The Stay Safe Online Blog
October 1 marks the first day of National Cyber Security Awareness Month (#NCSAM). Here is a compilation of some tweets from our launch event at the NASCIO Conference in Nashville, Tenn.
The Project to Get Older Adults online (Project GOAL) and the Time Warner Cable Research Program on Digital Communications recently held an event to release and discuss “Closing Online Access Gaps for Older Adults,” a paper that examines the ongoing challenges of broadband access and adoption for older adults. The event featured a summary of the paper’s findings and a panel discussion of both the challenges faced with getting older adults online and the potential solutions that can help close this digital divide.
Google recently held a “Security at Scale” event, part of a series designed to provide insight into how the technology company works to protect its users and their information and make the Internet safer for everyone.
Post your commitment to the ethical and innovative use of data on social media to help meet the goal of 100,000 pledges by Data Privacy Day (Jan. 28, 2015)!
The new school year is in full swing and National Cyber Security Awareness Month is around the corner. What better time to talk to the kids in your life about online safety. Many of our readers are doing just that — and using Net Cetera: Chatting with Kids About Being Online as the basis for the conversation.
As we celebrate the 9th annual National Health IT (NHIT) Week (Sept. 15-19, 2014), it is a good time to remember the importance of and the relationship between cyber security, online safety and health IT. Healthcare organizations are constantly advancing in technology, and because they handle sensitive patient information it is especially important for health organizations to have strong cyber security practices.
The growth of the Internet has introduced us to a much easier and convenient way of life. The Web has become our source of information, facilitates easier shopping and media consumption and allows us to connect with people on social media sites. Although social media sites such as Facebook, Twitter and Instagram provide convenient, beneficial features, it is important to understand their security and privacy implications and be smart about what you post on social media.
In a phishing scam, a cybercriminal sends an email that attempts to fraudulently acquire the recipient’s personal information. Learn more about phishing and what you can do about email vulnerabilities.
As the new school year approaches, it is important for families to brush up on online safety and ensure they are staying safe online. Here are a few ways you can protect yourself and your family this school year.
The Advisory Committee to the Congressional Internet Caucus recently held an event and panel discussion about the May 2014 “right to be forgotten” ruling in Europe. Since May, many concerns have been raised regarding how the “right to be forgotten,” intended to protect citizens’ privacy, could limit access to important information and compromise transparency. Additionally, some have voiced concerns about how the ruling could impact American Internet users in the event that search engines deleted requested results not only within the EU but globally.
When it comes to tightening your Internet and computer privacy security, one crucial step you can take is to learn more about how your online activities leave confidential traces behind on your hard drive.
The Center for Democracy & Technology (CDT) recently held the first event in a series that tackles various aspects of our digital lives, focusing on emerging technologies and the transformation of traditional industries through technology and data. This series asks participants to consider the ways that being “always on” impacts us and how we relate to each other.
Summer is a popular time for travel, and while staying connected can enrich your travel experience, it is important to take note of potential security issues before using the Internet on the go.
The National Cyber Security Alliance recently partnered with data privacy management company TRUSTe on the Internet of Things (IoT) Privacy Summit, held July 10 in Silicon Valley, California. This event, which featured presentations by technology, privacy, business and policy experts, addressed the privacy questions and needs related to the Internet of Things, or the growing world of web-connected devices and products.
The RE: View is a bimonthly look back at the headlines that caught the attention of our RE: Cyber contributors that senior executives and board members should consider when assessing and managing cyber risk.
Growing your business is top of mind yet one data breach can financially devastate your company. This ChatDPD highlights ways small biz can prioritize privacy and establish a strong baseline for a proactive and defensive data protection plan. Guests: @ATTSmallBiz, @PrivacyProf, @PrivacyPros
The LGBT Technology Partnership & Institute recently released a research paper, "An LGBT Broadband Future," which discusses the specific technological needs affecting lesbian, gay, bisexual and transgender (LGBT) communities and explores potential solutions to the technology-related issues they experience.
According to newly-released EMC Privacy Index, 84% of consumers don't like anyone knowing anything about themselves or their habits unless they make a decision to share that information.
The RE: View is a bimonthly look back at the headlines that caught the attention of our RE: Cyber contributors that senior executives and Board members should consider when assessing and managing cyber risk.
Information about your physical activity, daily habits and physical location are some of the most personal and sensitive details about you yet most of us are unaware of all the places our data may go on a given day.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33