Guest Author

Jul 25, 2017 7:08am
NIST’s Trusted Identities Group works to improve online identity for individuals and organizations by encouraging government and commercial adoption of privacy-enhancing, secure, interoperable and easy-to-use identity solutions.
Jul 24, 2017 9:45am
Here are a few insights about each generation's technology use and tips on how anyone can improve their online security.
Jul 20, 2017 5:37am
Before we can move toward fixing the cybersecurity knowledge gap, we need to get a grip on the stats. The Pew Research Center did just that for its survey released in March, What the Public Knows About Cybersecurity.
Jul 19, 2017 5:25am
Today’s cars are complex machines comprised of tens of thousands of interconnected parts. Information is used to help connected cars function, but is the data utilized for anything else? And who has access to it?
Jul 11, 2017 11:38am
When you think of financial planning, you probably think of creating a budget, investing money and saving for retirement. Those are all essential parts of planning and creating financial stability; however, protecting yourself from fraud is also crucial. You should know how and where fraud can occur, what signs to watch for and what you can do if it happens to you.
Jun 30, 2017 5:53am
Hopefully, medical identity theft never happens to you, but here are some medical identity theft detection and prevention tips – just in case.
Jun 29, 2017 6:42am
Learn about driverless vehicle technology and the potential cyber threats associated with these new cars.
Jun 22, 2017 5:44am
When it comes to supporting our youth and their online activity, our guest blogger at Hueya offers several key talking points – each rooted in the belief that families thrive when everyone is communicating openly, honestly and with shared respect for one another’s experience.
Jun 16, 2017 5:34am
Connected cars are growing in prevalence and popularity – but what data are they collecting, sharing and using and why? Learn more.
Jun 15, 2017 5:19am
Citrix ShareFile recently created an infographic that discusses the simple tricks hackers use to access your email accounts and how to avoid becoming a victim.
Jun 13, 2017 10:20am
All of us make security decisions every day. Information security is not just the responsibility of your organization’s IT department. Rather, information security is everyone’s responsibility.
Jun 12, 2017 6:31am
Safety for ecommerce brands is essential. And it’s not just about the nuts and bolts stuff – ecommerce security impacts customer experience and brand longevity, and it reverberates long after a security scare has been addressed.
May 23, 2017 5:59am
Cybercriminals’ hacking techniques are constantly evolving, which means if you’re running a business, it is absolutely crucial to use up-to-date defense measures to combat hacking activities. Let’s take a look at some of the cybersecurity measures that every business should be taking in 2017.
May 22, 2017 6:22am
Businesses are worried about ransomware – and rightfully so. Last year, 70 percent of companies targeted by ransomware attacks paid rather than risking data loss, with 50 percent of these payments topping $10,000. Take an inside look at tech's biggest threat.
May 16, 2017 8:35am
Distributed denial of service (DDoS) attacks have become some of the most pervasive threats to websites and businesses on the internet today.
May 8, 2017 11:31am
No specific hacker’s tools or resources are mentioned here for obvious reasons, but by taking the mystery out of what is essentially a simple process, the business owner can understand what they are up against and why trusting the big software security firms – or even investing in outsourced IT support – is a wise idea.
May 1, 2017 10:08am
Here in the U.S., we are celebrating National Small Business Week (NSBW), April 30 – May 6. Learn about ESET's new research on cybersecurity training in the workplace and how you can train your employees for free.
Apr 18, 2017 7:47am
Even if you swear off all smart home technology, you probably still have everyday devices in your home that are susceptible to hacking. Learn about devices to look out for and how to protect them.
Apr 5, 2017 7:20am
“A More Perfect Internet: Digital Incivility, Cyber-Violence and Fake News” was the second program in a series led by the George Washington University Law School's Global Internet Freedom and Human Rights Project. The event brought together practitioners, academics and student-experts to identify, address and explore ways to combat online pitfalls like cyber-violence, hoaxes and misinformation.
Apr 4, 2017 6:44am
Fortunately, there are many ways to protect your home whilst smart home security protocols catch up with the market. Here are some simple but effective ways to protect your home, family and devices.
Apr 3, 2017 6:23am
In credit card skimming, a cybercriminal uses a malicious electronic device which ‘skims’ through your credit card data once the magnetic strip of your card is in contact with it and steals information from it in order to take control of your account. Learn basic safety measures that can help you avoid becoming a victim.
Mar 24, 2017 7:13am
Safeguarding against a data breach – and preparing for one – is something small business owners really need to have on their radar. The good news is that there are some effective, if not infallible, defenses small business owners can easily – and inexpensively – implement.
Mar 23, 2017 5:35am
Phishing emails can harm businesses whose identities are spoofed. Don’t want that to happen to your business? Read the new Staff Perspective from the Federal Trade Commission, "Businesses Can Help Stop Phishing and Protect their Brands Using Email Authentication."
Mar 9, 2017 11:32am
The high stakes of cybersecurity demand a strategic, proactive approach to defense rather than reactive responses commonly seen. NCSA board member Anthony Grieco, senior director and trust strategy officer of Cisco’s Security and Trust Organization, shares three elements necessary for a comprehensive cyber strategy.
Mar 7, 2017 5:25am
Regardless of the fact that payment card industry (PCI) compliance standards have been around since 2006, there remains quite a bit of misunderstanding and confusion about what it means to be PCI compliant and why it matters for the protection of your company and your customers. Here are some frequently asked questions about PCI compliance.
Mar 3, 2017 5:58am
We must protect our children until we teach them the basics of online security. Here are some tools that can help you make the internet a safer place for your kids.
Mar 1, 2017 6:41am
Before you add a device to your home network, take into account these tips so that you can rest easy knowing your smart home is more secure.
Feb 13, 2017 5:29am
And while the shortfall of talent is growing, the percentage of women in information security is shrinking. But bad news is not the whole story, nor is it a fixed destination. Interacting with the people who are just coming into this industry has been a tremendous source of hope and inspiration for guest blogger Lysa Myers, security researcher at ESET.
Feb 2, 2017 6:00am
The theme of Data Privacy Day is “Respecting Privacy, Safeguarding Data, and Enabling Trust.” Despite the day being over, it’s still important to be aware of how you can protect your personal information and manage your privacy year-round.
Jan 31, 2017 8:14am
Keeping hackers at bay requires due diligence. Here are a few best practices from the PCI Security Standards Council to help you keep your e-commerce site secure.
Jan 27, 2017 7:18am
At Mozilla, every day is Data Privacy Day. Check out guest blogger Denelle Dixon-Thayer's tips for protecting your personal information.
Jan 24, 2017 6:13am
Data Privacy Day is January 28! Since this particular holiday comes so early in the year, it’s a great opportunity to make some changes in the way you manage your personal data. Here are 17 things you can do to put your best privacy foot forward for 2017.
Jan 23, 2017 7:24am
We have seen a vast transformation in our lives as a result of technology. Over time, technology has become more integrated into our homes, at work and on the road.
Jan 23, 2017 7:02am
Personal information, particularly health care information, is being exposed in more places, through more “things” and to more people every day, which is creating new risks for people, businesses, health care organizations, governments and society as a whole. People all around the world are more concerned than ever about their privacy and the security of the personal information they share with others, with good reason.
