The Stay Safe Online Blog
If you've ever had your information exposed in a data breach, you know it can be stressful. But what happens if your child’s personal information is exposed, too?
Forming good mobile security habits now can protect you from hackers and from expensive or dangerous situations if the wrong person gets ahold of your phone. Follow these steps to keep your phone and your personal information safe.
Online security is a shared responsibility, but how much responsibility is the typical American household taking for its online safety? ESET thought National Cyber Security Awareness Month would be a good time to pose that question and used a survey to find answers, some of which may surprise you.
There are many ways parents can educate their kids on good cyber habits, whether they're using social media, playing games or shopping online. Week 3 of National Cyber Security Awareness Month is about staying protected while we are always connected, and this #ChatSTC chat provided parents with tips on helping kids use technology more safely and securely and raising good digital citizens.
Each year, the Identity Theft Resource Center (ITRC) tracks the consumer calls that come into its 24-hour toll-free call center to build a clear picture of the threats to the public's identity safety. The annual report, called the Aftermath report, follows up with identity theft victims who are willing to talk about how identity theft has impacted their lives and what the long-term effects may be.
We live on our smartphones, and much of our daily lives can be conducted through these computers in our pockets. It stands to reason that we should be aware of how much information these devices contain and why we need to secure them. If you want a place to start, here are three quick tips to get you on the right road to staying safe on mobile devices
Kids are now bombarded with ways in which to avoid the real world and sink into the online realm, and the more time kids spend connected, the more they risk exposure to online threats, from cyberbullying to malware. Fortunately, there are ways parents can give their kids the freedom to enjoy the benefits of connected devices while ensuring they stay safe and act responsibly.
When it comes to data security and the real-life impact of identity theft, public awareness is at an all-time high. But there is still great confusion and ignorance about what it is, how it happens and what can be done to avoid the pitfalls of life after a data breach or personal compromise. Here are a few steps you can take to change how you conduct your affairs going forward.
Today, we are all digital citizens and need a strong knowledge base and skills to safely navigate our always-connected world. This week of National Cyber Security Awareness Month (NCSAM), we're sharing simple ways we can protect ourselves and those around us and what to do if impacted by a breach or cybercrime.
In support of week 2 of National Cyber Security Awareness Month, the National Cyber Security Alliance partnered with the U.S. Department of Homeland Security, the Council of Better Business Bureaus and the Federal Trade Commission to host a webinar on Oct. 8 on creating a culture of cybersecurity at work.
Millions of websites are compromised and infected with various forms of malware every year. Our guest blogger gives you an overview and discusses tools that can help you in the event of a breach.
In support of National Cyber Security Awareness Month, Praesidio Security Engineer Bill Creasey, shares five cybersecurity tips that any business can use to be safe online.
As we launch the third week of National Cyber Security Awareness Month (NCSAM), we hope you'll participate by helping promote a safer, more secure and more trusted Internet all month long. We're making it easy to support NCSAM 2015 by providing materials for each week that you can share at home, at work and school and in the community.
All businesses face cybersecurity challenges, which means that proactively protecting organizational assets, employees and consumers must be a priority for every business. Week 2 of National Cyber Security Awareness Month (NCSAM) is all about what any business can do to strengthen its cybersecurity posture. This #ChatSTC chat highlighted ways that business leaders can protect their organizations, their employees and consumers' data and how businesses can prepare for and respond to cybersecurity incidents.
Organizations need to think about the realities of today's cyber world and realize that very technologically sophisticated thieves may try to steal their information. Both hackers and trusted insiders are potential threats to an organization's sensitive information.
If you're concerned about keeping your business safe online, check out these quick tips on how best to have a real impact on cybersecurity.
The 2015 Cost of Data Breach study estimates that data breaches cost U.S. organizations an average of $6.5 million. Despite this, the 2015 Annual Shred-it Security Tracker Survey shows that information security is still a declining priority among American businesses. Here's what you should know.
With a few security basics and ongoing vigilance, businesses can be aware and defend against cyber attacks. Our guest blogger from the Payment Card Industry Security Standards Council shares a few key tips on protecting against social engineering attacks that should be part of your business' cybersecurity culture.
National Cyber Security Awareness Month (NCSAM) is a great reminder for us all to check our own online security. Oct. 6, 2015, marks the firstInternational #2FATuesday (#2FactorTuesday). The National Cyber SecurityAlliance (NCSA), the FIDO Alliance, Google, the National Strategy for TrustedIdentities in Cyberspace (NSTIC) and other experts gathered on a Twitter chat to encourage the world to get two steps ahead by turning on 2-factor authentication.
The bring your own device (BYOD) movement opens a proverbial can of worms when it comes to security. So how do agencies reconcile their need for security and their employees' dependency on their personal IP-based devices?
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32