Menu

Blogs

Showing Blog Posts: 1–10 of 29 tagged Security Awareness

  • The Dangers of Skimmers and Safes in Hotel Rooms

    by Dale "Woody" Wooden on June 6, 2016

    This is part two of my series on hotel safety for protecting intellectual property and personal information. We will be starting where my past article “Executive Hotel Rooms Are A Hackers Treasure Chest” ended. You’re in your room and ready for bed. You put your wallet or purse on the nightstand and settle down for sleep. That is where the fun begins. You have heard about RF skimmers—the product…

  • What Do Hackers Want from Professional Sports Teams?

    by Rook Security on June 2, 2016

    By Mike Patterson, Vice President of Strategy, Rook Security Recently, the Milwaukee Bucks basketball organization went public with a successful W-2 phishing attack that targeted its players and employees. While this is probably not the first attack of its kind, it is a new known data point in attacks against sports teams. In 2015, incidents targeted baseball player scouting data (involving the St. …

  • Japanese Users Need to Be More Proactive About Cybersecurity

    by Jennifer Lawinski on May 24, 2016

    When it comes to cybersecurity, many users in Japan don't practice what they preach. According to the ESET Japan Cyber-Savviness Report 2016, users in Japan are well informed about cybersecurity and tend to shy away from taking risks online, but they still have a ways to go before they are adequately protected from cybercrime. More than 70 percent of Japanese survey respondents said they didn't…

  • The Most Overlooked Ways to Prevent Getting Hacked

    by Caitlin Moriarity on May 17, 2016

    In a world where cybersecurity threats are continually evolving, you'd be surprised how simple it is to prevent getting hacked. "The difference between a company that gets hacked and the company that doesn't get hacked, I've found," says Norman Guadagno, chief evangelist at Carbonite, "is the difference between who clicks a link in their email, and who doesn’t." Threats are everywhere All business…

  • Executive Hotel Rooms Are a Hacker’s Treasure Chest

    by Dale "Woody" Wooden on April 15, 2016

    The flight was long, and all you want to do now is get to your room, have a drink, and go to sleep. You sit down at the desk in your room, log onto the hotel’s Wi-Fi and log into your email. This is about the time your phone beeps. It’s almost dead. Luckily, your room has a charging station right on the desk… How convenient! The iPod needs to be charged too, so it is slipped into the hotel’s…

  • RSA Conference 2016: Security of Public Cloud Services—It Takes a Village

    by Ben Rothke on April 5, 2016

    At the RSA conference last month, I lead a Peer2Peer session on the topic of Security of Public Cloud Services: It Takes a Village. I and 25 others discussed the notion that cloud services are inherently a shared responsibility model. Far too many corporate users of cloud services often don’t realize that while the cloud provider may have every attestation from PCI to SSAE-16, that means nothing…

  • Breaking Through to Users for Better Security, Inside Out

    by Jack Danahy on February 16, 2016

    In today’s world of big data, some of the most valuable information you can collect is simple insight into the people you’re trying to protect. Your users are all different, and to reach them you need to tailor your messages to address their individual interests, concerns, and needs. That’s where “personas” come in—by developing profiles of various types of users you can learn how to communicate…

  • Death to Shelfware: 5 Steps for Buying the Security You Actually Need

    by RSAC Contributor on January 4, 2016

    At a time when the industry is urging for increased investment in security, we’re also seeing plenty of security products gathering dust. Efforts to do more are not bringing the expected results, mainly because there is a rush to solve the problem, and not enough time spent understanding how various threats fit together. Consider the five-step program below to improve the likelihood that the…

  • How to Enjoy the Holidays in Peace (While Keeping the Network Secure)

    by Tony Bradley on December 10, 2015

    I’m not sure why we even bother showing up to work in the month of December. The first week is spent coming down off of the Thanksgiving-gluttony food coma and frantically shopping online during work hours to find holiday gift bargains. We show up for the next two weeks because of a mandatory requirement to be physically present (even though you’ve already mentally checked out) and you’re just…

  • How to Stay Safe on Cyber Monday

    by Jennifer Lawinski on November 30, 2015

    Tis the season for online fraud. And this year's Cyber Monday is expected to give cybercriminals more potential victims than ever before. Adobe expects online shoppers will spend more than $3 billion online today, and that's just the tip of the iceberg. More than 270 million shoppers are expected to spend more than $83 billion throughout the holiday season, and more than half of those purchases…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Thu, 29 Sep 2016 02:45:07 -0400.
© 2016 EMC Corporation. All rights reserved.