Jan 23, 2017 6:41am
As everyone probably knows by now, “Pokémon Go” encourages players to interact with their natural environment by using realistic maps of their surroundings as part of the game. Our guest bloggers at Intel Corporation discuss the privacy and safety implications of this technology and where it might lead in the future.
Jan 20, 2017 8:35am
In making public an online archive of data breach notifications affecting Massachusetts residents from 2007 to 2016, that state may have taken the first step to make America more cybersecure. Guest blogger Adam Levin argues for a national database, and other consumer-first approaches to the identity theft pandemic.
Jan 20, 2017 3:57am
For security, privacy, identity and digital transformation professionals, the occasion of Data Privacy Day is perfect for pondering the big issues, like: Has anything actually changed since last year?
Jan 19, 2017 7:07am
EDUCAUSE shares several ideas to help you ignite your brainstorming about campus activities on Data Privacy Day (or during Data Privacy Month). These ideas are meant to be suitable for all higher education community members (e.g., students, faculty, and staff).
Jan 19, 2017 7:00am
The Federal Trade Commission is hosting a prize competition called the Internet of Things Home Inspector Challenge. The FTC is asking people to come up with a technical solution to guard against security vulnerabilities in software on smart devices connected to their homes.
Jan 18, 2017 6:39am
A new year usually means setting a goal to remodel that extra bedroom, cut out caffeine or finally hit the gym. This year, have an even greater goal in mind: the improvement of your privacy program. Here are some great ways to start you on your way to achieving just that.
Dec 7, 2016 6:18am
Since the turn of the century, the state of cyberwarfare and cybercrime has grown by leaps and bounds. The concepts of advanced threats, sponsored nation state organizations and highly motivated criminal organizations are relatively new, but the use of the internet and the cyber domain as a means of attack has been well established for the past 15 to even 30 years.
Dec 5, 2016 11:48am
The holiday season is underway, and digital devices (and their accessories) are flying off the shelves. Which bodes the question: How do you introduce your child to their new device?
Dec 5, 2016 5:44am
If you are involved in any type of payments, you’ve probably heard of “PCI Requirements,” as published by the Payment Card Industry Security Standards Council (PCI SSC). UL along with acquisitions now under the UL banner have been working with the Payment Card Industry (PCI) since its inception – we were there when the first companies were accredited to perform PCI testing. T
Dec 1, 2016 6:10am
Just like death and taxes, the DDoS threat has reached the level of “unavoidable fact” for the day-to-day of digital businesses and operators. As an industry, the tech sector needs to take this challenge very seriously.
Nov 30, 2016 11:09am
With the shopping season well underway, hackers are cooking up schemes to secure their own holiday cheer. Don’t get too caught up in the holiday frenzy and ignore these basic security guidelines while you shop online.
Nov 29, 2016 4:39am
Guest author Chad Fisher addresses the security concerns associated with online shopping this season by discussing a baby boomer's shopping habits, concerns and safety precautions.
Nov 23, 2016 6:21am
Do these 5 things to protect your customers’ data before Small Business Saturday.
Nov 7, 2016 5:35am
Hacking has become not just a worry but a constant, tangible threat to people, companies and governments. But one area of hacking that had not hit the public consciousness until very recently is the very real potential of car hacking.
Nov 2, 2016 4:32am
The 2016 U.S. presidential election is a global phenomenon, but candidates aren’t the only ones vying to connect with the people. Behind the scenes, stealthy cybercriminals are immersing themselves in the political banter, gathering information and intel to drive their own agendas.
Oct 31, 2016 6:17am
As the lines between the human and technology continue to blur, we are impacted by a growing ecosystem of third parties – many of whom we do not even realize are touching us. This third-party ecosystem offers both an opportunity and risk to the cybersecurity of critical infrastructure.
Oct 28, 2016 6:49am
The framework provided by the Center for Media Literacy presents educators and students with a way for understanding how systematic companies are with obtaining information and how we as consumers need to be responsible participants in this ongoing dynamic. The five key concepts and questions of authorship, format, audience, content and purpose are gateways for a broader discussion on mediated environments.
Oct 28, 2016 6:40am
“Apptitude” isn’t just about being able to use technology; it’s also about knowing how to use it responsibly.
Oct 26, 2016 6:30am
As customers balance the increasing need to use connected devices with the risks of losing touch with where their personal information is going, they will have a harder and harder time determining where to draw the line between protection and enablement of our technology-driven, day-to-day lives. It's a company's responsibility to protect customer information with adequate security and privacy measures.
Oct 25, 2016 6:36am
The proliferation of connected devices is staggering. As the use of these connected devices in our everyday lives continues to increase, it’s important that we all understand the potential security risks associated with our connected lives and how to better protect ourselves and our families against these potential threats.
Oct 25, 2016 6:25am
With predictions putting the number of connected devices somewhere between 28 billion to more than 50 billion by 2020, now is the time to educate and eradicate security issues.
Oct 21, 2016 6:46am
Do you think an abusive partner or ex is monitoring you through your phone? They might be using stalking apps (spyware) that secretly track your devices. Here’s information about what stalking apps are, how to tell if they’re on your device, and what to do if they are.
Oct 19, 2016 7:28am
To build a long-term awareness program that effectively manages human risk, you need a plan. However, many organizations are not sure where to start. Fortunately, it’s a lot easier than you think – all you need to do is answer three deceptively simple questions: Who, What and How.
Oct 17, 2016 5:39am
If you haven’t experienced a tech support scam yet, chances are you know someone who has. As part of National Cyber Security Awareness Month, Microsoft has released the results of a new global survey revealing 2 out of 3 people have experienced a tech support scam in the last 12 months.
Oct 14, 2016 5:45am
Employers worldwide need today’s youth to become the seasoned cyber defenders of tomorrow, and that is why Raytheon and the National Cyber Security Alliance commissioned for the fourth straight year a survey of young adults ages 18 to 26 in 12 countries about all things cybersecurity.
Oct 14, 2016 5:38am
Are you an executive or senior manager in your organization? If so, you bear many responsibilities, not the least of which is your obligation to ensure that your company is in compliance with the regulations governing the protection of health and financial information and your duty to protect the company’s assets.
Oct 12, 2016 5:37am
Cyber insurance, a new trend in the information security sector, can offer an additional layer of protection that may fill the gaps where traditional business insurance policies may falter.
Oct 12, 2016 5:32am
If best practices and rules are letting you down… don’t panic! The right solution might be easier than you think.
Oct 11, 2016 6:05am
Cybersecurity must be a part of everyone’s job. NCSA board member Anthony Grieco discusses the way Cisco has approached cybersecurity and developing a holistic cybersecurity culture.
Oct 7, 2016 7:32am
With the number of mobile devices like smartphones, laptops and tablets readily available, it’s become increasingly popular to carry out day-to-day banking on the go. But have you ever thought about the risks associated with accessing your accounts on the move and how to protect yourself?
Oct 5, 2016 6:46am
With more than 2 million lucrative cybersecurity jobs unfilled today — and even more considering other “cyber”-related careers — we owe it to our country’s student population to make them aware of the
Oct 4, 2016 5:16am
Since 2004, October has been recognized as National Cyber Security Awareness Month – a time when government, private and nonprofit organizations and individuals come together to enhance protection of Americans’ digital lives. Almost every aspect of our daily activities now involves the internet. Today, every citizen should know how to secure their information.
