in a growing connected car landscape.
#CyberAware is a family-friendly newsletter from the National Cyber Security Alliance (NCSA). This month, we’re sharing resources to help you be safer online this tax season, tips to consider before purchasing a mobile phone for your child and recent online safety news.
The high stakes of cybersecurity demand a strategic, proactive approach to defense rather than reactive responses commonly seen. NCSA board member Anthony Grieco, senior director and trust strategy officer of Cisco’s Security and Trust Organization, shares three elements necessary for a comprehensive cyber strategy.
Regardless of the fact that payment card industry (PCI) compliance standards have been around since 2006, there remains quite a bit of misunderstanding and confusion about what it means to be PCI compliant and why it matters for the protection of your company and your customers. Here are some frequently asked questions about PCI compliance.
We must protect our children until we teach them the basics of online security. Here are some tools that can help you make the internet a safer place for your kids.
Before you add a device to your home network, take into account these tips so that you can rest easy knowing your smart home is more secure.
On Feb. 28, families around the nation woke up to find out that CloudPets toys had been hacked and more than 800,000 user accounts and 2 million voice recordings were exposed in a major data breach.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31