Cybercriminals’ hacking techniques are constantly evolving, which means if you’re running a business, it is absolutely crucial to use up-to-date defense measures to combat hacking activities. Let’s take a look at some of the cybersecurity measures that every business should be taking in 2017.
Businesses are worried about ransomware – and rightfully so. Last year, 70 percent of companies targeted by ransomware attacks paid rather than risking data loss, with 50 percent of these payments topping $10,000. Take an inside look at tech's biggest threat.
Distributed denial of service (DDoS) attacks have become some of the most pervasive threats to websites and businesses on the internet today.
No specific hacker’s tools or resources are mentioned here for obvious reasons, but by taking the mystery out of what is essentially a simple process, the business owner can understand what they are up against and why trusting the big software security firms – or even investing in outsourced IT support – is a wise idea.
Here in the U.S., we are celebrating National Small Business Week (NSBW), April 30 – May 6. Learn about ESET's new research on cybersecurity training in the workplace and how you can train your employees for free.
Even if you swear off all smart home technology, you probably still have everyday devices in your home that are susceptible to hacking. Learn about devices to look out for and how to protect them.
“A More Perfect Internet: Digital Incivility, Cyber-Violence and Fake News” was the second program in a series led by the George Washington University Law School's Global Internet Freedom and Human Rights Project. The event brought together practitioners, academics and student-experts to identify, address and explore ways to combat online pitfalls like cyber-violence, hoaxes and misinformation.
Fortunately, there are many ways to protect your home whilst smart home security protocols catch up with the market. Here are some simple but effective ways to protect your home, family and devices.
In credit card skimming, a cybercriminal uses a malicious electronic device which ‘skims’ through your credit card data once the magnetic strip of your card is in contact with it and steals information from it in order to take control of your account. Learn basic safety measures that can help you avoid becoming a victim.
Safeguarding against a data breach – and preparing for one – is something small business owners really need to have on their radar. The good news is that there are some effective, if not infallible, defenses small business owners can easily – and inexpensively – implement.
Phishing emails can harm businesses whose identities are spoofed. Don’t want that to happen to your business? Read the new Staff Perspective from the Federal Trade Commission, "Businesses Can Help Stop Phishing and Protect their Brands Using Email Authentication."
The high stakes of cybersecurity demand a strategic, proactive approach to defense rather than reactive responses commonly seen. NCSA board member Anthony Grieco, senior director and trust strategy officer of Cisco’s Security and Trust Organization, shares three elements necessary for a comprehensive cyber strategy.
Regardless of the fact that payment card industry (PCI) compliance standards have been around since 2006, there remains quite a bit of misunderstanding and confusion about what it means to be PCI compliant and why it matters for the protection of your company and your customers. Here are some frequently asked questions about PCI compliance.
We must protect our children until we teach them the basics of online security. Here are some tools that can help you make the internet a safer place for your kids.
Before you add a device to your home network, take into account these tips so that you can rest easy knowing your smart home is more secure.
And while the shortfall of talent is growing, the percentage of women in information security is shrinking. But bad news is not the whole story, nor is it a fixed destination. Interacting with the people who are just coming into this industry has been a tremendous source of hope and inspiration for guest blogger Lysa Myers, security researcher at ESET.
The theme of Data Privacy Day is “Respecting Privacy, Safeguarding Data, and Enabling Trust.” Despite the day being over, it’s still important to be aware of how you can protect your personal information and manage your privacy year-round.
Keeping hackers at bay requires due diligence. Here are a few best practices from the PCI Security Standards Council to help you keep your e-commerce site secure.
At Mozilla, every day is Data Privacy Day. Check out guest blogger Denelle Dixon-Thayer's tips for protecting your personal information.
Data Privacy Day is January 28! Since this particular holiday comes so early in the year, it’s a great opportunity to make some changes in the way you manage your personal data. Here are 17 things you can do to put your best privacy foot forward for 2017.
We have seen a vast transformation in our lives as a result of technology. Over time, technology has become more integrated into our homes, at work and on the road.
Personal information, particularly health care information, is being exposed in more places, through more “things” and to more people every day, which is creating new risks for people, businesses, health care organizations, governments and society as a whole. People all around the world are more concerned than ever about their privacy and the security of the personal information they share with others, with good reason.
As everyone probably knows by now, “Pokémon Go” encourages players to interact with their natural environment by using realistic maps of their surroundings as part of the game. Our guest bloggers at Intel Corporation discuss the privacy and safety implications of this technology and where it might lead in the future.
In making public an online archive of data breach notifications affecting Massachusetts residents from 2007 to 2016, that state may have taken the first step to make America more cybersecure. Guest blogger Adam Levin argues for a national database, and other consumer-first approaches to the identity theft pandemic.
For security, privacy, identity and digital transformation professionals, the occasion of Data Privacy Day is perfect for pondering the big issues, like: Has anything actually changed since last year?
EDUCAUSE shares several ideas to help you ignite your brainstorming about campus activities on Data Privacy Day (or during Data Privacy Month). These ideas are meant to be suitable for all higher education community members (e.g., students, faculty, and staff).
The Federal Trade Commission is hosting a prize competition called the Internet of Things Home Inspector Challenge. The FTC is asking people to come up with a technical solution to guard against security vulnerabilities in software on smart devices connected to their homes.
A new year usually means setting a goal to remodel that extra bedroom, cut out caffeine or finally hit the gym. This year, have an even greater goal in mind: the improvement of your privacy program. Here are some great ways to start you on your way to achieving just that.
Since the turn of the century, the state of cyberwarfare and cybercrime has grown by leaps and bounds. The concepts of advanced threats, sponsored nation state organizations and highly motivated criminal organizations are relatively new, but the use of the internet and the cyber domain as a means of attack has been well established for the past 15 to even 30 years.
The holiday season is underway, and digital devices (and their accessories) are flying off the shelves. Which bodes the question: How do you introduce your child to their new device?