Sep 30, 2016 8:27am
Who doesn’t love larger-than-life characters? Celebrities fascinate us. From laughter to tears, their performances stay in our memories, sometimes even in the form of hilarious internet memes. Unfortunately, however, all this attention also piques the interest of another group: cybercriminals.
Sep 21, 2016 7:17am
Customers appreciate a company who puts effort into keeping them safe. Customers will be more likely to frequent a business where they know they can securely transact. That is why it is vital for retailers to treat data security seriously.
Sep 8, 2016 6:49am
The Consumer Federation of America (CFA) and its Identity Theft Service Best Practices Working Group, which include consumer advocates and identity theft service providers, have created a new resource – “My company’s had a data breach, now what? 7 questions to ask when considering identity theft services.”
Sep 1, 2016 7:38am
Ransomware is a serious problem. That's why the Federal Trade Commission is holding a ransomware event on Sept. 7 in Washington, D.C.
Aug 29, 2016 7:19am
The phrase “ethical hacking” was first used in 1995, but the concept has been around for a lot longer. Many would argue that ethical hacking is the goal of the majority of hackers, but the current media perception is that hackers are criminals. To understand the truth a little better we need to look at the history of ethical hacking.
Aug 25, 2016 7:45am
Pokémon Go, a virtual reality mobile app, is catching on with “moveset” speed. Smartphone users are meeting up at PokéStops and “gyms” to battle it out and staying up until the wee hours to capture the rare ones. As with all mobile apps, there are risks to consider when using Pokémon Go. Here are some tips on how to minimize them.
Aug 24, 2016 5:48am
Nearly four in 10 American teens report that someone was mean or cruel to them in the digital world in the last year, and those negative comments most often stemmed from something the teens said or did, or were about their appearance, results of a new Microsoft study show.
Jul 29, 2016 6:53am
If you’re a bride or groom, you’ve probably got a lot on your mind — and on your to-do list — before saying “I do.” The Federal Trade Commission is here to help with some tips for managing all of your online planning activities and accounts more safely and securely before and during the big day.
Jun 28, 2016 6:32am
No matter how familiar American youth are with the Internet, there’s one aspect of digital living that might have escaped their expertise: privacy. To help empower the next generation to think critically about how the use the Web, ExpressVPN has created the Future of Privacy Scholarship.
Jun 20, 2016 6:53am
An organization can eliminate or at least reduce its cybersecurity blind spot by using a formal, structured process for engaging technology solution vendors.
Jun 15, 2016 12:26pm
To help you recognize and avoid imposter scams, the Federal Trade Commission has four new videos on IRS imposters, tech support schemers, online dating con artists and “grandkid” scammers.
Jun 13, 2016 6:23am
In today’s technological world, hacking has become a major concern for businesses, governments and other organizations. This is why it’s essential for you to protect your network from hackers and the malicious programs they create.
Jun 9, 2016 5:49am
Have you noticed your child glued to his or her smartphone? Do you ever wonder what they could possibly be spending so much time on? The short answer: apps. Here’s what parents need to know.
Jun 7, 2016 7:25am
Did you know that your website's security can impact its search engine optimization (SEO)? Here are three ways to protect and maintain your SEO using web security.
May 25, 2016 7:36am
Anyone can be a victim of hacking, and unfortunately there is no guaranteed way to prevent it. However, following safety best practices and implementing security protocols can help keep your children and their information safe from online predators.
May 17, 2016 5:59am
Tokenization is one critical technology that has enhanced payment security for merchants, customers and financial institutions. Here’s critical information to know about tokenization and how it can minimize your risk of a security breach.
May 6, 2016 5:24am
The National Cyber Security Alliance consulted its privacy advisory committee about the need for more research on privacy. Our committee members identified two youth-focused topics that deserve more attention – privacy education in schools and the privacy implications of new connected toys.
May 5, 2016 7:25am
How often have you heard that you should change your passwords regularly, like every 30, 60 or 90 days? Maybe at least once every six months? Well, here’s some good news for you: doing so doesn't improve security.
May 5, 2016 7:09am
Every time your organization wants to add a new behavior, first ask why.
May 2, 2016 6:10am
During the week of May 1-6, the U.S. Small Business Administration (SBA) will recognize and honor the critical and life-altering contributions of America’s mom and pop shops, manufacturing enterprises, Main Street retailers and entrepreneurs during National Small Business Week.
Apr 19, 2016 7:40am
It's important to take safety precautions when using e-commerce websites so that you can shop online with confidence.
Apr 12, 2016 8:05am
There are plenty of good reasons to get your high school diploma as an adult. But before you start looking into your options, make sure you know how to spot a diploma scam.
Apr 5, 2016 8:03am
When we think of cybercrime, we often think of strangers who we will never meet online, identity theft and financial fraud. What we may not typically consider is that survivors of sexual assault, domestic violence, stalking, elder abuse and other violent crimes may also be vulnerable to stolen personal information used to conduct cybercrime.
Apr 4, 2016 10:02am
Kids growing up today are exposed to computers and electronic devices at a very early age. They see their parents constantly on their mobile devices and they want to mimic that behavior. Harnessing your child's love of electronics and turning it into a positive influence is the goal of almost every parent.
Mar 29, 2016 7:44am
A virtual private network (VPN) is a technology that improves your online security and privacy.
Feb 1, 2016 6:07am
Recovering from identity theft often takes time and persistence. That's why a recent announcement from the Federal Trade Commission (FTC) is a big deal: New features at make it easier to report and recover from identity theft.
Jan 27, 2016 7:48am
This year, the theme for Data Privacy Day focuses on respecting privacy, protecting data and enabling trust. Today's global company is by necessity a digitized company. As a result, challenges around data privacy, security and trust must be addressed by everyone: companies, vendors, partners and consumers alike.
Jan 25, 2016 9:22am
It’s tax season, and you know what that mean:: identity thieves who want to steal your tax refund are at work. Find out how to stop them during Tax Identity Theft Awareness Week, January 25-29.
Jan 21, 2016 8:50am
Data Privacy Day – which arrives in just a week – is a day designed to raise awareness and promote best practices for privacy and data protection. It is a day that looks to the future and recognizes that we can and should do better as an industry. It reminds companies that they need to focus on the importance of having the trust of users.
Jan 19, 2016 9:28am
While Data Privacy Day (DPD) is focused on raising awareness among consumers, it is also an opportunity to raise privacy awareness within any organization. Here are five easy activities your organization can undertake to support privacy awareness this DPD or anytime throughout the year.
Jan 14, 2016 10:52am
Information about you, such as your location or your purchase or search history, has value, just like money. It's important to be thoughtful about who gets this information and how it's collected through apps and websites.
Jan 12, 2016 10:09am
Mozilla is privileged to work with an amazing team of volunteers around the world who dedicate their time and energy to Internet issues, including a small team in India that decided to dream big this year for International Data Privacy Day.
Jan 7, 2016 10:50am
Companies and organizations all over the globe are increasingly hiring privacy professionals to help them make the tough decisions about what information to collect, when and how to store and delete it, which databases to combine and what big data to mine.
Jan 5, 2016 7:06am
Accessing public WiFi on any device is a lot less safe than you may realize. Data Privacy Day is a good time to reassess the ways in which our desire to stay constantly connected is putting ourselves at risk.
Dec 18, 2015 6:46am
There are several different forms of encryption, and each type is built to solve a specific problem and balance what information security professionals refer to as the security rather than the usability tradeoff.
