Category Archives: Online Security

What Policies Appear On Your Website?

Like many businesses, you probably maintain Facebook, Twitter, YouTube, and LinkedIn accounts to promote your product or service. If your leadership and IT teams listen to your marketing and PR teams, these social sites link back to your main website. … Continue reading

Posted in Online Privacy, Online Security, Privacy Rights, Terms of Service | Tagged , , | Leave a comment

The Newest Event at the Olympics: Electronics Hacking

If you own a business, you should be very worried for the next couple of weeks. You may not be making any large purchases, hiring entire departments of personnel, or launching new products, but your data may be at risk … Continue reading

Posted in Business Process, BYOD, Cybersecurity, Data Security, Management and Technology, Network Security, Online Privacy, Online Security, Tech Equipment | Tagged , , | Leave a comment

How Secure Are Your BYOD Devices in the Workplace?

By now, everyone in the business world knows what the four initials BYOD mean. But if not, it stands for Bring Your Own Device to work. This means that, for a variety of reasons, employees bring their smartphones and tablets … Continue reading

Posted in Business Process, BYOD, Data Security, Management and Technology, Mobile Computing, Network Security, Online Security, Tech Equipment | Tagged , | 2 Comments

Privacy vs. Security

It seems as if everyone is talking about privacy – or wait, is it security? First there was the WikiLeaks data leak by Julian Assange; then there was the NSA data leak by Edward Snowden which brought to light the … Continue reading

Posted in Cybersecurity, Data Security, Network Security, Online Privacy, Online Security, Privacy Rights | Tagged | Leave a comment

What Can Recent Data Breaches Teach Your Business?

There have been several data breaches in the news recently, and they should incite fear in your C-suite. Don’t think that your business is immune to a data breach, because it isn’t. Since this could happen to your business – … Continue reading

Posted in Business Process, Data Security, Disaster Recovery, Network Security, Online Security | Leave a comment

Does Your Business Conduct Undercover Reconnaissance on Your Customers?

Last year, there was a story in the news that an international airline would conduct Google searches on its passengers in an effort to create customized experiences for its repeat travelers. The head of customer analysis of British Airways explained … Continue reading

Posted in Business Process, Data Security, Network Security, Online Privacy, Online Security, Privacy Rights, Social Media | Leave a comment

Is Your Business Ready for Cyber Monday?

Cyber Monday is the day when all employers cringe. This is because many employees will spend a portion of their day making online holiday purchases instead of working. “Cyber Monday is the Monday after Black Friday, the Friday following Thanksgiving … Continue reading

Posted in Data Security, Mobile Computing, Online Privacy, Online Security, Social Media | 1 Comment

Webcams May Be Watching You – Without Your Knowledge

You just purchased some new monitors with built-in webcams and speakers or you added external webcams. Now your employees can easily make video conference calls and speak to each other face to face, even when they’re off-site. You may think … Continue reading

Posted in Mobile Computing, Online Privacy, Online Security, Privacy Rights, Tech Equipment, Telecommuting | Leave a comment

Tips for Internet Safety Month (and the Other 11 Months Too)

June has been designated as Internet Safety Month. While I believe it’s important to bring the topic of Internet safety to the forefront for discussion, I also believe it’s important to practice safe online surfing every day all year long. … Continue reading

Posted in Mobile Computing, Online Privacy, Online Security, Social Media | Leave a comment

Internet of Things? More Like the Internet of Attack Vectors

Everyone is excited about the “Internet of Things,” also known as, IoT. Imagine, cars able to talk to other cars, devices able to contact repair facilities when repairs are needed, cars able to connect to the traffic grid, and refrigerators … Continue reading

Posted in Data Security, Internet of Things, Network Security, Online Security | Leave a comment