If you are involved in any type of payments, you’ve probably heard of “PCI Requirements,” as published by the Payment Card Industry Security Standards Council (PCI SSC). UL along with acquisitions now under the UL banner have been working with the Payment Card Industry (PCI) since its inception – we were there when the first companies were accredited to perform PCI testing. T
Just like death and taxes, the DDoS threat has reached the level of “unavoidable fact” for the day-to-day of digital businesses and operators. As an industry, the tech sector needs to take this challenge very seriously.
With the shopping season well underway, hackers are cooking up schemes to secure their own holiday cheer. Don’t get too caught up in the holiday frenzy and ignore these basic security guidelines while you shop online.
Guest author Chad Fisher addresses the security concerns associated with online shopping this season by discussing a baby boomer's shopping habits, concerns and safety precautions.
Do these 5 things to protect your customers’ data before Small Business Saturday.
Hacking has become not just a worry but a constant, tangible threat to people, companies and governments. But one area of hacking that had not hit the public consciousness until very recently is the very real potential of car hacking.
The 2016 U.S. presidential election is a global phenomenon, but candidates aren’t the only ones vying to connect with the people. Behind the scenes, stealthy cybercriminals are immersing themselves in the political banter, gathering information and intel to drive their own agendas.
As the lines between the human and technology continue to blur, we are impacted by a growing ecosystem of third parties – many of whom we do not even realize are touching us. This third-party ecosystem offers both an opportunity and risk to the cybersecurity of critical infrastructure.
The framework provided by the Center for Media Literacy presents educators and students with a way for understanding how systematic companies are with obtaining information and how we as consumers need to be responsible participants in this ongoing dynamic. The five key concepts and questions of authorship, format, audience, content and purpose are gateways for a broader discussion on mediated environments.
“Apptitude” isn’t just about being able to use technology; it’s also about knowing how to use it responsibly.
As customers balance the increasing need to use connected devices with the risks of losing touch with where their personal information is going, they will have a harder and harder time determining where to draw the line between protection and enablement of our technology-driven, day-to-day lives. It's a company's responsibility to protect customer information with adequate security and privacy measures.
The State of Our Connected Lives’ Devices: Understanding the Security Risks & How to Defend Against Them
The proliferation of connected devices is staggering. As the use of these connected devices in our everyday lives continues to increase, it’s important that we all understand the potential security risks associated with our connected lives and how to better protect ourselves and our families against these potential threats.
With predictions putting the number of connected devices somewhere between 28 billion to more than 50 billion by 2020, now is the time to educate and eradicate security issues.
Do you think an abusive partner or ex is monitoring you through your phone? They might be using stalking apps (spyware) that secretly track your devices. Here’s information about what stalking apps are, how to tell if they’re on your device, and what to do if they are.
To build a long-term awareness program that effectively manages human risk, you need a plan. However, many organizations are not sure where to start. Fortunately, it’s a lot easier than you think – all you need to do is answer three deceptively simple questions: Who, What and How.
If you haven’t experienced a tech support scam yet, chances are you know someone who has. As part of National Cyber Security Awareness Month, Microsoft has released the results of a new global survey revealing 2 out of 3 people have experienced a tech support scam in the last 12 months.
Employers worldwide need today’s youth to become the seasoned cyber defenders of tomorrow, and that is why Raytheon and the National Cyber Security Alliance commissioned for the fourth straight year a survey of young adults ages 18 to 26 in 12 countries about all things cybersecurity.
Are you an executive or senior manager in your organization? If so, you bear many responsibilities, not the least of which is your obligation to ensure that your company is in compliance with the regulations governing the protection of health and financial information and your duty to protect the company’s assets.
Cyber insurance, a new trend in the information security sector, can offer an additional layer of protection that may fill the gaps where traditional business insurance policies may falter.
If best practices and rules are letting you down… don’t panic! The right solution might be easier than you think.
Cybersecurity must be a part of everyone’s job. NCSA board member Anthony Grieco discusses the way Cisco has approached cybersecurity and developing a holistic cybersecurity culture.
With the number of mobile devices like smartphones, laptops and tablets readily available, it’s become increasingly popular to carry out day-to-day banking on the go. But have you ever thought about the risks associated with accessing your accounts on the move and how to protect yourself?
With more than 2 million lucrative cybersecurity jobs unfilled today — and even more considering other “cyber”-related careers — we owe it to our country’s student population to make them aware of the
Since 2004, October has been recognized as National Cyber Security Awareness Month – a time when government, private and nonprofit organizations and individuals come together to enhance protection of Americans’ digital lives. Almost every aspect of our daily activities now involves the internet. Today, every citizen should know how to secure their information.
Who doesn’t love larger-than-life characters? Celebrities fascinate us. From laughter to tears, their performances stay in our memories, sometimes even in the form of hilarious internet memes. Unfortunately, however, all this attention also piques the interest of another group: cybercriminals.
Customers appreciate a company who puts effort into keeping them safe. Customers will be more likely to frequent a business where they know they can securely transact. That is why it is vital for retailers to treat data security seriously.
The Consumer Federation of America (CFA) and its Identity Theft Service Best Practices Working Group, which include consumer advocates and identity theft service providers, have created a new resource – “My company’s had a data breach, now what? 7 questions to ask when considering identity theft services.”
Ransomware is a serious problem. That's why the Federal Trade Commission is holding a ransomware event on Sept. 7 in Washington, D.C.
The phrase “ethical hacking” was first used in 1995, but the concept has been around for a lot longer. Many would argue that ethical hacking is the goal of the majority of hackers, but the current media perception is that hackers are criminals. To understand the truth a little better we need to look at the history of ethical hacking.
Pokémon Go, a virtual reality mobile app, is catching on with “moveset” speed. Smartphone users are meeting up at PokéStops and “gyms” to battle it out and staying up until the wee hours to capture the rare ones. As with all mobile apps, there are risks to consider when using Pokémon Go. Here are some tips on how to minimize them.