Dec 17, 2015 6:37am
Cybercriminals have have gravitated toward exploiting any vulnerabilities found on websites; however, there are ways that you can help protect yourself from data leakage attempts. Here are four common types of data attacks and how to mitigate them.
Dec 4, 2015 8:12am
For all their virtual achievements, gamers aren't exactly feted for their real-life usefulness; however, the gaming community is proving supremely valuable in the world of technology. The lack of cybersecurity talent to protect us is a real concern, and some are turning to video games to plug the skills gap.
Dec 3, 2015 8:35am
New research from TRUSTe sheds light on how aware companies are of the proposed EU General Data Protection Regulation (GDPR) and the preparations they're making.
Nov 20, 2015 6:55am
Increase your awareness of the most common cybersecurity threats in the workplace, and you will actively help put an end to the basic tricks hackers have been successfully using for years.
Nov 18, 2015 9:29am
From the "like" you gave your friends on their politically charged social media posts to the location you shared on apps, everything that you voluntarily share online is fair game for data mining. Your personal information has value, just like money.
Nov 13, 2015 7:29am
Just as one man's trash can be another man's treasure, one person's creepy can be another person's helpful. As Data Privacy Day gets closer, it's a good time to brush up on your privacy know-how and the importance of protecting personal information.
Nov 2, 2015 6:42am
Many be unaware of the importance of privacy and protecting your personal information in helping to avoid having your identity stolen. Our guest blogger shares a few tips for protecting yourself from hackers and cybercriminals.
Oct 30, 2015 10:00am
Connected devices are fast becoming a dime a dozen. From cars to cameras to watches, the Internet of Things (IoT) presents amazing new opportunities while introducing additional security challenges. Ultimately, proper attention to security is one of the best ways an enterprise can best serve its customers.
Oct 30, 2015 9:24am
Kids need to understand both the risks and benefits of cyber technology, so that they can build it far beyond our imagination in the future, just like how the Internet's founders built the foundation for what we have now.
Oct 30, 2015 9:05am
Today cybersecurity is one of the most important fields in technology and yet, despite its importance, many women and professionals of color are largely unaware that this career opportunity exists.
Oct 30, 2015 8:10am
62 percent of organizations worldwide need more cybersecurity professionals at a time when the global cybersecurity talent gap is widening. Employers are looking towards young adults, a generation raised behind a keyboard, as a prime piece of the solution.
Oct 29, 2015 10:02am
Security training should foster not only the desire but also the ability to practice safe computing. Training experiences should reach beyond awareness to help users develop real skills that will help them to be cyber-safe.
Oct 29, 2015 9:44am
Hackers will always try to find security vulnerabilities within our products, and if they find a way in, they can spread malware, take control of your systems and steal your confidential and valuable data. With your organization and customer loyalty at risk, it's vital you take all the steps you can to secure your systems.
Oct 28, 2015 6:08am
Technology is not the only critical element of a trusted security process; a holistic security conversation includes people and processes as well.
Oct 28, 2015 5:57am
Superheroes fuel our fantasies. But what if they really did exist? And what if you could become one yourself? Our guest blogger discusses a new superhero, Cyber Avenger, and how you can help protect the Internet.
Oct 27, 2015 10:38am
The sheer number of white papers, conferences and PowerPoint decks touting new tools and blinking lights causes many organizations to fixate on these seemingly easy fixes to cyber breaches while ignoring the most fundamental aspect of their enterprise security. Technology alone can't defend your network: it's all about the people.
Oct 27, 2015 9:25am
Cybercrime is an increasingly serious issue both in the United States and globally; the estimated annual cost of global cybercrime has reached $100 billion. Our guest blogger discusses the history of cybercrime, recent cyber breaches and the need for more cybersecurity professionals.
Oct 23, 2015 9:14am
Cybersecurity isn't just about protecting the IT infrastructure of a company. It's about protecting the business itself: the information, processes, procedures and day-to-day activities that define a company.
Oct 23, 2015 8:56am
By now, it's common knowledge that the interconnectedness that stems from the Internet of Things (IoT) brings with it a multitude of benefits. But like most things in life, the benefits IoT provides come with their own set of vulnerabilities.
Oct 22, 2015 8:33am
Do you know where all the data collected about your behaviors is being stored? Do you know what it’s being used for? Chances are, you don't. And that means that existing issues of privacy and security are only going to get more complex in the IoT era.
Oct 21, 2015 9:43am
Whether it's computer-equipped safety goggles for hands-free warehouse work, a fitness band to encourage employee activity and curtail healthcare costs or a shipping container with a temperature sensor to keep food fresh, connected devices are shifting from "gadgets" to go-to productivity tools for more effective businesses and workforces. When it comes to securing the varied connected devices that make up the Internet of Things (IoT), however, it can get a bit hairy.
Oct 20, 2015 8:08am
In the same way you would wash your hands after contact with someone sick, there are ways to stay virus-free in the social media world.
Oct 20, 2015 7:10am
The growing Internet of Things has the potential to make our lives more efficient and convenient and help us gain valuable insights. But that's only if the manufacturers behind these innovations take security (and privacy) seriously.
Oct 16, 2015 2:05pm
If you've ever had your information exposed in a data breach, you know it can be stressful. But what happens if your child’s personal information is exposed, too?
Oct 16, 2015 6:04am
Forming good mobile security habits now can protect you from hackers and from expensive or dangerous situations if the wrong person gets ahold of your phone. Follow these steps to keep your phone and your personal information safe.
Oct 16, 2015 5:53am
Online security is a shared responsibility, but how much responsibility is the typical American household taking for its online safety? ESET thought National Cyber Security Awareness Month would be a good time to pose that question and used a survey to find answers, some of which may surprise you.
Oct 15, 2015 7:44am
Each year, the Identity Theft Resource Center (ITRC) tracks the consumer calls that come into its 24-hour toll-free call center to build a clear picture of the threats to the public's identity safety. The annual report, called the Aftermath report, follows up with identity theft victims who are willing to talk about how identity theft has impacted their lives and what the long-term effects may be.
Oct 14, 2015 12:05pm
We live on our smartphones, and much of our daily lives can be conducted through these computers in our pockets. It stands to reason that we should be aware of how much information these devices contain and why we need to secure them. If you want a place to start, here are three quick tips to get you on the right road to staying safe on mobile devices
Oct 14, 2015 6:53am
Kids are now bombarded with ways in which to avoid the real world and sink into the online realm, and the more time kids spend connected, the more they risk exposure to online threats, from cyberbullying to malware. Fortunately, there are ways parents can give their kids the freedom to enjoy the benefits of connected devices while ensuring they stay safe and act responsibly.
Oct 14, 2015 5:09am
When it comes to data security and the real-life impact of identity theft, public awareness is at an all-time high. But there is still great confusion and ignorance about what it is, how it happens and what can be done to avoid the pitfalls of life after a data breach or personal compromise. Here are a few steps you can take to change how you conduct your affairs going forward.
Oct 9, 2015 9:13am
Millions of websites are compromised and infected with various forms of malware every year. Our guest blogger gives you an overview and discusses tools that can help you in the event of a breach.
Oct 9, 2015 7:07am
In support of National Cyber Security Awareness Month, Praesidio Security Engineer Bill Creasey, shares five cybersecurity tips that any business can use to be safe online.
