User Blogs

User Blogs

Discussions and Blogs
Feb 27
2013

Dinner With the CEO Stars of Tech

Posted by Robert Siciliano in Tech

Robert Siciliano

A dinner, hosted by Yahoo’s CEO and another 11 CEOs and execs from Twitter, Google, Apple and more, recently took place in Silicon Valley. These major players, responsible for shaping our world of tech, simply sat down to break bread. You gotta wonder what the conversation was like.

Feb 27
2013

Should I Give Them My Data?

Posted by Robert Siciliano in data

Robert Siciliano

We’ve heard lots and lots about data breaches in the last decade. And with the term “cloud” becoming more prevalent (which, incidentally, just refers to a computer server connected to the internet), people are asking how secure their data is on the various websites they agree to host it.

Feb 26
2013

5 Ways To Protect Your Data On Public Wi-Fi

Posted by Robert Siciliano in data

Robert Siciliano

Wireless connections can cost hundreds of dollars annually, so it makes fiscal sense that many people seek out free connections when they are out and about. But free doesn’t necessarily mean secure.

Feb 25
2013

IT GRC Forum iPad Winner!

Posted by Cinthia Pilar in Prize Draw , IT GRC Forum Events

Cinthia Pilar

The IT GRC Forum has announced the grand prize winner of an Apple iPad 2. Congratulations to Laura Buckley, whose name was randomly selected from more than 240 registrants when she attended our webcast on 'How to Select the Right MDM & BYOD Security Solutions' held on February 21, 2013.

Feb 23
2013

6 Ways You Are Vulnerable On Wi-Fi

Posted by Robert Siciliano in WIFI

Robert Siciliano

Whether you are on your home or office network or seeking out a free connection on public Wi-Fi, there are known risks that can be managed simply by using a free VPN.

Feb 23
2013

What’s a Wireless “Sniffer” and Why Should I Care?

Posted by Robert Siciliano in WIFI

Robert Siciliano

A sniffer is a software program used by IT administrators to monitor network usage, investigate network problems, investigate network misuse and abuse, identify configuration issues and determine the state of a network’s security. Sniffers ultimately decode the data so it is readable in words, numbers and computer code.

Feb 23
2013

BillGuard is Personal Finance Security

Posted by Robert Siciliano in BillGuard

Robert Siciliano

If I had a dime for every time I’ve been asked, “How do I protect my credit card number?” I’d be living on my own island in the Pacific. My response has always been, “Use your card whenever and wherever and don’t worry about it, but pay close attention to your statements,” because that’s really all you can do. But due to most people not carefully checking their statements, my sage advice has fallen on deaf ears.

Feb 23
2013

5 Ways to Ensure Online Privacy for Kids

Posted by Robert Siciliano in online privacy

Robert Siciliano

Congress and the Federal Trade Commission (FTC) have taken special steps to ensure that children under 13 years of age don’t share their personal information on the Internet without the express approval of their parents. Congress passed the Children’s Online Privacy Protection Act (COPPA) in 1998 and the FTC wrote a rule implementing the law. The FTC currently is conducting a review of what changes, if any, should be made to COPPA to reflect the changes that may have been brought about from technology, such as the rapid adoption of mobile devices.

Feb 22
2013

Do You Really Pay Attention to Your Billing Statements?

Posted by Robert Siciliano in BillGuard

Robert Siciliano

Do you take a close look at all your bills and statements every month? Do you look at all the charges? Are you familiar with each charge—where, when and to whom? Do you recognize monthly recurring charges? Did you know that nine out of 10 people don’t check their bills, or merely skim them quickly for large purchases?

Feb 22
2013

Do You Share Passwords with Your Partner?

Posted by Robert Siciliano in passwords

Robert Siciliano

Do you? I do and I’ve been doing it since I said “I do.” And if you are married or at least in a committed lifelong relationship, knowing each other’s passwords is probably expected. Today, sharing passwords has become a sign of commitment, a signal of love and devotion, like a varsity sweater or friendship ring. But what’s happens when the relationship goes sour (with a divorce rate of 50% to back me up here)?