Nearly four in 10 American teens report that someone was mean or cruel to them in the digital world in the last year, and those negative comments most often stemmed from something the teens said or did, or were about their appearance, results of a new Microsoft study show.
If you’re a bride or groom, you’ve probably got a lot on your mind — and on your to-do list — before saying “I do.” The Federal Trade Commission is here to help with some tips for managing all of your online planning activities and accounts more safely and securely before and during the big day.
No matter how familiar American youth are with the Internet, there’s one aspect of digital living that might have escaped their expertise: privacy. To help empower the next generation to think critically about how the use the Web, ExpressVPN has created the Future of Privacy Scholarship.
An organization can eliminate or at least reduce its cybersecurity blind spot by using a formal, structured process for engaging technology solution vendors.
To help you recognize and avoid imposter scams, the Federal Trade Commission has four new videos on IRS imposters, tech support schemers, online dating con artists and “grandkid” scammers.
In today’s technological world, hacking has become a major concern for businesses, governments and other organizations. This is why it’s essential for you to protect your network from hackers and the malicious programs they create.
Have you noticed your child glued to his or her smartphone? Do you ever wonder what they could possibly be spending so much time on? The short answer: apps. Here’s what parents need to know.
Did you know that your website's security can impact its search engine optimization (SEO)? Here are three ways to protect and maintain your SEO using web security.
Anyone can be a victim of hacking, and unfortunately there is no guaranteed way to prevent it. However, following safety best practices and implementing security protocols can help keep your children and their information safe from online predators.
Tokenization is one critical technology that has enhanced payment security for merchants, customers and financial institutions. Here’s critical information to know about tokenization and how it can minimize your risk of a security breach.
The National Cyber Security Alliance consulted its privacy advisory committee about the need for more research on privacy. Our committee members identified two youth-focused topics that deserve more attention – privacy education in schools and the privacy implications of new connected toys.
How often have you heard that you should change your passwords regularly, like every 30, 60 or 90 days? Maybe at least once every six months? Well, here’s some good news for you: doing so doesn't improve security.
Every time your organization wants to add a new behavior, first ask why.
During the week of May 1-6, the U.S. Small Business Administration (SBA) will recognize and honor the critical and life-altering contributions of America’s mom and pop shops, manufacturing enterprises, Main Street retailers and entrepreneurs during National Small Business Week.
It's important to take safety precautions when using e-commerce websites so that you can shop online with confidence.
There are plenty of good reasons to get your high school diploma as an adult. But before you start looking into your options, make sure you know how to spot a diploma scam.
When we think of cybercrime, we often think of strangers who we will never meet online, identity theft and financial fraud. What we may not typically consider is that survivors of sexual assault, domestic violence, stalking, elder abuse and other violent crimes may also be vulnerable to stolen personal information used to conduct cybercrime.
Kids growing up today are exposed to computers and electronic devices at a very early age. They see their parents constantly on their mobile devices and they want to mimic that behavior. Harnessing your child's love of electronics and turning it into a positive influence is the goal of almost every parent.
A virtual private network (VPN) is a technology that improves your online security and privacy.
Recovering from identity theft often takes time and persistence. That's why a recent announcement from the Federal Trade Commission (FTC) is a big deal: New features at IdentityTheft.gov make it easier to report and recover from identity theft.
This year, the theme for Data Privacy Day focuses on respecting privacy, protecting data and enabling trust. Today's global company is by necessity a digitized company. As a result, challenges around data privacy, security and trust must be addressed by everyone: companies, vendors, partners and consumers alike.
It’s tax season, and you know what that mean:: identity thieves who want to steal your tax refund are at work. Find out how to stop them during Tax Identity Theft Awareness Week, January 25-29.
Data Privacy Day – which arrives in just a week – is a day designed to raise awareness and promote best practices for privacy and data protection. It is a day that looks to the future and recognizes that we can and should do better as an industry. It reminds companies that they need to focus on the importance of having the trust of users.
While Data Privacy Day (DPD) is focused on raising awareness among consumers, it is also an opportunity to raise privacy awareness within any organization. Here are five easy activities your organization can undertake to support privacy awareness this DPD or anytime throughout the year.
Information about you, such as your location or your purchase or search history, has value, just like money. It's important to be thoughtful about who gets this information and how it's collected through apps and websites.
Mozilla is privileged to work with an amazing team of volunteers around the world who dedicate their time and energy to Internet issues, including a small team in India that decided to dream big this year for International Data Privacy Day.
Companies and organizations all over the globe are increasingly hiring privacy professionals to help them make the tough decisions about what information to collect, when and how to store and delete it, which databases to combine and what big data to mine.
Accessing public WiFi on any device is a lot less safe than you may realize. Data Privacy Day is a good time to reassess the ways in which our desire to stay constantly connected is putting ourselves at risk.
There are several different forms of encryption, and each type is built to solve a specific problem and balance what information security professionals refer to as the security rather than the usability tradeoff.
Cybercriminals have have gravitated toward exploiting any vulnerabilities found on websites; however, there are ways that you can help protect yourself from data leakage attempts. Here are four common types of data attacks and how to mitigate them.
For all their virtual achievements, gamers aren't exactly feted for their real-life usefulness; however, the gaming community is proving supremely valuable in the world of technology. The lack of cybersecurity talent to protect us is a real concern, and some are turning to video games to plug the skills gap.
New research from TRUSTe sheds light on how aware companies are of the proposed EU General Data Protection Regulation (GDPR) and the preparations they're making.
Increase your awareness of the most common cybersecurity threats in the workplace, and you will actively help put an end to the basic tricks hackers have been successfully using for years.
From the "like" you gave your friends on their politically charged social media posts to the location you shared on apps, everything that you voluntarily share online is fair game for data mining. Your personal information has value, just like money.
