December 2017
Privacy vs SecurityDo you know the difference between privacy and security? Understanding how these two concepts work together, and how they differ, is key to improving our overall defense.
November 2017
Social Engineering and PhishingCybersecurity is a human process that social engineers attempt to exploit in many different ways. From phishing to tailgating to dumpster diving, we need to be aware of the threats we face in all three domains (cyber, physical, people).
October 2017
Being Smart About Smart DevicesImagine a world where your refrigerator orders groceries on your behalf, which are then delivered by computer-controlled drones or driverless vehicles.
September 2017
The Front DoorIt’s often said that passwords are the first line of defense when it comes to information security. But is that still the case? And what does the future hold for identification and authentication? Are biometrics any better?
August 2017
MalwareHow much is your computer worth? What about your smartphone? Your identity? Everything has a price and cybercriminals are looking to profit.
July 2017
See Something? Say Something!Security incidents are going to happen, sometimes because of mistakes and sometimes because of things beyond our control.
June 2017
Safely Sailing the Cyber SeasMost of us never think about how much work goes into the way we communicate. When we do consider the greatness of the networks that connect us, we should treat them with respectful caution; respect for the power that flows through the cables, caution for interacting with the people who want to do us wrong.
May 2017
The Top Ten Security PracticesKnowledge is power. And, in this case, that power enables us to protect ourselves, our organizations, our families, and our friends. Check out our collection of top ten lists and see how they can be applied to your everyday life at work, at home, and on the go. Remember that each and every one of us has it in ourselves to be a strong human firewall and combat cybercrime.
April 2017
April 2017 NewsletterWe are surrounded by the number three. When arming cyber-aware citizens on the third rock from the sun, we rely on three security triads: The CIA Triad, Domains Triad, and Many Lives Triad lay the foundation of what it means to be secure in every aspect of the ongoing battle against cybercrime.
March 2017
Become a Human FirewallWhether you know it or not, YOU are a human firewall. That is not up for debate. It’s just a matter of how good you are at being one. As a human firewall you have a lot of responsibilities. The good news is that those responsibilities don’t require strong technical or computer skills.
February 2017
Cybercrime UpdateCyber threats are not going away. Most experts think the Security of Things will get worse before it gets better. Tech companies will continue to release products rife with security flaws, errors or misconfigurations. Cybercriminals will continue to discover new ways to find and steal data and to compromise organizations.
January 2017
Common Sense SecurityNo piece of information security technology, like biometrics (fingerprint scanners, facial recognition, etc.), is totally secure. There is always a way to enter, bypass, fool or otherwise render security ineffective. At the same time, we can’t just sit around and wait for it to improve, just like we can’t sit around waiting for tech companies to enhance security features, or for governments to regulate tech companies.