Oct 8, 2015 10:03am
Organizations need to think about the realities of today's cyber world and realize that very technologically sophisticated thieves may try to steal their information. Both hackers and trusted insiders are potential threats to an organization's sensitive information.
Oct 8, 2015 9:08am
If you're concerned about keeping your business safe online, check out these quick tips on how best to have a real impact on cybersecurity.
Oct 7, 2015 8:46am
The 2015 Cost of Data Breach study estimates that data breaches cost U.S. organizations an average of $6.5 million. Despite this, the 2015 Annual Shred-it Security Tracker Survey shows that information security is still a declining priority among American businesses. Here's what you should know.
Oct 7, 2015 8:21am
With a few security basics and ongoing vigilance, businesses can be aware and defend against cyber attacks. Our guest blogger from the Payment Card Industry Security Standards Council shares a few key tips on protecting against social engineering attacks that should be part of your business' cybersecurity culture.
Oct 6, 2015 8:52am
The bring your own device (BYOD) movement opens a proverbial can of worms when it comes to security. So how do agencies reconcile their need for security and their employees' dependency on their personal IP-based devices?
Oct 6, 2015 6:37am
How can defenders cope with this barrage of social engineering opportunities? And how can businesses afford it? Here are three considerations for network defense that can strengthen any enterprise's posture against a breach from social cyber for little to no cost, allowing you to stay social AND safe.
Oct 5, 2015 11:57am
Do your employees access their data and apps at home or on the road? Are you a small business owner who has leveraged free data storage? Do your customers log in to your website to order supplies or services?? And do you use online software services, like HR and payroll? If any of the situations above sound familiar, then in all likelihood you have a cloud-enabled service provider.
Oct 2, 2015 6:44am
Many businesses have intensified their focus on improved technology to strengthen IT security. However, machine-based security is only part of the picture. Here is how security-aware businesses can implement three considerations to better safeguard their information.
Sep 29, 2015 7:29am
If you’ve used an email provider in the past few years, you may have been asked to provide a phone number to help verify your account. As we start to conduct more and more of our everyday tasks online, like paying bills and shopping, it has become increasingly important for many web providers to verify your identity and prevent others from abusing your account. Your phone number is one of the easiest ways to verify your identity with an online service provider.
Sep 25, 2015 7:20am
There's no excuse for not taking web security seriously, especially during National Cyber Security Awareness Month (NCSAM), which officially kicks off on October 1. If you and your online business are ready to take the next step in cybersecurity, check out these five website security recommendations for any company.
Sep 22, 2015 8:10am
Are we doing all we should to educate ourselves and our children about how to be safe online? The best step in the right direction is to mark your calendar for every day in October and get ready to participate in National Cyber Security Awareness Month.
Jul 14, 2015 8:04am
Phishing scams are becoming more dangerous and effective than ever. The ZapFraud team discusses ways to protect yourself and others against these dangerous, targeted attacks.
Jul 10, 2015 5:48am
In a world filled with cyber threats, how can we stay safe when sharing information online? Here are some steps you can take to keep your personal data safe.
Jul 9, 2015 7:33am
A single click is all that's needed for an adversary to reel in your data by grasping ahold of your machine. Network defenders can overcome these adversaries and help protect their organizations, employees and consumers by keeping in mind four golden rules.
Jun 30, 2015 10:12am
Our carbon footprint impacts greatly on the environment; only, we don't realize it until we actually see the rising sea levels, melting glaciers and animals dying out. The same goes for our digital footprint: until we can see the damage we're potentially placing on our own security, we won't know where we're going wrong. With greenhouse emissions expected to be cut by at least 29 percent between now and 2020, the question is, can we do the same for cybercrime? If we all follow these simple steps, it's possible.
Jun 29, 2015 6:47am
Online payments can be made in a variety of ways, but majority of the online financial transactions are done through secured payment gateways. Secure payment gateways, as the name suggests, are application service providers for ecommerce websites that authorize various financial transactions taking place on online stores for ensuring safety for both the retailers and the online buyers. Learn more about what these gateways are and how they help protect your online transactions.
Jun 22, 2015 12:10pm
Virtual or crypto currencies like Bitcoin can be a fast way to pay online, or in person with a mobile app, but using virtual currencies comes with risk. The Federal Trade Commission shares some tips to consider before using virtual currencies as payment.
Jun 18, 2015 6:26am
Thwarting cyber attacks isn't a one-and-done deal; it demands constant vigilance, continuous risk assessment and resilience. Here are three strategies to help keep your business safe in the event of a security breach.
Jun 8, 2015 7:54am
You can help protect yourself from cybercriminals if you stay alert and use a bit of common-sense thinking when navigating the World Wide Web. Here are six important tips from for how to stay safe online this Internet Safety Month.
Jun 1, 2015 6:52am
Like apps that let you pay at stores with your phone, "peer-to-peer" payment services can be a convenient way to pay friends. But before you use one, check the app's settings for available security features.
May 12, 2015 6:54am
While mobile's role in e-commerce presents plenty of opportunities for businesses to deliver relevant, cost-efficient mobile marketing offers to consumers' mobile devices, it also requires that businesses take some precautions. Here are five tips for safer mobile payments.
Apr 17, 2015 7:00am
It is important to be mindful of what pieces of information can be traced back to us as individuals and know what can be discovered about us by performing a simple online search. By being in the know, we have the power to protect our online reputations, which subsequently protects us offline.
Mar 30, 2015 5:51am
It's possible for users to limit their risk and improve their information technology control with a few simple steps. Here are three ways to keep technology from turning on you.
Mar 25, 2015 7:10am
If you have young kids who are spending time online--and these days, most kids are--you may be looking for a way to control what they can access. Here are some basic things you can do to your router and computer to limit your kids' online activities at home and help them stay safe online.
Mar 23, 2015 7:25am
It's important to work just as hard at managing your public image on social media as you do in real life, if not even harder. This may sound daunting, but it's actually not as difficult as it sounds as long as you follow some common-sense precautions. Here are five general recommendations from for how to keep your life on social media under control.
Feb 26, 2015 7:21am
We're going to discuss some of the steps you can take to make your home network a little more secure. Nothing is 100% foolproof, but there are steps you can take - using a layered approach - that will improve your online security and reduce your chances of becoming a victim.
Feb 20, 2015 7:24am
The best way to tackle the wave of digital lawbreakers is to master the basics yourself. This quick guide to online safety will help you avoid becoming another victim in a long line of cybercrime and inspire confidence for you and your family to surf the Web safely.
Feb 18, 2015 7:12am has some tips to help you protect your laptop - and the valuable stuff on it.
Feb 10, 2015 8:21am
Valentine's Day is around the corner, and yes, romance is in the air. But the month of love also celebrates Safer Internet Day on Feb. 10. Show how much you care by sharing this short online safety Q&A with your loved one.
Feb 10, 2015 7:33am
This Safer Internet Day, learn how you can identify and avoid falling victim to phishing attacks.
Feb 6, 2015 6:44am
Almost anything we do can now be done over the Internet: pay bills, shop for appliances, go banking, apply for jobs or make appointments. But these websites with your personal information in their databases can be potential threats as well. So how can you protect your identity?
Feb 5, 2015 6:37am
Passwords have been used for thousands of years. They are still here today, though, and have proved their staying power.
