December 2015
Be a Human FirewallWe may not think about it, but we all need to be human firewalls and understanding just what that entails in our professional and personal lives, might seem complicated or overwhelming. In this newsletter, we take a look at the top concerns of human firewalls both at work and at home.
November 2015
The Social Engineering IssueThis newsletter adds some context to the most successful attack method ever devised - Social Engineering. Yes, Social Engineering attacks work because the bad guys attack YOU - the human - and not the technology. We’ll look at Social Engineering throughout history, going back more than three millennia.
October 2015
The Malware Issue, Catching it, avoiding it, and what to do when you're infectedThe hostile world of malware, viruses, Trojans and more! Did you know that the majority of successful cyber-attacks include malware? Some people believe that mobile devices are immune from malware, but with Facebook and an endless number of Apps, nothing could be farther from the truth. Take a look at this engaging issue and see if your 'malware smarts' are up to par!
September 2015
The A to Z Guide of Security AwarenessNewsletter about all things security, from A to Z. What are the 'A-B-C's of security awareness that begin with a 'Z'? What about an 'X'? Or how about the awful Scrabble letter, 'J'? All it takes is a little bit of awareness and minding your 'P's and 'Q's to notch your security profile!
August 2015
A deeper look at Nontechnical & Physical SecurityTake a deeper look at nontechnical and physical security in our professional, personal, and mobile security lives. Topics also include, Social Media Sharing, Hotel Bills & Personally Identifiable Information (PII), Dumpster Diving & Garage Door Hacking, No Tech Hacking
July 2015
The Privacy IssuePrivacy – defining what is PII, the many different lives of PII, the difference between Privacy versus Security, and how to protect yourself and your family from Identity Theft. BONUS – a full-page compliance chart of compliance standards related to privacy!
June 2015
The Cloud is Not YoursWe hear the term used a lot but many still don’t truly understand what is meant by “the cloud.” A simple explanation: the cloud is someone else’s computer. It’s not yours. And that is exactly why there is so much debate about security in the cloud.
May 2015
Cyber Crime UpdateReview of 2015 network security threats, what are they and how to avoid them.
April 2015
The Identification & Authentication IssueDid you know that passwords are only one small part of identifying yourself to a computer, a network or any online service? Accessing hardware and software resources, also sometimes called the front door, usually consists of two components: Identification & Authentication, or I&A.
March 2015
Let's Get Social!, Smart Social NetworkingProperly using social networks and media can be quite complex and the security issues even more so. ? The security and privacy settings can change overnight and you never know when a hosting company (ISP, social media platform) might get hacked, violating your personal lives even further.
February 2015
The Many Lives of SecuritySecurity in our personal, professional, and mobile lives as newer technology causes overlap in areas that were distinct at one time. This issue also addresses the internet of things, a question and answer section, the importance of policy, comments to contemplate, and more.
January 2015
End of Year ReviewThe biggest security issues of 2014 to include top 5 security threats, notable data breaches, critical infrastructure protection, and the use of USB drives and data loss.