Posts filed under:Safety & Security

Cyber Security Awareness: Are you?

Today marks the start of National Cyber Security Awareness Month (NCSAM) in the United States. If you’re reading this piece you are on a social network and have a modicum of interest in your online security. Throughout the month (as I have for the past few years) I will be publishing snack size tips that you may wish to share (family, friends, colleagues, or whomever) so that all have a leg-up on keeping their online activities enjoyable, but also safe and secure.

Medical Device Security – Are your devices secure?

Many medical devices have telemetry requirements, which require patient data to be both present within the device’s resident memory and to be transmitted from the device to a monitoring or record-preservation device (hard drive or tape). During transmission, are the content or command/control sequences protected? Do they need to be? Unfortunately, yes. The data must be protected not only from a PHI-data disclosure perspective, but also from data corruption perspective.

  • TwitterBot-Names
  • TwitterBot-Names
  • Spam Bot User
  • Spam Bot User

Online Safety: Are bots in your twitter following?

Yesterday I had a an interesting sequence of events happen within my Twitter footprint that I had not seen previously. I had 11+ new followers, all who had over 100, some over 1000 followers. These new followers all arrived in my follower list in sequence over the course of the early morning. Each of these *individuals* had sent between 2-10 tweets, none of which were original content – all of them being RT (re-tweets) of pieces from trusted sources such as Mashable.

The Twitter handle/name had the format of “given name” + “3 to 5 random characters”. Click on the Figure-1 o the left to see all of these names which arrived in my follower list and you’ll understand the naming convention. Every single one of these names is a “bot” generated name.

read more…

Online Safety: Cyberbullying those who are different – Trust the Movie

In David Schwimmer’s TRUST, the teenage character Annie finds herself the subject of great deal of unwanted and undeserved attention by her high school classmates in a manner in which constituted to all would be unacceptable and falls within the realm of cyberbullying (as the bullying occurred using online media). We all have encountered instances where those who did not conform or who had experienced something not of the ordinary come under undo scrutiny and are isolated for the experience by their peers. The scrutiny often times manifests itself into ridicule, sarcasm or insults as those who are observing from afar attempt to differentiate and exclude themselves from the experience.

By: | Featured, Safety & Security, News, Bullying, Online Safety| Tags: | Comments: Comments Off on Online Safety: Cyberbullying those who are different – Trust the Movie

Trust: Bad things can happen to good children (online safety)

In David Schwimmer’s TRUST, bad things happen to Annie, a good child. She is by all appearances a typical teenager – totally wired, online and available, 24/7/365. In the physical world, parents see with whom their child interacts. As the parents witness this interaction they are able to help guide and influence their child’s choices. The number one rule for every family: “The child must not engage in any personal meetings with an individual whom they have only met online without explicit parental permission.”

By: | Featured, Safety & Security, Reviews, News, Online Safety| Tags: | Comments: Comments Off on Trust: Bad things can happen to good children (online safety)

Online Safety: Neighborhood Watch Programs – WiFi

In my research, I found it interesting that, with the ubiquitous nature of wireless connectivity within our homes and businesses, I was unable to find an example of where a Neighborhood Watch had integrated the identification of insecure wireless access points within their neighborhoods. I advocate including a wireless scan capability into Neighborhood Watch programs. Most people who have a wireless access point do nothing more than simply pull it out of the box, and plug it into the wall and their broadband service provider. Neighbors can help neighbors stay safe by letting them know when their wireless access point is in an open or insecure state.

Bullying: The 34 we lost in 2010 to Bullycide

Bully Bullying Cyberbullying Bullycide – These four words continue to appear with ever greater frequency in the lexicon of the modern American family. We hear these words on the evening news, in our newspapers, and online in all forums. We live in 2011, but to see how we treat one and other from afar, you’d think perhaps the calendar had rolled back a few centuries. You see – individuals be they young or not-so-young are bullied both at school and at work. The tragedy is, our youth of today, by and large are not prepared for today’s always-on world, even though they live it 24/7. The fact that in 2010 we lost 34 children where bullying was a principal issue in their decision to end their lives speaks volumes. There were 33 who committed suicide. Then there was one young man who was killed while trying to extricate his sibling from two bullies who were pummeling his sibling, he was shot and killed. Each of them has a story, I share these…

ABA resolution addressing Bullying and Cyberbullying

Kudos to the American Bar Association (ABA) for amending and adopting their resolution 107A which urges “… federal, state, tribal, territorial, and local officials, to prevent and remediate the existence and dangers of bullying, including cyberbullying and youth-to-youth sexual and physical harassment.” In my view this is very much a step in the right direction…

Safer Internet Day 2011 – It’s more than a game, its your life

Today, February 8, 2011 is Safer Internet Day. It’s more than a game, its your life. One can’t over emphasize how important it is to pay attention when you and your family are online. The internet is integral to our daily lives. Online is where we live and we need to stay safe online.

Here are a eleven tips to achieve that goal:

By: | Featured, Safety & Security, News, Online Safety| Tags: | Comments: Comments Off on Safer Internet Day 2011 – It’s more than a game, its your life

How does my child access the internet? With whom is my child engaging?

A question which every parent should be asking themselves, “How does my child access the internet?” “With whom is my child engaging?” The array of answers may startle you. So make no assumptions. Why does it matter? Knowing how your child accesses the internet and with whom they are engaging are the first steps in crafting an online safety plan for your child. I have said it before and will repeat, our family is our responsibility.

How does my child access the internet? With whom is my child engaging?

Digital Birmingham A question which every parent should be asking themselves, “How does my child access the internet?” “With whom is my child engaging?” The array of answers may startle you. So make no assumptions. Why does it matter? Knowing […]

By: | Online Safety| Tags: | Comments: Comments Off on How does my child access the internet? With whom is my child engaging?

Passwords – Creation & Usage – Online Safety & Security

Do you use a password? The evolution of online crime is as much about your password strength as it is about your password usage. If you use your strong password for shopping site A and then reuse the password for shopping sites B, C, D, E, F then you are basically saying to yourself – “I trust each of these sites to have the same robust level of security”

Do You Know Where Your Data Is?

The following appeared in the Canadian online magazine Security Matters:  Location Based Services: Do you know where your data is? Do you know where your data is? By Christopher Burgess  Everywhere you look, retailers and other entities are offering to […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on Do You Know Where Your Data Is?

Social Media and Cyber Security (Talk2Cisco)

In October, I had the pleasure of being the guest on Talk2Cisco and to discuss social media and cyber security.  Here is the write-up and recap of the event: Talk2Cisco .  I took a moment and watched the video, and […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on Social Media and Cyber Security (Talk2Cisco)

Bullycide – My Time Has Come and So I’m Gone

No doubt you are aware of the tragic loss of life which occurred in Cooperstown, North Dakota late last week, when 16 year old Cassidy Joy Andel, posted a disquieting message upon her Facebook page, “My time has come, and […]

Are You a Demanding User?

By Christopher Burgess Do you work for an enterprise or a small-to-medium-size business? If so, odds are you have an information technology department supporting you. If you work for yourself, you may leverage the knowledge of others in cobbling together […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on Are You a Demanding User?

Out of Control User = Frenetic IT

By Christopher Burgess When you access your email each day, do you do so at a distance of 15 paces because you’re just not sure what might jump out of that inbox? You can just about anticipate an email detailing […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on Out of Control User = Frenetic IT