Just as one man's trash can be another man's treasure, one person's creepy can be another person's helpful. As Data Privacy Day gets closer, it's a good time to brush up on your privacy know-how and the importance of protecting personal information.
Many be unaware of the importance of privacy and protecting your personal information in helping to avoid having your identity stolen. Our guest blogger shares a few tips for protecting yourself from hackers and cybercriminals.
Connected devices are fast becoming a dime a dozen. From cars to cameras to watches, the Internet of Things (IoT) presents amazing new opportunities while introducing additional security challenges. Ultimately, proper attention to security is one of the best ways an enterprise can best serve its customers.
Kids need to understand both the risks and benefits of cyber technology, so that they can build it far beyond our imagination in the future, just like how the Internet's founders built the foundation for what we have now.
Today cybersecurity is one of the most important fields in technology and yet, despite its importance, many women and professionals of color are largely unaware that this career opportunity exists.
62 percent of organizations worldwide need more cybersecurity professionals at a time when the global cybersecurity talent gap is widening. Employers are looking towards young adults, a generation raised behind a keyboard, as a prime piece of the solution.
Security training should foster not only the desire but also the ability to practice safe computing. Training experiences should reach beyond awareness to help users develop real skills that will help them to be cyber-safe.
Hackers will always try to find security vulnerabilities within our products, and if they find a way in, they can spread malware, take control of your systems and steal your confidential and valuable data. With your organization and customer loyalty at risk, it's vital you take all the steps you can to secure your systems.
Technology is not the only critical element of a trusted security process; a holistic security conversation includes people and processes as well.
Superheroes fuel our fantasies. But what if they really did exist? And what if you could become one yourself? Our guest blogger discusses a new superhero, Cyber Avenger, and how you can help protect the Internet.
The sheer number of white papers, conferences and PowerPoint decks touting new tools and blinking lights causes many organizations to fixate on these seemingly easy fixes to cyber breaches while ignoring the most fundamental aspect of their enterprise security. Technology alone can't defend your network: it's all about the people.
Cybercrime is an increasingly serious issue both in the United States and globally; the estimated annual cost of global cybercrime has reached $100 billion. Our guest blogger discusses the history of cybercrime, recent cyber breaches and the need for more cybersecurity professionals.
Cybersecurity isn't just about protecting the IT infrastructure of a company. It's about protecting the business itself: the information, processes, procedures and day-to-day activities that define a company.
By now, it's common knowledge that the interconnectedness that stems from the Internet of Things (IoT) brings with it a multitude of benefits. But like most things in life, the benefits IoT provides come with their own set of vulnerabilities.
Do you know where all the data collected about your behaviors is being stored? Do you know what it’s being used for? Chances are, you don't. And that means that existing issues of privacy and security are only going to get more complex in the IoT era.
Whether it's computer-equipped safety goggles for hands-free warehouse work, a fitness band to encourage employee activity and curtail healthcare costs or a shipping container with a temperature sensor to keep food fresh, connected devices are shifting from "gadgets" to go-to productivity tools for more effective businesses and workforces. When it comes to securing the varied connected devices that make up the Internet of Things (IoT), however, it can get a bit hairy.
In the same way you would wash your hands after contact with someone sick, there are ways to stay virus-free in the social media world.
The growing Internet of Things has the potential to make our lives more efficient and convenient and help us gain valuable insights. But that's only if the manufacturers behind these innovations take security (and privacy) seriously.
If you've ever had your information exposed in a data breach, you know it can be stressful. But what happens if your child’s personal information is exposed, too?
Forming good mobile security habits now can protect you from hackers and from expensive or dangerous situations if the wrong person gets ahold of your phone. Follow these steps to keep your phone and your personal information safe.
Online security is a shared responsibility, but how much responsibility is the typical American household taking for its online safety? ESET thought National Cyber Security Awareness Month would be a good time to pose that question and used a survey to find answers, some of which may surprise you.
Each year, the Identity Theft Resource Center (ITRC) tracks the consumer calls that come into its 24-hour toll-free call center to build a clear picture of the threats to the public's identity safety. The annual report, called the Aftermath report, follows up with identity theft victims who are willing to talk about how identity theft has impacted their lives and what the long-term effects may be.
We live on our smartphones, and much of our daily lives can be conducted through these computers in our pockets. It stands to reason that we should be aware of how much information these devices contain and why we need to secure them. If you want a place to start, here are three quick tips to get you on the right road to staying safe on mobile devices
Kids are now bombarded with ways in which to avoid the real world and sink into the online realm, and the more time kids spend connected, the more they risk exposure to online threats, from cyberbullying to malware. Fortunately, there are ways parents can give their kids the freedom to enjoy the benefits of connected devices while ensuring they stay safe and act responsibly.
When it comes to data security and the real-life impact of identity theft, public awareness is at an all-time high. But there is still great confusion and ignorance about what it is, how it happens and what can be done to avoid the pitfalls of life after a data breach or personal compromise. Here are a few steps you can take to change how you conduct your affairs going forward.
Millions of websites are compromised and infected with various forms of malware every year. Our guest blogger gives you an overview and discusses tools that can help you in the event of a breach.
In support of National Cyber Security Awareness Month, Praesidio Security Engineer Bill Creasey, shares five cybersecurity tips that any business can use to be safe online.
Organizations need to think about the realities of today's cyber world and realize that very technologically sophisticated thieves may try to steal their information. Both hackers and trusted insiders are potential threats to an organization's sensitive information.
If you're concerned about keeping your business safe online, check out these quick tips on how best to have a real impact on cybersecurity.
The 2015 Cost of Data Breach study estimates that data breaches cost U.S. organizations an average of $6.5 million. Despite this, the 2015 Annual Shred-it Security Tracker Survey shows that information security is still a declining priority among American businesses. Here's what you should know.