Jan 30, 2015 9:03am
It may sound ridiculous at first, but a strategic deployment of the most common and visible form of personally identifiable information - the humble email address - might be enough to send a would-be identity thief packing to an easier mark.
Jan 28, 2015 6:36pm
Here are 10 ways to safeguard your information from the most common threats and vulnerabilities that put you, your family and your office at risk.
Jan 28, 2015 5:20pm
An anonymous, unnamed CEO for a popular transparency company whose mascot is a ghost is fond of saying "running a business these days would be easy - if it weren't for all the people and computers." It's a joke meant to add perspective to everyday problems - but it can also apply to just trying to comfortably exist in the "Information Age."
Jan 27, 2015 10:38am
We need to prioritize the importance of developing a comprehensive plan for data privacy and student learning - one that is thoughtful, balanced and comprehensive. We don't want to get this wrong. We can't. Too much is at stake for this and the next generation of students.
Jan 27, 2015 6:57am
It's time for a reality check: complete anonymity online is not possible. The myth distracts people from what they should really be looking for in privacy programs and services: transparency, trust, ease of use, performance and reliability.
Jan 26, 2015 7:46am
Data never dies. And data doesn't have a conscience - this immortal resource comes with significant risk. Time for a closer look.
Jan 22, 2015 8:08am
While constant connectivity has its benefits, the rise of mobile devices and the proliferation of WiFi networks can be a dangerous coupling. In fact, many WiFi hotspot users are unaware of the inherent risks that the technology poses - such as an increased risk of identity theft, hacking and compromised bank accounts.
Jan 15, 2015 9:04am
Yeah, you got a new computer. So what's next? Securely migrating to a new computer can be done in just 5 steps.
Jan 13, 2015 1:00pm
The term "Big Data" carries a lot of weight. So what should we think when we hear news reporters and insiders talk about "Big Data"? How can we manage what we contribute to its vast (and seemingly scary) collection of information?
Jan 8, 2015 10:39am
In 2014 there seemed to be a new data breach every week. In these breaches of credit card data, student information, Social Security numbers and corporate intellectual property, the personal information of many businesses' clients and employees was exposed. Here are five priorities to consider for your business as we embark on 2015.
Jan 6, 2015 11:43am
Privacy is a personal notion - we all have different ideas of what it means to properly manage information about who we are and how we behave. We've gathered a few interesting points about worldwide privacy legislation which show that how much others know about who you are can depend largely on where you are.
Dec 18, 2014 5:53am
The movie Big HIPAA 6 is about a robot that can scan humans, discovering everything from small scratches and bumps to the amount of serotonin in your body at the moment. That got me thinking about the implications to the Health Insurance Portability and Accountability Act (HIPAA) or other privacy concerns that come with this technology.
Dec 17, 2014 6:54am
It's important to educate yourself and practice the best habits to keep your data secure. Learn more about cookies and how you can protect your personal information.
Dec 16, 2014 6:53am
The beginnings of Chris "Biggie Smalls" Wallace can be traced to the streets of Bed-Stuy, Brooklyn. The neighborhood is only 9 miles away from the new data-driven Madison Avenue as the crow flies - but they're worlds apart in terms of culture. Still, Big Poppa and Big Data have more in common than you might think.
Dec 11, 2014 11:38am
The folks at chose "privacy" as their word of the year in 2013. It was a long journey to that distinction, during which it inexorably became the engine driving more companies than not. Privacy is the consumer-consequence manifestation of big data, which increasingly shapes approaches to marketing, product development and a vast array of services. In short, privacy has become a price of consumption.
Dec 10, 2014 6:35am
The Internet is a big place where it's possible to come in contact with all sorts of people, many of them only looking out for their own interests. Fortunately, there is a good deal of technology devoted to making it possible for kids to surf, play games and shop for toys when the proper controls are in place. Here are some easy ways to give your kids safe access to the Internet.
Dec 9, 2014 5:25am
There is a golden rule of customer data: you are responsible for all customer data that you request. Using this as a guideline, check out these best practices for taking care of customer data.
Dec 2, 2014 8:47am
Privacy as a relevant everyday concept has been pushing its way into the mainstream, and the events of the last couple of years have accelerated that trend. It's unfamiliar territory for us - is privacy trendy?
Nov 24, 2014 7:00am
A debilitating cyber attack on the U.S. electrical grid has yet to make headlines, but utility companies, federal agencies and state and local governments are increasingly engaged in dialogue and training around that eventuality, according to panelists at a recent discussion hosted by the Intelligence and National Security Alliance.
Nov 20, 2014 6:35am
As the holiday shopping bustle approaches, don't just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important!
Nov 18, 2014 12:20pm
At the Privacy Identity Innovation conference last week, Metanautix's Jim Adler proposed that, while transparency can be a good "disinfectant" for companies to adopt, "disinfectants sting." Adopting transparency is "meant to hurt a little." It’s a smart observation, and it’s worth exploring from both sides. Why does transparency sting, and is it worth the short-term pain?
Nov 11, 2014 7:28am
When you visit a webpage, loads of information is traded back and forth between your browser and the web server. This transfer was designed to make sure that the server has all the information it needs to properly display the page you're looking at. But the architecture of the web means that all of this information is available on every single call. Learn more about what your browser communicates when you surf the web.
Nov 5, 2014 7:14am
Finding the right balance when it comes to social media sharing isn't an easy feat, but there are several things you can do to protect your personal information on social media.
Nov 4, 2014 10:13am
Step one for talking privacy is getting our vocabulary in order. So let's start with the basics and move on to several recent terms of endearment in the data management discussion.
Oct 31, 2014 1:10pm
It can't be ignored. Cybercrime is on the rise. Learn more about the layers of cybercrime and how you can help fight online threats.
Oct 24, 2014 10:13am
Running a small business is risky, but ignoring the cybersecurity of the business is even riskier. With so much at stake, it behooves a small business owner to guard the company's assets as much as possible.
Oct 24, 2014 6:38am
Smaller businesses can do much to minimize their cyber threat risks. Learn the steps SMBs can take to lower their risks of being targeted by cybercriminals.
Oct 21, 2014 7:50am
Guest blogger Katie Hurst discusses how National Cyber Security Awareness Month (NCSAM) Champion organization OpenSesame is celebrating NCSAM and staying safe online every day.
Oct 14, 2014 7:21am
Through simple behavioral and technological changes, individuals can greatly reduce their exposure to cyber threats. This National Cyber Security Awareness Month, our guest blogger from RoboForm is celebrating by providing online safety tools and tips.
Oct 10, 2014 6:54am
STOP. THINK. CONNECT., which urges us to stop and think before we go online, is the perfect theme for NCSA’s cybersecurity education and awareness program, and the good news is that a little thinking goes a long way in keeping you safe.
Oct 6, 2014 6:54am
While Internet security is a pervasive issue for all industries, schools deserve some extra attention. Along with the increased need for bandwidth to access online courses and tools, students and teachers are all too quick to share personal information through the internet. Schools need to carefully plan their network security in much the same way they plan their physical security. There has to be a good balance between access and security.
Sep 16, 2014 8:21am
The new school year is in full swing and National Cyber Security Awareness Month is around the corner. What better time to talk to the kids in your life about online safety. Many of our readers are doing just that — and using Net Cetera: Chatting with Kids About Being Online as the basis for the conversation.