Feb 19
2013

13 Digital Security New Year’s Resolution Tips for 2013

Posted by Robert Siciliano in New Years

Robert Siciliano

The best thing about the “New Year” is committing to new or old resolutions and starting fresh. Whether you are an individual or a small business, the following applies:

Feb 19
2013

The Social Media Identity Theft of a School Director Via Twitter

Posted by Robert Siciliano in Social Media

Robert Siciliano

We’ve seen this before and it never ends good. This time it’s resulting in an identity theft charge  for Ira Trey Quesenberry III, an 18-year-old student at Sullivan Central High School. A few years ago this would have been looked upon as a victimless prank. But times have changed and as social media sites like Twitter, Facebook, LinkedIn and others have morphed into much more than just recreational websites, it’s not just unacceptable; it’s a crime.


Subscribe via Email

 Your Email:

Tag Cloud

2012 abduction Aberdeen Group alarm alarms Android Apple Apps ATM Skimming Audit Bank Fraud Banking Security BillGuard BlackBerry botnet BPM breaches BS 25999 burglar burglary Business Continuity BYOD change management cheating children pictures Cloud Cloud Security Cobit collaboration Compliance computer failure Consumer IT Tips contactless credit card credit card breaches Credit Card Fraud credit cards credit fraud Cross-Device Security Cyber gangs cyber monday Cyber Security cyberbullying cybercrime cybercriminal cybercriminals cybersecurity cyberwise data Data Backup Data Breaches data security Data Storage DDOS Device Reputation digital devices Digital Forensics digital life Digital Security digitally secure Disaster Recovery DNS download DPI driver's license dumps E-Commerce eBanking Electronic Discovery Electronic ESI electronic passport EMV Endpoint Security entity theft Epsilon ERM ESI Ethics Events Facebook FCC FCPA FDIC Federal Government FFIEC Financial Crisis firewall FourSquare Fraud gaming Gartner Geo-tagging gold farming Governance GPS grc GRC evaluation GRC Marketplace GRC technology readiness GRChange Green IT grey charges guard dogs Hackers Hackproof Hacktivism holidays home invasion home security Hotspot HP IAM iCloud id ID Theft Identity theft Information Management Information Security Information Supply Insider Threat Internal Audit Internal Controls internet safety iOS app iovation IP address iphone iPhone security ISACA ISO 27000 ISO 27001 ISO 31000 IT Alignment it compliance it governance IT GRC Forum Events it risk management IT Security IT Service Management ITIL jailbreaking Jobs keylogger laptop security Litigation Malware marathon mCommerce Member Discount Mobile Mobile Apps Mobile Banking mobile device Mobile Device Management Mobile Devices Mobile payment mobile phone mobile security Mobile Wallet mSecurity Multi-Regulatory Compliance multifactor authentication myblog Network Security New Years NFC NFC app Online Backup Online Banking online dating online gaming online identity online privacy online safety Online Security online shopping Operational Management OSHA Outsourcing P2P Security Panel Partner Offers passport passwords PCI Performance Management personal data personal device Personal Security pheasting phishing Policy predator Privacy Prize Draw QR Codes ransomeware ransomware Regulation E remote access resume fraud Risk Assessment Risk Management RSA Rules safety tips scam scammer scammers Scams scareware Seasonal Security security apps security tips sext Shopping shredding skimming Skimming Fraud small business smartphone smartphones smishing Social Media social network Social Security SOX spammers spokesman Spyware SSDs Standards strangers Strategy tablets tax scams Tech tech support technology Threat Management Tokenization TQM Twitter typosquatting Virus VPN wallet web Webcast Q&A Wi-Fi WIFI WiFi password wireless
Banner