With a few security basics and ongoing vigilance, businesses can be aware and defend against cyber attacks. Our guest blogger from the Payment Card Industry Security Standards Council shares a few key tips on protecting against social engineering attacks that should be part of your business' cybersecurity culture.
The bring your own device (BYOD) movement opens a proverbial can of worms when it comes to security. So how do agencies reconcile their need for security and their employees' dependency on their personal IP-based devices?
How can defenders cope with this barrage of social engineering opportunities? And how can businesses afford it? Here are three considerations for network defense that can strengthen any enterprise's posture against a breach from social cyber for little to no cost, allowing you to stay social AND safe.
Do your employees access their data and apps at home or on the road? Are you a small business owner who has leveraged free data storage? Do your customers log in to your website to order supplies or services?? And do you use online software services, like HR and payroll? If any of the situations above sound familiar, then in all likelihood you have a cloud-enabled service provider.
Many businesses have intensified their focus on improved technology to strengthen IT security. However, machine-based security is only part of the picture. Here is how security-aware businesses can implement three considerations to better safeguard their information.
If you’ve used an email provider in the past few years, you may have been asked to provide a phone number to help verify your account. As we start to conduct more and more of our everyday tasks online, like paying bills and shopping, it has become increasingly important for many web providers to verify your identity and prevent others from abusing your account. Your phone number is one of the easiest ways to verify your identity with an online service provider.
There's no excuse for not taking web security seriously, especially during National Cyber Security Awareness Month (NCSAM), which officially kicks off on October 1. If you and your online business are ready to take the next step in cybersecurity, check out these five website security recommendations for any company.
Are we doing all we should to educate ourselves and our children about how to be safe online? The best step in the right direction is to mark your calendar for every day in October and get ready to participate in National Cyber Security Awareness Month.
Phishing scams are becoming more dangerous and effective than ever. The ZapFraud team discusses ways to protect yourself and others against these dangerous, targeted attacks.
In a world filled with cyber threats, how can we stay safe when sharing information online? Here are some steps you can take to keep your personal data safe.
A single click is all that's needed for an adversary to reel in your data by grasping ahold of your machine. Network defenders can overcome these adversaries and help protect their organizations, employees and consumers by keeping in mind four golden rules.
Our carbon footprint impacts greatly on the environment; only, we don't realize it until we actually see the rising sea levels, melting glaciers and animals dying out. The same goes for our digital footprint: until we can see the damage we're potentially placing on our own security, we won't know where we're going wrong. With greenhouse emissions expected to be cut by at least 29 percent between now and 2020, the question is, can we do the same for cybercrime? If we all follow these simple steps, it's possible.
Online payments can be made in a variety of ways, but majority of the online financial transactions are done through secured payment gateways. Secure payment gateways, as the name suggests, are application service providers for ecommerce websites that authorize various financial transactions taking place on online stores for ensuring safety for both the retailers and the online buyers. Learn more about what these gateways are and how they help protect your online transactions.
Virtual or crypto currencies like Bitcoin can be a fast way to pay online, or in person with a mobile app, but using virtual currencies comes with risk. The Federal Trade Commission shares some tips to consider before using virtual currencies as payment.
Thwarting cyber attacks isn't a one-and-done deal; it demands constant vigilance, continuous risk assessment and resilience. Here are three strategies to help keep your business safe in the event of a security breach.
You can help protect yourself from cybercriminals if you stay alert and use a bit of common-sense thinking when navigating the World Wide Web. Here are six important tips from Techboomers.com for how to stay safe online this Internet Safety Month.
Like apps that let you pay at stores with your phone, "peer-to-peer" payment services can be a convenient way to pay friends. But before you use one, check the app's settings for available security features.
While mobile's role in e-commerce presents plenty of opportunities for businesses to deliver relevant, cost-efficient mobile marketing offers to consumers' mobile devices, it also requires that businesses take some precautions. Here are five tips for safer mobile payments.
It is important to be mindful of what pieces of information can be traced back to us as individuals and know what can be discovered about us by performing a simple online search. By being in the know, we have the power to protect our online reputations, which subsequently protects us offline.
It's possible for users to limit their risk and improve their information technology control with a few simple steps. Here are three ways to keep technology from turning on you.
If you have young kids who are spending time online--and these days, most kids are--you may be looking for a way to control what they can access. Here are some basic things you can do to your router and computer to limit your kids' online activities at home and help them stay safe online.
It's important to work just as hard at managing your public image on social media as you do in real life, if not even harder. This may sound daunting, but it's actually not as difficult as it sounds as long as you follow some common-sense precautions. Here are five general recommendations from Techboomers.com for how to keep your life on social media under control.
We're going to discuss some of the steps you can take to make your home network a little more secure. Nothing is 100% foolproof, but there are steps you can take - using a layered approach - that will improve your online security and reduce your chances of becoming a victim.
The best way to tackle the wave of digital lawbreakers is to master the basics yourself. This quick guide to online safety will help you avoid becoming another victim in a long line of cybercrime and inspire confidence for you and your family to surf the Web safely.
OnGuardOnline.gov has some tips to help you protect your laptop - and the valuable stuff on it.
Valentine's Day is around the corner, and yes, romance is in the air. But the month of love also celebrates Safer Internet Day on Feb. 10. Show how much you care by sharing this short online safety Q&A with your loved one.
This Safer Internet Day, learn how you can identify and avoid falling victim to phishing attacks.
Almost anything we do can now be done over the Internet: pay bills, shop for appliances, go banking, apply for jobs or make appointments. But these websites with your personal information in their databases can be potential threats as well. So how can you protect your identity?
Passwords have been used for thousands of years. They are still here today, though, and have proved their staying power.
It may sound ridiculous at first, but a strategic deployment of the most common and visible form of personally identifiable information - the humble email address - might be enough to send a would-be identity thief packing to an easier mark.
Here are 10 ways to safeguard your information from the most common threats and vulnerabilities that put you, your family and your office at risk.