Sep 11, 2014 7:13am
The growth of the Internet has introduced us to a much easier and convenient way of life. The Web has become our source of information, facilitates easier shopping and media consumption and allows us to connect with people on social media sites. Although social media sites such as Facebook, Twitter and Instagram provide convenient, beneficial features, it is important to understand their security and privacy implications and be smart about what you post on social media.
Aug 27, 2014 11:08am
In a phishing scam, a cybercriminal sends an email that attempts to fraudulently acquire the recipient’s personal information. Learn more about phishing and what you can do about email vulnerabilities.
Aug 12, 2014 6:31am
When it comes to tightening your Internet and computer privacy security, one crucial step you can take is to learn more about how your online activities leave confidential traces behind on your hard drive.
May 29, 2014 4:31pm
Why are tablet owners the top target of identity thieves? One reason is the unique design features of tablets make them perfect for sharing.
May 8, 2014 7:00am
Data privacy is something that can be built into systems, taught to users of systems and valued by good old fashioned entrepreneurial techniques. All it takes is a little know how, creativity and the desire to build respect for data about people into technical solutions and organizations.
May 5, 2014 8:00am
Cloud computing is used by virtually every organization because it's a convenient way to use applications and share data in a web-based environment. But there are also risks to consider, says Private WiFi's Jared Howe.
Apr 7, 2014 8:30am
Private WiFi's Jillian Ryan delves into the data from its latest study by Harris Poll identifying WiFi users, practices and risks, and shares it all in a new infographic. A version of this blog appeared on Private WiFi's blog on April 3.
Mar 24, 2014 6:30pm
By now, we hope you know that hackers can steal your sensitive information any time you connect to a public WiFi network. But what you may not know is how fast they can do it. That's what WAFB 9 demonstrated in a hacking experiment on a university hotspot in Baton Rouge, Louisiana. What happened should be a wakeup call for hotspot users everywhere.
Mar 11, 2014 2:30pm
Recent surveys have revealed how generations view and address online safety and security concerns differently, writes Private WiFi's Jared Howe. A version of this blog originally appeared on Private WiFi's blog on March 6, 2014.
Feb 6, 2014 7:15am
"Smiling feels easy and natural. However, this action is quite elaborate from a structural point of view," writes Jetico CEO Michael Waksman. "So the key to making data privacy more accessible would be to use software that allows encryption to be performed easily and naturally without even thinking about it."
Jan 24, 2014 2:05pm
"To avoid accidentally selling your identity on eBay or providing access to your bank accounts in the form of a broken tablet in the trash, you need to take secure measures to wipe the data clean," writes Frank Milia of IT Asset Management Group (ITAMG). "The good news is that many of the drive manufacturers have provided secure erasure utilities built into the disks."
Jan 22, 2014 6:00am
SpiderOak's Chip Black takes a look back at Ted Nelson's seminal 1974 works on computing and how they're relevant as ever in online privacy discussions 40 years later.
Jan 21, 2014 9:00am
In the first two installments of the Better Business Bureau's "Privacy Basics for the Savvy Small Business" series, Frances Henderson, CIPP, offered tips on reviewing and retooling your privacy policy and internal privacy practices. This final post highlights the privacy implications of activities your small business may engage in as it expands its reach - hosting online ads, expanding overseas, and launching a mobile app.
Jan 21, 2014 7:30am
"It's the start of a new year -- a time to look at our habits with fresh eyes, make positive changes and tackle life with renewed energy and enthusiasm," writes Linnette Attai of iKeepSafe. "It's also a great time to take a look at your digital footprint, and those of your children, and see if there are changes to be made there as well."
Jan 9, 2014 7:30am
Heather M. Federman, Policy & Outreach Director at the Online Trust Alliance, provides her New Year "data resolutions" for businesses to open 2014.
Dec 19, 2013 12:00pm's Leslie Hobbs covers how to create a positive personal and professional presence online. "The potential to make the Internet work for you exists," she writes. "it just requires a bit of legwork and a lot of thought."
Dec 17, 2013 7:05am
Frances Henderson, CIPP, and Emma Fletcher, CIPP, deliver the second installment in the Council of Better Business Bureaus' series, "Privacy Basics for the Savvy Small Business", by discussing how companies should approach reviewing and updating their privacy policies.
Dec 12, 2013 7:20am
"In the Digital Age, one way a victim can start to feel empowered again is through controlling her privacy," writes's Leslie Hobbs, who offers some guidance that anyone can use to guard their personal information.
Dec 10, 2013 7:30am
In her second entry in the Data Privacy Day guest blog series, iKeepSafe's Linnette Attai expands on the conversation around data security and schools with a new paper that outlines concerns and serves as a guide for dialogue on assessing and implementing systems and practices.
Dec 5, 2013 7:01am
Privacy specialist Andrew McDevitt of AvePoint explains why the global privacy community should rally around Data Privacy Day this January 28: to heighten public awareness of privacy concerns and promote strong data stewardship practices among individuals and businesses.
Dec 3, 2013 7:00am
Private Wifi and the Identity Theft Resource Center have released a new infographic, "The Ultimate Guide to Staying Safe on Public Wifi", which offers insight into about the overall consumer privacy beliefs in WiFi hotspots.
Nov 26, 2013 7:40am
David Dahl, director of development for the project at data encryption and storage service provider SpiderOak, provides the strategies he follows at home to maintain greater control over his online privacy.
Nov 20, 2013 6:36am
"Smart companies - the ones that are looking not just one quarter from now or one year from now - are anticipating the rise of the New Privacy," writes's Leslie Hobbs. "So what should companies do to start down that path?"
Nov 19, 2013 4:00am
"Whether your small business sells goods and services online, or you’re simply using your website to market to your customers, having a quality website privacy policy can build consumer trust and distinguish your business in a crowded online marketplace," writes Frances Henderson, CIPP, from the Council of Better Business Bureaus.
Nov 14, 2013 6:30am
Linnette Attai from iKeepSafe delves into the issue of how schools protect the student data they collect, and a new iKeepsafe resource, "Data Privacy and Schools: Outlining the Conversation." The paper is a launching pad for dialogue about how schools collect and manage student data, with the ultimate aim of easing the development of successful and compliant partnerships with third-party technology partners.
Nov 12, 2013 6:25am
"Sharing your personal data can very much color your reputation, especially online," says Leslie Hobbs of "In fact, the two often go hand-in-hand so take a judicious approach to revealing your personal details. Here's how."
Nov 12, 2013 6:10am
If you could ask a hacker how to protect yourself from his or her intrusions into your devices and data, what would you ask? McAfee's Taylor Tompkins details her first encounter with a white-hat hacker.
Nov 7, 2013 8:59am
"Privacy advocates, regulators and others raise worthwhile concerns about the growing Internet of Things," writes guest blogger Jason Meyer. "What happens when the data these devices capture about us misrepresents us or include errors that skew our profiles?"
Oct 31, 2013 8:15am
Tom Flynn, Vice President, Identity and Access Security, at Gemalto North America shares a new infographic naming the top five threats facing eBanking in the United States, but most importantly, the four tips the public should follow to thwart them.
Sep 4, 2013 12:21pm
Armor for Android security researcher James Green breaks down the mobile threat landscape to Android OS and importance of updates to protect your device from infection.
Aug 4, 2013 11:55pm
Karen Clark of looks at how pop culture, and one summer movie in particular, opens the door to talking to pre-teens and teens about safe online behavior.
