User Blogs

User Blogs

Discussions and Blogs
Category >> MyBlog
Jun 25
2013

GRChange Management

Posted by Thiruvadinathan A in GRChange , collaboration , change management

Thiruvadinathan A

When it comes to GRC, there is no dearth of challenges. I believe organizational change management is one of the critical challenges, which must be faced in order to emerge successfully.

Jun 17
2013

How Your Smartphone Will Identify You Privately

Posted by Robert Siciliano in smartphone

Robert Siciliano

Banks rely on usernames and passwords as a layer of protection and authentication to prevent criminals from accessing your accounts. However researchers now show that your password—even though it may be a relatively “strong” one, might not be strong enough.

Jun 17
2013

Banks Sues Client Over Wire Fraud

Posted by Robert Siciliano in Fraud

Robert Siciliano

Banks usually have relatively secure systems to maintain and protect online banking activities. They’ve spent billions to ensure that criminal hackers don’t liquidate all of our accounts. But criminals spend all their time seeking vulnerabilities and often find some way to make a fraudulent withdrawal.

Jun 11
2013

What are the risks of BYOD?

Posted by Robert Siciliano in BYOD

Robert Siciliano

As companies cut costs, and employees desire more freedom of choice, they increasinglybring their own mobile  devices to work. . The opportunity to eliminate the significant expenses associated with corporate mobile devices excites even the most staid CFO, and the IT guys are told to “make it work.” This development has come to be known by its acronym“BYOD” (Bring Your Own Device).

Jun 11
2013

Portland Company Keeps Ringing the Bell Of Success

Posted by Robert Siciliano in iovation

Robert Siciliano

iovation, protects businesses from Internet fraud by identifying good online customers with its device reputation technology, recently announced that its ReputationManager 360 solution won gold in the security services category for Network Products Guide’s 8th Annual 2013 Best Products and Services Award. The award honors and recognizes the achievements and positive contributions of organizations and IT professionals worldwide.

Jun 07
2013

What is a mobile wallet?

Posted by Robert Siciliano in Mobile Wallet

Robert Siciliano

Some say there will be a day when the wallet you carry in your pocket or purse will become obsolete. Technology is evolving in a way that will likely eliminate all our credit cards, store cards, and IDs. We will use our mobile devices as our primary means of commerce and identification. The technology behind mobile wallet combines near field communications (NFC) and applications. Depending on which is used, a user might need to wave their phone near a reader to make a payment or verify identification, or they may open an app and simply click a button.

Jun 07
2013

Florida Retirees Frequent Identity Theft Targets

Posted by Robert Siciliano in Untagged 

Robert Siciliano

A lot of Floridians are retirees who spend their days around the pool or at the beach. The warmer weather attacks both golden agers and unfortunately identity thieves. Criminals know that retirees have money in the bank, retirement accounts and credit cards with high limits.

Jun 03
2013

Weak Passwords Can Cost You Everything

Posted by Robert Siciliano in passwords , passwords

Robert Siciliano

If your computer or mobile was hacked or your passwords were cracked and your data was lost or if all the websites you have an account with were hacked and all that information was the hands of a criminal, how devastated will you be?

Jun 03
2013

Digital Security Improves Our Lives

Posted by Robert Siciliano in Digital Security

Robert Siciliano

Our lives depend on the convenience of digital and require the security behind the scenes. Take contactless payment for example. Contactless payments are a faster, more convenient alternative to cash when making small purchases at fast food restaurants, convenience stores, and transport terminals. They are also ideal for remote or unattended payment situations, such as vending machines, road tolls, or parking meters.

Jun 01
2013

How do I shop with my mobile securely?

Posted by Robert Siciliano in mobile security

Robert Siciliano

To stay safe while mobile shopping:

May 31
2013

What is mCommerce and how do you keep transactions safe?

Posted by Robert Siciliano in mCommerce

Robert Siciliano

mCommerce (or M-commerce) is using a mobile phone to make purchases. Like credit card transactions, your card/device can be either present or not present. In other words, “present” might mean your mobile is equipped with an application that you use to make a purchase in person, such as to buy a cup of coffee or a train ticket. “Not present” could be when you use another application or your mobile browser to make a remote purchase over the Internet or another type of mobile network.

May 24
2013

Announcing the Grand Opening of the GRC Marketplace

Posted by Cinthia Pilar in GRC Marketplace

Cinthia Pilar

We are pleased to announce the grand opening of the GRC Marketplace!


Subscribe via Email

 Your Email:

Tag Cloud

2012 abduction Aberdeen Group alarm alarms Android Apple Apps ATM Skimming Audit Bank Fraud Banking Security BillGuard BlackBerry botnet BPM breaches BS 25999 burglar burglary Business Continuity BYOD change management cheating children pictures Cloud Cloud Security Cobit collaboration Compliance computer failure Consumer IT Tips contactless credit card credit card breaches Credit Card Fraud credit cards credit fraud Cross-Device Security Cyber gangs cyber monday Cyber Security cyberbullying cybercrime cybercriminal cybercriminals cybersecurity cyberwise data Data Backup Data Breaches data security Data Storage DDOS Device Reputation digital devices Digital Forensics digital life Digital Security digitally secure Disaster Recovery DNS download DPI driver's license dumps E-Commerce eBanking Electronic Discovery Electronic ESI electronic passport EMV Endpoint Security entity theft Epsilon ERM ESI Ethics Events Facebook FCC FCPA FDIC Federal Government FFIEC Financial Crisis firewall FourSquare Fraud gaming Gartner Geo-tagging gold farming Governance GPS grc GRC evaluation GRC Marketplace GRC technology readiness GRChange Green IT grey charges guard dogs Hackers Hackproof Hacktivism holidays home invasion home security Hotspot HP IAM iCloud id ID Theft Identity theft Information Management Information Security Information Supply Insider Threat Internal Audit Internal Controls internet safety iOS app iovation IP address iphone iPhone security ISACA ISO 27000 ISO 27001 ISO 31000 IT Alignment it compliance it governance IT GRC Forum Events it risk management IT Security IT Service Management ITIL jailbreaking Jobs keylogger laptop security Litigation Malware marathon mCommerce Member Discount Mobile Mobile Apps Mobile Banking mobile device Mobile Device Management Mobile Devices Mobile payment mobile phone mobile security Mobile Wallet mSecurity Multi-Regulatory Compliance multifactor authentication myblog Network Security New Years NFC NFC app Online Backup Online Banking online dating online gaming online identity online privacy online safety Online Security online shopping Operational Management OSHA Outsourcing P2P Security Panel Partner Offers passport passwords PCI Performance Management personal data personal device Personal Security pheasting phishing Policy predator Privacy Prize Draw QR Codes ransomeware ransomware Regulation E remote access resume fraud Risk Assessment Risk Management RSA Rules safety tips scam scammer scammers Scams scareware Seasonal Security security apps security tips sext Shopping shredding skimming Skimming Fraud small business smartphone smartphones smishing Social Media social network Social Security SOX spammers spokesman Spyware SSDs Standards strangers Strategy tablets tax scams Tech tech support technology Threat Management Tokenization TQM Twitter typosquatting Virus VPN wallet web Webcast Q&A Wi-Fi WIFI WiFi password wireless
Banner