An anonymous, unnamed CEO for a popular transparency company whose mascot is a ghost is fond of saying "running a business these days would be easy - if it weren't for all the people and computers." It's a joke meant to add perspective to everyday problems - but it can also apply to just trying to comfortably exist in the "Information Age."
We need to prioritize the importance of developing a comprehensive plan for data privacy and student learning - one that is thoughtful, balanced and comprehensive. We don't want to get this wrong. We can't. Too much is at stake for this and the next generation of students.
It's time for a reality check: complete anonymity online is not possible. The myth distracts people from what they should really be looking for in privacy programs and services: transparency, trust, ease of use, performance and reliability.
Data never dies. And data doesn't have a conscience - this immortal resource comes with significant risk. Time for a closer look.
While constant connectivity has its benefits, the rise of mobile devices and the proliferation of WiFi networks can be a dangerous coupling. In fact, many WiFi hotspot users are unaware of the inherent risks that the technology poses - such as an increased risk of identity theft, hacking and compromised bank accounts.
Yeah, you got a new computer. So what's next? Securely migrating to a new computer can be done in just 5 steps.
The term "Big Data" carries a lot of weight. So what should we think when we hear news reporters and insiders talk about "Big Data"? How can we manage what we contribute to its vast (and seemingly scary) collection of information?
In 2014 there seemed to be a new data breach every week. In these breaches of credit card data, student information, Social Security numbers and corporate intellectual property, the personal information of many businesses' clients and employees was exposed. Here are five priorities to consider for your business as we embark on 2015.
Privacy is a personal notion - we all have different ideas of what it means to properly manage information about who we are and how we behave. We've gathered a few interesting points about worldwide privacy legislation which show that how much others know about who you are can depend largely on where you are.
The movie Big HIPAA 6 is about a robot that can scan humans, discovering everything from small scratches and bumps to the amount of serotonin in your body at the moment. That got me thinking about the implications to the Health Insurance Portability and Accountability Act (HIPAA) or other privacy concerns that come with this technology.
It's important to educate yourself and practice the best habits to keep your data secure. Learn more about cookies and how you can protect your personal information.
The beginnings of Chris "Biggie Smalls" Wallace can be traced to the streets of Bed-Stuy, Brooklyn. The neighborhood is only 9 miles away from the new data-driven Madison Avenue as the crow flies - but they're worlds apart in terms of culture. Still, Big Poppa and Big Data have more in common than you might think.
The folks at Dictionary.com chose "privacy" as their word of the year in 2013. It was a long journey to that distinction, during which it inexorably became the engine driving more companies than not. Privacy is the consumer-consequence manifestation of big data, which increasingly shapes approaches to marketing, product development and a vast array of services. In short, privacy has become a price of consumption.
The Internet is a big place where it's possible to come in contact with all sorts of people, many of them only looking out for their own interests. Fortunately, there is a good deal of technology devoted to making it possible for kids to surf, play games and shop for toys when the proper controls are in place. Here are some easy ways to give your kids safe access to the Internet.
There is a golden rule of customer data: you are responsible for all customer data that you request. Using this as a guideline, check out these best practices for taking care of customer data.
Privacy as a relevant everyday concept has been pushing its way into the mainstream, and the events of the last couple of years have accelerated that trend. It's unfamiliar territory for us - is privacy trendy?
A debilitating cyber attack on the U.S. electrical grid has yet to make headlines, but utility companies, federal agencies and state and local governments are increasingly engaged in dialogue and training around that eventuality, according to panelists at a recent discussion hosted by the Intelligence and National Security Alliance.
As the holiday shopping bustle approaches, don't just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important!
At the Privacy Identity Innovation conference last week, Metanautix's Jim Adler proposed that, while transparency can be a good "disinfectant" for companies to adopt, "disinfectants sting." Adopting transparency is "meant to hurt a little." It’s a smart observation, and it’s worth exploring from both sides. Why does transparency sting, and is it worth the short-term pain?
When you visit a webpage, loads of information is traded back and forth between your browser and the web server. This transfer was designed to make sure that the server has all the information it needs to properly display the page you're looking at. But the architecture of the web means that all of this information is available on every single call. Learn more about what your browser communicates when you surf the web.
Finding the right balance when it comes to social media sharing isn't an easy feat, but there are several things you can do to protect your personal information on social media.
Step one for talking privacy is getting our vocabulary in order. So let's start with the basics and move on to several recent terms of endearment in the data management discussion.
It can't be ignored. Cybercrime is on the rise. Learn more about the layers of cybercrime and how you can help fight online threats.
Running a small business is risky, but ignoring the cybersecurity of the business is even riskier. With so much at stake, it behooves a small business owner to guard the company's assets as much as possible.
Smaller businesses can do much to minimize their cyber threat risks. Learn the steps SMBs can take to lower their risks of being targeted by cybercriminals.
Guest blogger Katie Hurst discusses how National Cyber Security Awareness Month (NCSAM) Champion organization OpenSesame is celebrating NCSAM and staying safe online every day.
Through simple behavioral and technological changes, individuals can greatly reduce their exposure to cyber threats. This National Cyber Security Awareness Month, our guest blogger from RoboForm is celebrating by providing online safety tools and tips.
STOP. THINK. CONNECT., which urges us to stop and think before we go online, is the perfect theme for NCSA’s cybersecurity education and awareness program, and the good news is that a little thinking goes a long way in keeping you safe.
While Internet security is a pervasive issue for all industries, schools deserve some extra attention. Along with the increased need for bandwidth to access online courses and tools, students and teachers are all too quick to share personal information through the internet. Schools need to carefully plan their network security in much the same way they plan their physical security. There has to be a good balance between access and security.
The new school year is in full swing and National Cyber Security Awareness Month is around the corner. What better time to talk to the kids in your life about online safety. Many of our readers are doing just that — and using Net Cetera: Chatting with Kids About Being Online as the basis for the conversation.
