Last year, Intel approached Jim Shields of Twist and Shout Media to work on a privacy edition of his wildly successful and tremendously funny Restricted Intelligence training series. Now, anyone can license these episodes for much less than they can create them.
#CyberAware is a family-friendly newsletter from the National Cyber Security Alliance (NCSA). This month, we’re highlighting insights on your how your devices collect, use and share information about you and your family, the top online threats facing kids and teens and simple things you can do to manage your privacy, along with recent online safety news.
Consider whether your business' solutions respect and balance all ecosystem parties' needs to avoid privacy and trust fails.
This Twitter chat shared online safety tips and resources and highlight how you can get involved in this year’s Safer Internet Day efforts.
Before anyone offers up a standard set of tips for how best to manage your privacy, it's worth taking a moment to learn more about the complex data ecosystem in which we all now live – and what that means for controlling information about us.
Providing cybersecurity for a business is challenging enough for IT professionals even when threats are well known. It gets more difficult if an employee is asked to do something that’s bad for the company without realizing the source of the request is a cybercriminal. Business email compromise is an example of such a threat.