Jul 16, 2013 7:00am
McAfee blogger Taylor Tompkins looks at how to adjust the settings for downloading apps on some of today's most popular smartphones.
Jun 24, 2013 11:07am
Tech consultant Geoff Kenyon offers five ways to protect your personal information when connecting to public Wi-Fi networks, including a digital security quiz to evaluate how well you safeguard your identity.
Jun 10, 2013 9:30am
Philip Alexander, founder of Data Privacy Network, offers advice on how you can protect your identity and personal information while on summer vacation.
May 30, 2013 1:02pm
John Skorick, Founder and CEO of personal privacy company, LLC, discusses how your mobile phone number can be an access point to invading your privacy, and methods to securing both.
May 7, 2013 2:02pm
Tuesday, May 7 was Password Day, as Intel, McAfee, the Department of Homeland Security and others provided tips and advice regarding strong password creation and memorization. The following is a partial transcript edited for brevity and clarity.
Apr 24, 2013 11:30am
Jeff Bermant, Founder and CEO of Virtual World Computing, offers a number of tools and tips to provide for safe web browsing and to protect children from victmization, online and off.
Apr 3, 2013 1:00pm
Amy Hebert, Consumer Education Specialist at the U.S. Federal Trade Commission, offers the infographic on children and mobile safety, "Keeping Up with Kids' Apps." It includes four things your kid's apps might do -- but might not tell you.
Mar 4, 2013 9:58am
Michael Waksman, CEO of Jetico, a company that provides military-standard data protection software to the U.S. Department of Defense, offers his tips on how exactly to make your passwords 'long and strong'.
Feb 4, 2013 8:00am
As a user, if you have never taken Facebook's impact on your privacy, reputation and security seriously, it's now time to do so.
Jan 31, 2013 9:15am
When you work with personal data on a Windows computer, your privacy and identity are at risk. We will show you a few basic things you should keep in mind, to make sure your privacy and identity are always protected.
Jan 30, 2013 9:30am
As businesses and organizations upgrade to the newest wireless devices, every day thousands of used mobile devices are being replaced and companies run the risk of inadvertently compromising confidential internal information contained on these devices.
Jan 29, 2013 8:00am
Consumers today cannot avoid all risks, but there are a number of practical steps they can take to minimize the threats of viruses, credit card fraud and identity theft.
Jan 25, 2013 6:15am
Every day, kids face a myriad of online decisions- which friend requests to accept, whether to forward time-limited and self-destructing images (have you heard of Snapchat?), whether to talk to someone online they don't know, even whether to join classmates in bullying someone.
Jan 24, 2013 8:00am
With the rise of big data come big challenges, including how to deal with increasingly challenging privacy issues. To help protect information, which has become the currency of the 21st century, here are 10 resolutions for your enterprise to adopt in 2013.
Jan 18, 2013 8:30am
Data Privacy Day is approaching, and as part of our awareness campaign, we wanted to review some of the best practices for safe password selection and management. It is surprising but true that even in today’s security-conscious environment, the word “password” and the sequence “123456” remain some of the most common passwords!
Jan 7, 2013 11:00am
Getting a backup can be a hard thing to do because you don't know where to start. But don't give up just yet!
Dec 19, 2012 8:00am
As increasing amounts of personal data are held on small, mobile devices, the risk of having that data stolen is also increasing.
Nov 20, 2012 5:16am
Protection and separation of personal and public data in transit, in storage and at rest should not require extensive education and behavioral modification.
Nov 2, 2012 8:49am
Symantec's mission to inspire confidence in a connected world requires that we ensure both our own operations and those of our customers are safe and secure. As the leading global information security company, this is not an easy task.
Nov 1, 2012 10:05am
Teachers and parents need to commit to protecting their kids’ smartphones and teaching them how to use them safely. These 5 tips will help parents, teachers and kids work together to use the classroom as a place to learn how to take advantage of mobile opportunities while preventing the risks.
Oct 31, 2012 6:08am
While the primary concern is always being able to provide shelter and food for you and your loved ones during severe weather, it is also important to have a plan in place for when your technology devices stop working.
Oct 29, 2012 8:00am
In addition to supporting this ­National Cyber Security Alliance campaign and showing our commitment to cybersecurity through our involvement with the Champions program, miiCard is using this month to remind our members how to keep safe in their different online activities from shopping, social and dating to banking.
Oct 25, 2012 6:00am
Looking past how cell-phone crazy this generation of kids has become, one question still remains – when can your child handle a mobile phone and the responsibilities that come with owning a phone?
Sep 25, 2012 7:22am
We store our email and social accounts, access to mobile banking, photos, contacts and more, on our smartphones – so protecting it is more important than ever!
Sep 9, 2012 1:08pm
Airports, restaurants, coffee shops, businesses, dentists, libraries and even public parks offer public access to Wi-Fi for free. But surfing unsecured hotspots can open your data pipeline to some very unsavory characters.
Aug 14, 2012 10:56am
Cyber Tours engage all segments of the community – from individuals and non-profit organizations to government entities and businesses- in cybersecurity events and activities.
Jul 12, 2012 2:06pm
A typical child in the 21st century is practically raised on technology.
Jan 26, 2012 9:30am
In today's hyper-connected society, it seems that everyone knows just about everything about everyone. The amount of personal information we share online is staggering.
Jan 13, 2012 11:16am
When you work with sensitive data, no matter what field you're in, regular cyber security checks are a must. Practicing routine 'cyber hygiene' will help protect against spillage or loss of your sensitive data.
Nov 28, 2011 9:00am
We recently featured a blog post about the importance of setting bank alerts to prevent identity theft. Often times, the most convenient option for consumers is mobile alerts, which sends a text message to the account holder when their account is charged.
Sep 23, 2011 4:42pm
The Multi-State Information Sharing and Analysis Center (MS-ISAC) has launched a national Cyber Security Pledge campaign to encourage citizens to declare their commitment to using good practices for staying safe on the Internet.
Sep 14, 2011 2:40pm
Millions of dollars are spent each year trying to protect business and government assets and networks from cyber attacks.
Sep 1, 2011 9:39am
Now that this unusually hot summer is coming to a close, you may be going back to school with a new computer, or you may be the parent of such a student. No doubt you know that you should install a good antivirus program. What more do you need to know? Ever heard of rogue antivirus? If you use a PC, you are particularly vulnerable to this pernicious attack.
Aug 25, 2011 2:37pm
Over the last year, a trend has emerged in these complaints: consumers are being increasingly victimized by online businesses that aggressively market their services as one thing but bury in the fine print their actual services, which are far less desirable.
Jul 27, 2011 4:33pm
Reputable software publishers want you to use their software and recommend it to other people. This is why they spend money creating a quality product with good technical support.
Jul 12, 2011 9:30am
Whether you are traveling for work or pleasure, the last thing you want to think about is having your identity stolen.
Jun 3, 2011 9:27am
There are steps that we can take to help prevent things like cyberbullying on social networking sites.
May 20, 2011 11:19am
While finding a job today is hard, job-related scams and schemes seem to be all around us. To prevent job seekers from going through the pain of dealing with some of the more common online job scams, the SiteJabber community has flagged some common types of sites that are best avoided.
Mar 22, 2011 3:10pm
Being a victim of fraud can be an overwhelming experience for anyone. Not only do you have to worry about the financial implications of the fraud, many people feel embarrassed for having fallen victim.