The growth of the Internet has introduced us to a much easier and convenient way of life. The Web has become our source of information, facilitates easier shopping and media consumption and allows us to connect with people on social media sites. Although social media sites such as Facebook, Twitter and Instagram provide convenient, beneficial features, it is important to understand their security and privacy implications and be smart about what you post on social media.
In a phishing scam, a cybercriminal sends an email that attempts to fraudulently acquire the recipient’s personal information. Learn more about phishing and what you can do about email vulnerabilities.
When it comes to tightening your Internet and computer privacy security, one crucial step you can take is to learn more about how your online activities leave confidential traces behind on your hard drive.
Why are tablet owners the top target of identity thieves? One reason is the unique design features of tablets make them perfect for sharing.
Data privacy is something that can be built into systems, taught to users of systems and valued by good old fashioned entrepreneurial techniques. All it takes is a little know how, creativity and the desire to build respect for data about people into technical solutions and organizations.
Cloud computing is used by virtually every organization because it's a convenient way to use applications and share data in a web-based environment. But there are also risks to consider, says Private WiFi's Jared Howe.
Private WiFi's Jillian Ryan delves into the data from its latest study by Harris Poll identifying WiFi users, practices and risks, and shares it all in a new infographic. A version of this blog appeared on Private WiFi's blog on April 3.
By now, we hope you know that hackers can steal your sensitive information any time you connect to a public WiFi network. But what you may not know is how fast they can do it. That's what WAFB 9 demonstrated in a hacking experiment on a university hotspot in Baton Rouge, Louisiana. What happened should be a wakeup call for hotspot users everywhere.
Recent surveys have revealed how generations view and address online safety and security concerns differently, writes Private WiFi's Jared Howe. A version of this blog originally appeared on Private WiFi's blog on March 6, 2014.
"Smiling feels easy and natural. However, this action is quite elaborate from a structural point of view," writes Jetico CEO Michael Waksman. "So the key to making data privacy more accessible would be to use software that allows encryption to be performed easily and naturally without even thinking about it."
"To avoid accidentally selling your identity on eBay or providing access to your bank accounts in the form of a broken tablet in the trash, you need to take secure measures to wipe the data clean," writes Frank Milia of IT Asset Management Group (ITAMG). "The good news is that many of the drive manufacturers have provided secure erasure utilities built into the disks."
SpiderOak's Chip Black takes a look back at Ted Nelson's seminal 1974 works on computing and how they're relevant as ever in online privacy discussions 40 years later.
"It's the start of a new year -- a time to look at our habits with fresh eyes, make positive changes and tackle life with renewed energy and enthusiasm," writes Linnette Attai of iKeepSafe. "It's also a great time to take a look at your digital footprint, and those of your children, and see if there are changes to be made there as well."
Heather M. Federman, Policy & Outreach Director at the Online Trust Alliance, provides her New Year "data resolutions" for businesses to open 2014.
Reputation.com's Leslie Hobbs covers how to create a positive personal and professional presence online. "The potential to make the Internet work for you exists," she writes. "it just requires a bit of legwork and a lot of thought."
Frances Henderson, CIPP, and Emma Fletcher, CIPP, deliver the second installment in the Council of Better Business Bureaus' series, "Privacy Basics for the Savvy Small Business", by discussing how companies should approach reviewing and updating their privacy policies.
"In the Digital Age, one way a victim can start to feel empowered again is through controlling her privacy," writes Reputation.com's Leslie Hobbs, who offers some guidance that anyone can use to guard their personal information.
In her second entry in the Data Privacy Day guest blog series, iKeepSafe's Linnette Attai expands on the conversation around data security and schools with a new paper that outlines concerns and serves as a guide for dialogue on assessing and implementing systems and practices.
Privacy specialist Andrew McDevitt of AvePoint explains why the global privacy community should rally around Data Privacy Day this January 28: to heighten public awareness of privacy concerns and promote strong data stewardship practices among individuals and businesses.
Private Wifi and the Identity Theft Resource Center have released a new infographic, "The Ultimate Guide to Staying Safe on Public Wifi", which offers insight into about the overall consumer privacy beliefs in WiFi hotspots.
David Dahl, director of development for the Crypton.io project at data encryption and storage service provider SpiderOak, provides the strategies he follows at home to maintain greater control over his online privacy.
"Smart companies - the ones that are looking not just one quarter from now or one year from now - are anticipating the rise of the New Privacy," writes Reputation.com's Leslie Hobbs. "So what should companies do to start down that path?"
Linnette Attai from iKeepSafe delves into the issue of how schools protect the student data they collect, and a new iKeepsafe resource, "Data Privacy and Schools: Outlining the Conversation." The paper is a launching pad for dialogue about how schools collect and manage student data, with the ultimate aim of easing the development of successful and compliant partnerships with third-party technology partners.
"Sharing your personal data can very much color your reputation, especially online," says Leslie Hobbs of Reputation.com. "In fact, the two often go hand-in-hand so take a judicious approach to revealing your personal details. Here's how."
If you could ask a hacker how to protect yourself from his or her intrusions into your devices and data, what would you ask? McAfee's Taylor Tompkins details her first encounter with a white-hat hacker.
"Privacy advocates, regulators and others raise worthwhile concerns about the growing Internet of Things," writes guest blogger Jason Meyer. "What happens when the data these devices capture about us misrepresents us or include errors that skew our profiles?"
Tom Flynn, Vice President, Identity and Access Security, at Gemalto North America shares a new infographic naming the top five threats facing eBanking in the United States, but most importantly, the four tips the public should follow to thwart them.
Armor for Android security researcher James Green breaks down the mobile threat landscape to Android OS and importance of updates to protect your device from infection.
Karen Clark of SecurityChoice.com looks at how pop culture, and one summer movie in particular, opens the door to talking to pre-teens and teens about safe online behavior.
McAfee blogger Taylor Tompkins looks at how to adjust the settings for downloading apps on some of today's most popular smartphones.
