Be aware of what you share! Savvy cybercriminals want data. From your personal credit card information to your company’s most important intellectual property, they work diligently to quietly steal it all. Be aware of their more typical tactics and learn basic security measures to ensure you aren’t their next victim.
How to Protect Yourself
- Nine Steps to Take if Your Credit Card Data is Hacked
Fox Business News August 30, 2011
What can you do if your credit card information is stolen because some third-party company got hacked? It’s an important question to ask, especially given how frequently credit card data breaches make headlines.
- What You Need to Know About Facebook Security and Privacy Settings
CIO April 21, 2011
When you disclose as much personal information as many of us do on Facebook, it’s important to know when changes in privacy occur, when security updates go live and when new features roll out.
- How to Remove Yourself from People Search Websites
ZDNet August 16, 2011
People search services provide the general public with a dangerous amount of personal information about you. Here’s how to opt-out of most, for now.
- 10 Travel Tips for Protecting Your Privacy
Mashable August 6, 2011
Exercise a little common sense and follow these privacy tips to help protect your personal information and ensure safe travel.
- Cybercriminals Know Everything About You
The Wall Street Journal Blog September 1, 2011
If you want to know just how sophisticated and targeted cyber attacks can be, consider one so-called spear phishing attack against a well-known public figure.
Technology to ward off hackers and the policies and processes that guide those tools cannot be effective without the involvement of your end-users and line of business leaders. You need to have support and participation from these two audiences if IT is to be successful in the daily battle against cyber security threats and risks. To help IT get started on building a better understanding across your organization, we’ve created a few resources for you to share.
Thank you for reading IT Blog