User Blogs

User Blogs

Discussions and Blogs
Category >> MyBlog
May 06
2014

15 Tips to Prepare for Big and Small Security Threats

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Businesses that focus on the big security breach may very well be missing the smaller threats that can do serious damage.

May 05
2014

Beware of the Green Dot scam

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Scammers are at it again, this time with green dot cards: a pre-paid debit card available at stores. It can work like this:

May 03
2014

What is Social Engineering?

Posted by Robert Siciliano in Untagged 

Robert Siciliano

No, it’s not some new engineering field to develop social media sites. Social engineering has been around as long as the con artist has been around. The terms stems from the social science world where social engineering is deemed as an act of psychological manipulation.

May 01
2014

Courts side with Consumers in Data Breach

Posted by Robert Siciliano in Untagged 

Robert Siciliano

In general, courts don’t tend to side with consumers in data breach incidents. However, a federal court in Florida is the apple among the oranges. It approved a $3 million settlement for victims whose data was on a stolen laptop in December 2009, that contained personal health information.

Apr 27
2014

The Future of Identity Theft

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Identity theft evolves as technology progresses. The Identity Theft Resource Center explains the future of this crime.

Apr 24
2014

National Retail Federation pushes for Chip and PIN

Posted by Robert Siciliano in Untagged 

Robert Siciliano

The recent major retail breaches have fueled increased interest by the National Retail Federation to push for implementation of a chip and PIN payment card technology. This would make the magnetic strips on payment cards obsolete and no longer a calling card for hackers.

Apr 23
2014

Healthcare Records vulnerable to Criminals

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Just about every kind of healthcare related entity—hospitals, rehab centers, pharma companies, insurance carriers and more—have been and continue to be compromised by cyber criminals.

Apr 21
2014

Data Brokers: What Are They; How to Get Control of Your Name

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Data brokers have lots of personal information about you; here’s what you can do about that.

Apr 17
2014

Financial Services and Retail band together to fight Fraud

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Finally, retailers and banks have agreed to work together to fight data breach incidents, foregoing the finger-pointing of who’s responsible for prevention and recovery.

Apr 16
2014

This Earth Day, “Clean” Your Device Before You Recycle It

Posted by Robert Siciliano in Untagged 

Robert Siciliano

One man’s trash is another man’s new identity? Yes, because that “junk mail” you toss in the garbage contains valuable data about yourself. A crook bent on identity theft can potentially have a field day with your discarded pre-approved credit card applications, bank statements, etc. Using a paper shredder before throwing out letters and documents such as these will help protect you and your family.

Apr 16
2014

Data Security Legislation is inevitable

Posted by Robert Siciliano in Untagged 

Robert Siciliano

A law(s) for data breaching is around the corner. And the time is right, what with the scads of data breaches involving major retailers lately. Details of customers’ addresses, phone numbers, credit cards and other sensitive information have ended up in the hands of hackers. We’re talking many tens of millions of affected consumers.

Apr 15
2014

Protecting Your Business's Data From Organized Crime

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Organized crime rings are using brains, not brawn, to target small businesses and steal critical data. Protect your business by putting these 11 security measures into place.


Subscribe via Email

 Your Email:

Tag Cloud

2012 abduction Aberdeen Group alarm alarms Android Apple Apps ATM Skimming Audit Bank Fraud Banking Security BillGuard BlackBerry botnet BPM breaches BS 25999 burglar burglary Business Continuity BYOD change management cheating children pictures Cloud Cloud Security Cobit collaboration Community discussion Compliance computer failure Consumer IT Tips contactless credit card credit card breaches Credit Card Fraud credit cards credit fraud Cross-Device Security Cyber gangs cyber monday Cyber Security cyberbullying cybercrime cybercriminal cybercriminals cybersecurity cyberwise data Data Backup Data Breaches data security Data Storage DDOS Device Reputation digital devices Digital Forensics digital life Digital Security digitally secure Disaster Recovery DNS download DPI driver's license dumps E-Commerce eBanking Electronic Discovery Electronic ESI electronic passport EMV Endpoint Security entity theft Epsilon ERM ESI Ethics Events Facebook FCC FCPA FDIC Federal Government FFIEC Financial Crisis firewall FourSquare Fraud gaming Gartner Geo-tagging gold farming Governance GPS grc GRC evaluation GRC Marketplace GRC technology readiness GRChange Green IT grey charges guard dogs Hackers Hackproof Hacktivism holidays home invasion home security Hotspot HP IAM iCloud id ID Theft Identity theft Information Management Information Security Information Supply Insider Threat Internal Audit Internal Controls internet safety iOS app iovation IP address iphone iPhone security ISACA ISO 27000 ISO 27001 ISO 31000 IT Alignment it compliance it governance IT GRC Forum Events it risk management IT Security IT Service Management ITIL jailbreaking Jobs keylogger laptop security Litigation Malware marathon mCommerce Member Discount Mobile Mobile Apps Mobile Banking mobile device Mobile Device Management Mobile Devices Mobile payment mobile phone mobile security Mobile Wallet mSecurity Multi-Regulatory Compliance multifactor authentication myblog Network Security New Years NFC NFC app Online Backup Online Banking online dating online gaming online identity online privacy online safety Online Security online shopping Operational Management OSHA Outsourcing P2P Security Panel Partner Offers passport passwords PCI Performance Management personal data personal device Personal Security pheasting phishing Policy predator Privacy Prize Draw QR Codes ransomeware ransomware Regulation E remote access resume fraud Risk Assessment Risk Management RSA Rules safety tips scam scammer scammers Scams scareware Seasonal Security security apps security tips sext Shopping shredding skimming Skimming Fraud small business smartphone smartphones smishing Social Media social network Social Security SOX spammers spokesman Spyware SSDs Standards strangers Strategy tablets tax scams Tech tech support technology Threat Management Tokenization TQM Twitter typosquatting Virus VPN wallet web Webcast Q&A Wi-Fi WIFI WiFi password wireless
Banner