Tech consultant Geoff Kenyon offers five ways to protect your personal information when connecting to public Wi-Fi networks, including a digital security quiz to evaluate how well you safeguard your identity.
Philip Alexander, founder of Data Privacy Network, offers advice on how you can protect your identity and personal information while on summer vacation.
John Skorick, Founder and CEO of personal privacy company MyAKA.com, LLC, discusses how your mobile phone number can be an access point to invading your privacy, and methods to securing both.
Tuesday, May 7 was Password Day, as Intel, McAfee, the Department of Homeland Security and others provided tips and advice regarding strong password creation and memorization. The following is a partial transcript edited for brevity and clarity.
Jeff Bermant, Founder and CEO of Virtual World Computing, offers a number of tools and tips to provide for safe web browsing and to protect children from victmization, online and off.
Amy Hebert, Consumer Education Specialist at the U.S. Federal Trade Commission, offers the infographic on children and mobile safety, "Keeping Up with Kids' Apps." It includes four things your kid's apps might do -- but might not tell you.
Michael Waksman, CEO of Jetico, a company that provides military-standard data protection software to the U.S. Department of Defense, offers his tips on how exactly to make your passwords 'long and strong'.
As a user, if you have never taken Facebook's impact on your privacy, reputation and security seriously, it's now time to do so.
When you work with personal data on a Windows computer, your privacy and identity are at risk. We will show you a few basic things you should keep in mind, to make sure your privacy and identity are always protected.
As businesses and organizations upgrade to the newest wireless devices, every day thousands of used mobile devices are being replaced and companies run the risk of inadvertently compromising confidential internal information contained on these devices.
Consumers today cannot avoid all risks, but there are a number of practical steps they can take to minimize the threats of viruses, credit card fraud and identity theft.
Every day, kids face a myriad of online decisions- which friend requests to accept, whether to forward time-limited and self-destructing images (have you heard of Snapchat?), whether to talk to someone online they don't know, even whether to join classmates in bullying someone.
With the rise of big data come big challenges, including how to deal with increasingly challenging privacy issues. To help protect information, which has become the currency of the 21st century, here are 10 resolutions for your enterprise to adopt in 2013.
Data Privacy Day is approaching, and as part of our awareness campaign, we wanted to review some of the best practices for safe password selection and management. It is surprising but true that even in today’s security-conscious environment, the word “password” and the sequence “123456” remain some of the most common passwords!
Getting a backup can be a hard thing to do because you don't know where to start. But don't give up just yet!
As increasing amounts of personal data are held on small, mobile devices, the risk of having that data stolen is also increasing.
Protection and separation of personal and public data in transit, in storage and at rest should not require extensive education and behavioral modification.
Symantec's mission to inspire confidence in a connected world requires that we ensure both our own operations and those of our customers are safe and secure. As the leading global information security company, this is not an easy task.
Teachers and parents need to commit to protecting their kids’ smartphones and teaching them how to use them safely. These 5 tips will help parents, teachers and kids work together to use the classroom as a place to learn how to take advantage of mobile opportunities while preventing the risks.
While the primary concern is always being able to provide shelter and food for you and your loved ones during severe weather, it is also important to have a plan in place for when your technology devices stop working.
In addition to supporting this National Cyber Security Alliance campaign and showing our commitment to cybersecurity through our involvement with the Champions program, miiCard is using this month to remind our members how to keep safe in their different online activities from shopping, social and dating to banking.
Looking past how cell-phone crazy this generation of kids has become, one question still remains – when can your child handle a mobile phone and the responsibilities that come with owning a phone?
We store our email and social accounts, access to mobile banking, photos, contacts and more, on our smartphones – so protecting it is more important than ever!
Airports, restaurants, coffee shops, businesses, dentists, libraries and even public parks offer public access to Wi-Fi for free. But surfing unsecured hotspots can open your data pipeline to some very unsavory characters.
Cyber Tours engage all segments of the community – from individuals and non-profit organizations to government entities and businesses- in cybersecurity events and activities.
A typical child in the 21st century is practically raised on technology.
In today's hyper-connected society, it seems that everyone knows just about everything about everyone. The amount of personal information we share online is staggering.
When you work with sensitive data, no matter what field you're in, regular cyber security checks are a must. Practicing routine 'cyber hygiene' will help protect against spillage or loss of your sensitive data.
We recently featured a blog post about the importance of setting bank alerts to prevent identity theft. Often times, the most convenient option for consumers is mobile alerts, which sends a text message to the account holder when their account is charged.
The Multi-State Information Sharing and Analysis Center (MS-ISAC) has launched a national Cyber Security Pledge campaign to encourage citizens to declare their commitment to using good practices for staying safe on the Internet.
Millions of dollars are spent each year trying to protect business and government assets and networks from cyber attacks.
Now that this unusually hot summer is coming to a close, you may be going back to school with a new computer, or you may be the parent of such a student. No doubt you know that you should install a good antivirus program. What more do you need to know? Ever heard of rogue antivirus? If you use a PC, you are particularly vulnerable to this pernicious attack.
Over the last year, a trend has emerged in these complaints: consumers are being increasingly victimized by online businesses that aggressively market their services as one thing but bury in the fine print their actual services, which are far less desirable.
Reputable software publishers want you to use their software and recommend it to other people. This is why they spend money creating a quality product with good technical support.
Whether you are traveling for work or pleasure, the last thing you want to think about is having your identity stolen.
There are steps that we can take to help prevent things like cyberbullying on social networking sites.
While finding a job today is hard, job-related scams and schemes seem to be all around us. To prevent job seekers from going through the pain of dealing with some of the more common online job scams, the SiteJabber community has flagged some common types of sites that are best avoided.
Being a victim of fraud can be an overwhelming experience for anyone. Not only do you have to worry about the financial implications of the fraud, many people feel embarrassed for having fallen victim.