Press enter to search
January 17, 2020

How Smart Card Technology Uses Network Security

The concept of network security has been in existence for decades. With organizations using more sensitive information, the need to create policies that would limit access and control of a network has increased. At first, these policies involved nothing more than inputting a name and PIN or password on a computer. With the invention of smart cards, however, network security methods have changed.

November 19, 2019

Will Medical IoT Be the Most Hacked Industry in the Future

In 2018 alone, there were more than 2,000 security breaches and 53,000 medical IoT security incidents discovered in 53 countries. What's the picture looking like for 2019 and how confident are you that your health information is safe from exploitation?

October 16, 2019

Start’em Early

Early childhood education has long been established as an important factor needed to help children thrive. It is proven that if children fail to learn basic skills like reading while they are young, they will face lifelong challenges and struggles. As we raise a generation of digital natives, we’re finding the same applies to cyber safety, or digital citizenship, training.

October 10, 2019

Teach Your Kids to #BeCyberSmart and Own Their Cyber Safety

The best way to fight cybercriminals is through education and that can start at any age. As parents, caregivers, teachers and school administrators, we teach our children to learn how to safely cross a road and who to call in case of an emergency. We must also teach our kids proactive digital privacy and online safety behavior and give them the tools to own their own cyber safety.

October 8, 2019

Speak up, “security,” it seems we may not be able to hear you!

We are living during one of the most exciting times in history, the digital revolution. As with all revolutions, there are risks, concerns and considerations. Take a moment to look around your home or office and call out the devices that are connected; it may surprise you just how many there are and what functions they are fulfilling.

October 6, 2019

After You Own IT, the Next Step is to Secure IT

As Week 2 of NCSAM 2019 begins, we want to remind you that personal accountability is key. This blog includes some tried and true tips to better safeguard your digital profile. Taking a few proactive steps will indeed help to enhance your cyber safety and security at home, at work and while out and about.

October 1, 2019

Owning Your Connected Devices is Much More than Simply Possessing Them

During this first week of NCSAM, we will focus on what everyone needs to do to “own” – basically to keep their devices and online lives safe and secure  – both at home and in the workplace. If you think about it, interconnectivity touches almost every aspect of our daily lifestyle whether at home with family and on go at school, work or out and about. While this constant connectivity offers countless possibilities for innovation and modernization, it also presents opportunities for potential cybersecurity threats that can compromise highly sensitive personal data.

August 6, 2019

Sextortion: What to Look Out For and What to Do if You’re a Victim

Earlier this week, Cofense, a National Cyber Security Alliance (NCSA) board member company, announced it had published a database of more than 200 million compromised email accounts targeted by sextortion scams. To learn more about sextortion and the botnet discovery, NCSA spoke with Tonia Dudley, Director, Security Solution Advisor at Cofense and NCSA board member.