The Stay Safe Online Blog

Jul 10, 2015 5:48am
In a world filled with cyber threats, how can we stay safe when sharing information online? Here are some steps you can take to keep your personal data safe.
Jul 9, 2015 7:33am
A single click is all that's needed for an adversary to reel in your data by grasping ahold of your machine. Network defenders can overcome these adversaries and help protect their organizations, employees and consumers by keeping in mind four golden rules.
Jul 8, 2015 1:32pm
School is out, summer is in high gear and many of us are preparing for well-deserved vacations. We hosted a #ChatDPD Twitter chat to talk about things you should know about your online safety on the go. From free airport WiFi to paying for that extra suitcase, we explored what you can do to avoid making yourself vulnerable to cybercriminals while you travel so you can focus on having a little R&R.
Jul 1, 2015 8:02am
The RE: View is a look back at recent headlines that caught our attention and that senior executives and board members should consider when assessing and managing cyber risk.
Jun 30, 2015 10:12am
Our carbon footprint impacts greatly on the environment; only, we don't realize it until we actually see the rising sea levels, melting glaciers and animals dying out. The same goes for our digital footprint: until we can see the damage we're potentially placing on our own security, we won't know where we're going wrong. With greenhouse emissions expected to be cut by at least 29 percent between now and 2020, the question is, can we do the same for cybercrime? If we all follow these simple steps, it's possible.
Jun 29, 2015 6:47am
Online payments can be made in a variety of ways, but majority of the online financial transactions are done through secured payment gateways. Secure payment gateways, as the name suggests, are application service providers for ecommerce websites that authorize various financial transactions taking place on online stores for ensuring safety for both the retailers and the online buyers. Learn more about what these gateways are and how they help protect your online transactions.
Jun 22, 2015 12:10pm
Virtual or crypto currencies like Bitcoin can be a fast way to pay online, or in person with a mobile app, but using virtual currencies comes with risk. The Federal Trade Commission shares some tips to consider before using virtual currencies as payment.
Jun 18, 2015 6:26am
Thwarting cyber attacks isn't a one-and-done deal; it demands constant vigilance, continuous risk assessment and resilience. Here are three strategies to help keep your business safe in the event of a security breach.
Jun 10, 2015 1:09pm
June is Internet Safety Month! Privacy and safety go hand in hand, and that's why this month's #ChatDPD focused on kids and the best ways to manage their privacy and security. We also discussed online safety tips you can share with kids.
Jun 10, 2015 6:49am
Coinciding with Internet Safety Month, this June Intel Security (an NCSA Board member company) released findings from its new study, "The Realities of Cyber Parenting: What Pre-teens and Teens Are Up To Online," which examined both parents' concerns and the behaviors of American pre-teens and teenagers online and on social media.
Jun 8, 2015 7:54am
You can help protect yourself from cybercriminals if you stay alert and use a bit of common-sense thinking when navigating the World Wide Web. Here are six important tips from for how to stay safe online this Internet Safety Month.
Jun 4, 2015 1:56pm
As data breaches and cybercrimes like fraud, identity theft and phishing grow in prevalence and sophistication, it's more important than ever to be informed about cybersecurity and online safety. We celebrated Internet Safety Month (June) and Logical Operations' Cybersecurity Awareness Week (June 1-5) with a discussion of how you can take a stand against cybercrime.
Jun 2, 2015 6:58am
The RE: View is a look back at recent headlines that caught our attention and that senior executives and board members should consider when assessing and managing cyber risk.
Jun 1, 2015 6:52am
Like apps that let you pay at stores with your phone, "peer-to-peer" payment services can be a convenient way to pay friends. But before you use one, check the app's settings for available security features.
May 14, 2015 6:49am
Our smartphones and tablets, along with many other everyday objects, are as powerful and connected as our PCs and laptops. We must take steps to protect the information on all of our smart devices, just like we would for our computers.
May 13, 2015 1:01pm
The Internet of Things (the ability of everyday objects to connect to the Internet while collecting and sharing information) is changing the way we use technology. Soon, almost any device in our homes, whether it's a phone, thermostat, refrigerator, fitness tracker or baby monitor, will be connected to the Internet. This growth in connectivity offers convenience and efficiencies but also concern for privacy and security. In this #ChatDPD, we discussed what increasingly connected homes mean for digital citizens and our privacy.
May 12, 2015 6:54am
While mobile's role in e-commerce presents plenty of opportunities for businesses to deliver relevant, cost-efficient mobile marketing offers to consumers' mobile devices, it also requires that businesses take some precautions. Here are five tips for safer mobile payments.
May 11, 2015 6:47am
The National Cyber Security Alliance (NCSA) was thrilled to partner again with RSA Conference 2015 as an association sponsor. RSA Conference (RSAC) is the world's largest global security event, offering a comprehensive platform for sharing intelligence, sparking innovation and encouraging collaboration, with this year's philanthropic focus on keeping kids safe online. Here's a recap of NCSA's involvement in this year's conference.
May 7, 2015 12:09pm
We celebrated World Password Day (May 7) 2015 with a Twitter chat on password safety. Long, strong passwords are easier than you think. Learn how with these tips.
May 5, 2015 9:55am
The RE: View is a look back at the recent headlines that caught our attention and that senior executives and board members should consider when assessing and managing cyber risk.

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33