The Stay Safe Online Blog
“A More Perfect Internet: Digital Incivility, Cyber-Violence and Fake News” was the second program in a series led by the George Washington University Law School's Global Internet Freedom and Human Rights Project. The event brought together practitioners, academics and student-experts to identify, address and explore ways to combat online pitfalls like cyber-violence, hoaxes and misinformation.
Fortunately, there are many ways to protect your home whilst smart home security protocols catch up with the market. Here are some simple but effective ways to protect your home, family and devices.
The RE: View is a look back at recent headlines that caught our attention and that senior executives and board members should consider when assessing and managing cyber risk.
In credit card skimming, a cybercriminal uses a malicious electronic device which ‘skims’ through your credit card data once the magnetic strip of your card is in contact with it and steals information from it in order to take control of your account. Learn basic safety measures that can help you avoid becoming a victim.
In an effort to test Americans’ cyber awareness, Pew surveyed 1,055 adult internet users living in the United States, asking them 13 questions covering many of the general concepts and basic building blocks of protecting oneself online.
Safeguarding against a data breach – and preparing for one – is something small business owners really need to have on their radar. The good news is that there are some effective, if not infallible, defenses small business owners can easily – and inexpensively – implement.
Phishing emails can harm businesses whose identities are spoofed. Don’t want that to happen to your business? Read the new Staff Perspective from the Federal Trade Commission, "Businesses Can Help Stop Phishing and Protect their Brands Using Email Authentication."
The George Washington University Law School’s Global Internet Freedom and Human Rights Project recently hosted a seminar, “A More Perfect Internet: Addressing Digital Incivility, Cyber-Violence and ‘Fake News,’” supported by the Microsoft Technology and Human Rights Center. Read our event recap here.
Tax Day is only a month away, and the filing deadline will be here before you know it. With tax identity theft on the rise, this busy online timeframe is prime for cyber thieves and their devious online scams. This #ChatSTC Twitter chat discussed how you can better spot cyber tricks this tax season, the steps you can take to proactively protect your information and what to do if you fall victim to tax identity theft.
A Strategic Approach to Cybersecurity Risk Management: Highlights from the Nasdaq & NCSA Cybersecurity Summit
The National Cyber Security Alliance (NCSA) and Nasdaq recently partnered to host the Nasdaq & NCSA Cybersecurity Summit in an effort to educate businesses about strategically managing cybersecurity risks and building a company-wide culture of cybersecurity.
Now, even our vehicles – essential parts of our day-to-day lives – are connected to the internet, and while cars’ collection, storage and use of data can help make life more convenient and efficient, they also present security and privacy risks. It’s important to know what information our cars collect, how they use our data and how we can manage our privacy and identities in a growing connected car landscape.
#CyberAware is a family-friendly newsletter from the National Cyber Security Alliance (NCSA). This month, we’re sharing resources to help you be safer online this tax season, tips to consider before purchasing a mobile phone for your child and recent online safety news.
The high stakes of cybersecurity demand a strategic, proactive approach to defense rather than reactive responses commonly seen. NCSA board member Anthony Grieco, senior director and trust strategy officer of Cisco’s Security and Trust Organization, shares three elements necessary for a comprehensive cyber strategy.
Regardless of the fact that payment card industry (PCI) compliance standards have been around since 2006, there remains quite a bit of misunderstanding and confusion about what it means to be PCI compliant and why it matters for the protection of your company and your customers. Here are some frequently asked questions about PCI compliance.
We must protect our children until we teach them the basics of online security. Here are some tools that can help you make the internet a safer place for your kids.
Before you add a device to your home network, take into account these tips so that you can rest easy knowing your smart home is more secure.
On Feb. 28, families around the nation woke up to find out that CloudPets toys had been hacked and more than 800,000 user accounts and 2 million voice recordings were exposed in a major data breach.
The National Cyber Security Alliance is thrilled to accept the 2017 SC Magazine Editor’s Choice Award. This award is part of the SC Awards, honoring the achievements of companies and information security professionals striving to safeguard businesses, customers and critical data in North America.
You may know what your kids should be doing to be safer online, but do you know how to talk to them about their online lives in a wa ythat resonates? Join @RSAConference and @STOPTHNKCONNECT live from RSAConference for a conversation about best practices for teaching kids about online safety, security and privacy in an always-on connected world, or theInternet of Me. Share stories about what has worked for you and get tips on how you can have effective conversations that move beyond just cyber rules to real-life online experiences, build trust and teach kids to think critically about their behaviors and how they can be safe, secure and ethical digital citizens.
And while the shortfall of talent is growing, the percentage of women in information security is shrinking. But bad news is not the whole story, nor is it a fixed destination. Interacting with the people who are just coming into this industry has been a tremendous source of hope and inspiration for guest blogger Lysa Myers, security researcher at ESET.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32