The Stay Safe Online Blog
Reputation.com's Leslie Hobbs covers how to create a positive personal and professional presence online. "The potential to make the Internet work for you exists," she writes. "it just requires a bit of legwork and a lot of thought."
Frances Henderson, CIPP, and Emma Fletcher, CIPP, deliver the second installment in the Council of Better Business Bureaus' series, "Privacy Basics for the Savvy Small Business", by discussing how companies should approach reviewing and updating their privacy policies.
"In the Digital Age, one way a victim can start to feel empowered again is through controlling her privacy," writes Reputation.com's Leslie Hobbs, who offers some guidance that anyone can use to guard their personal information.
Data Privacy Day and guests AT&T (@ATTSmallBiz), Private WiFi (@Privatewifi) and Application Developers Alliance (@AppsAlliance) discussed privacy on-the-go for individuals and small businesses during this second #ChatDPD.
In her second entry in the Data Privacy Day guest blog series, iKeepSafe's Linnette Attai expands on the conversation around data security and schools with a new paper that outlines concerns and serves as a guide for dialogue on assessing and implementing systems and practices.
Privacy specialist Andrew McDevitt of AvePoint explains why the global privacy community should rally around Data Privacy Day this January 28: to heighten public awareness of privacy concerns and promote strong data stewardship practices among individuals and businesses.
Private Wifi and the Identity Theft Resource Center have released a new infographic, "The Ultimate Guide to Staying Safe on Public Wifi", which offers insight into about the overall consumer privacy beliefs in WiFi hotspots.
Online shopping definitely has its perks: the ability to get all of your holiday shopping done with a click of the mouse or a swipe of your finger, skipping the long lines, and avoiding fights over parking spots. But online shopping also comes with risks like phishing attempts, malware and even identity theft.
David Dahl, director of development for the Crypton.io project at data encryption and storage service provider SpiderOak, provides the strategies he follows at home to maintain greater control over his online privacy.
This may be the most wonderful time of the year, but it's also a time of increased opportunity for cybercrime. Intel, McAfee and others joined STOP. THINK. CONNECT. to discuss how to protect our digital lives during holiday season, as we travel, shop online, and unwrap newly gifted devices.
"Smart companies - the ones that are looking not just one quarter from now or one year from now - are anticipating the rise of the New Privacy," writes Reputation.com's Leslie Hobbs. "So what should companies do to start down that path?"
One of my favorite NCSAM events was our STOP. THINK. CONNECT. Online Safety School Assembly, which took place at the Gertz-Ressler High School in Los Angeles during our Cyber Education and the Next Generation of Cyber Leaders-themed week.
Linnette Attai from iKeepSafe delves into the issue of how schools protect the student data they collect, and a new iKeepsafe resource, "Data Privacy and Schools: Outlining the Conversation." The paper is a launching pad for dialogue about how schools collect and manage student data, with the ultimate aim of easing the development of successful and compliant partnerships with third-party technology partners.
The open and increasingly social nature of the Internet offers big benefits, and big risks. Data Privacy Day hosted a Twitter chat Nov. 13 to talk about how you can share responsibly while protecting your personal information online. Guests included @STOPTHNKCONNECT, @iKeepSafe, and @Reputation_com.
"Sharing your personal data can very much color your reputation, especially online," says Leslie Hobbs of Reputation.com. "In fact, the two often go hand-in-hand so take a judicious approach to revealing your personal details. Here's how."
If you could ask a hacker how to protect yourself from his or her intrusions into your devices and data, what would you ask? McAfee's Taylor Tompkins details her first encounter with a white-hat hacker.
"As any business executive whose organization has been victimized by cyber wrongdoers knows, suffering from a cyber-attack of any significance can be frustrating at best, and devastating at worst," write Joseph V. DeMarco and Alexis Tandeau, partner and foreign legal intern, respectively, at DeVore & DeMarco LLP. "Tempting as it may be, however, under current law, 'hacking back' can cause substantial legal harm as well as reputational backlash when done without carrying out an extremely careful factual and legal analysis of the proposed activity."
"Privacy advocates, regulators and others raise worthwhile concerns about the growing Internet of Things," writes guest blogger Jason Meyer. "What happens when the data these devices capture about us misrepresents us or include errors that skew our profiles?"
There is probably no technology that has changed the way we stay connected more profoundly and completely than the rise of the mobile Internet. As we move forward with our education and awareness efforts to make Internet users – and by extension, the Internet as a whole – safer and more secure, we’re paying particular attention to the powerful computing devices that so many of us carry in our pockets.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32