Tags » Cyber Security

Examining the Financial Trade-Off to Securing your Organization

What is perfect security? Does it mean that there can be no break-ins, no stolen credentials, no lost data? Is that a good goal?

One of the first things we discuss in… 486 more words

Cyber Security

Training End Users to Defend Against Cyber Attacks

The title is from the refrain of a song that was popular many years ago, “Where have all the flowers gone” that was sung by Peter, Paul and Mary. 444 more words

Cyber Security

Check Your Online Security With "Have I Been Pwned?"

How To Find Out If You’ve Been Hacked In Under A Minute

” If it feels like the Internet is plagued by seemingly constant cybersecurity breaches, sometimes the best thing you can do is find out if your usernames and passwords are already owned by an enterprising criminal.

133 more words
Privacy

Making passwords complex but memorable

Readers of this blog will be aware of a recurring theme of IT security and in particular the theme of making passwords difficult for hackers to guess or “crack”. 518 more words

Cyber Security

The Connection Between Software Design and Software Security

Wired reported in early June of this year that there has been a bug in the popular OpenSSL for over a decade that could allow bad guys to eavesdrop on connections, including VPN connections. 468 more words

Cyber Security

Three New Trends in Authentication

Frequent readers of this blog will know that I tend to follow trends in authentication and that I am interested in making good-quality authentication commonplace. Recently three topics in authentication caught my attention, and I’d like to share them with you. 386 more words

Cybersecurity

Google Follows Apple in Encrypting Phone Data by Default

All this marks a clear backlash from the wave of Snowden leaks



from Gizmodo UK http://ift.tt/1mmmTfH
via IFTTT

News

Chris reblogged this on —KnoGimmicks.com™— Digital News and commented:

Google: "As part of our next Android release, encryption will be enabled by default out of the box, so you won't even have to think about turning it on." Tech companies are getting smart and enabling features— by default or automatically to prevent user data from being stolen or looked at. With all of the cyber threats, hacking in to pay systems and information for marketing being used, why did it take so long? Well, I believe I can tell you why. If the information is not accessible to government, then perhaps this may have been a clause for government to say that it should not be accessible to companies— really doesn't make sense as the Gizmodo article states, that user data is still up on servers. The only way to stay off the radar is to go off the grid. No one's information is safe. As end-users, you just need to be wise.