Posts tagged with: security

Customer Loyalty Sweepstakes: The winner engages the customer securely

The 2016 Nielsen report addressing customer loyalty,  “Allegiant Alignment: What Faithful Followers of Retail Loyalty Programs Want” based on the 2016 Nielsen Global Survey of Loyalty Sentiment polled more than 30,000 online consumers in 63 countries throughout Asia-Pacific, Europe, Latin... Read More

When do you introduce Security Awareness training?

[vc_row][vc_column width=”1/1″][text_output]A new employee shows up on day one and walks through his ID card briefing, compensation and benefits brief, and security brief, meets his new team and manager, and tries to retain all the information rushing out at him... Read More

IT Security Teams Enable Business – IBM Midsize Insider – December 2013

Writing for IBM Midsize Insider, Christopher Burgess discusses how IT security teams enable business.   Having an IT security team is an imperative for all companies, not just those in the enterprise space. This dedicated set of eyes is essential... Read More

Data Breach – Horizon Blue Cross – two data breaches in five years

Looking for information about the 2016 mis-mailing of EOB’s to Horizon Blue Cross Blue Shield of New Jersey (Horizon BCBSNJ) members?  Read-> Data Breaches Again at Horizon BCBSNJ Horizon Blue Cross Blue Shield of New Jersey – Two data breaches... Read More

Industrial Espionage in Small/Medium Enterprises – ThomasNet

  On 17 October 2013, ThomasNet ran a piece on industrial espionage (“Industrial Espionage Threats to SMEs Originate from Within“), and interviewed Prevendra’s CEO, Christopher Burgess on some of the fundamental issues and distinguishing the difference between ethical data collection... Read More

Secrets Stolen, Fortunes Lost

Secrets Stolen, Fortunes Lost, Preventing Intellectual Property Theft and Economic Espionage in the 21st Century (Syngress 2008 –  by Christopher Burgess and Richard Power) The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly... Read More

Prevendra: U.S. National Industrial Security – NISPOM Training Requirement

For U.S. Defense Contractors, the National Industrial Security Program Operating Manual (NISPOM) is the bible of process, procedure and how things are accomplished for every contractor.  Additionally, every cleared employee must be provided security training.  And you the contractor or... Read More

Security – Who is responsible?

Do you view your security posture in the office as more or less important in comparison to your residence? And how does that compare to the personal security profile that you exercise for you and your family? Who should be... Read More

Secure the Data! Big Data Analytics Can Help, IDG Connect, November 2012

“Secure the data!” That’s the claxon call that every chief security officer (CSO) or chief information security officer (CISO) hears 24/7/365 coming from their CEO, their customers and their partners. In the 12th century AD, the methodology of choice to... Read More

Bringing the Social Media #Revolution to Health Care (Mayo Clinic)

On the 18th of October, the Mayo Clinic Center for Social Media announced the publication of “Bringing the Social Media #Revolution to Health Care” (Mayo Clinic) – for those involved in the health care vertical and with social media responsibilities... Read More

Encrypt or not to encrypt, that is the question

17 October 2011 (#NCSAM – National Cyber Security Awareness Month) Encryption: To encrypt or not encrypt, that is the question (a hat tip to the Bard of Avon). In this day and age of digital data thefts, careless loss of... Read More

Wi-Fi: Three steps to stay safe when connecting via wireless

Those who have followed my writing on the subject of Wi-Fi security know my passion for taking seemingly basic steps to keep one’s wireless activity safe and secure. In a recent survey conducted by the Wi-Fi Alliance 86% of... Read More

SMISH smash, don’t let your accounts take a Phish bath

What’s SMISH? SMISH is Short Message Service (SMS) Phish or in the lexicon of the day, Text Message Phishing. What’s phishing? Phishing is a criminal action where you are engaged by a third-party with the... Read More

Mobile – Daily risks mitigated

If you don’t maintain the health of your device then you should expect that your device will at some point in the future become compromised in some way, shape or form. What type of compromises may occur? How... Read More

Game On! Eight tips to stay safe while playing online games

Do you or your children participate in online gaming, using your PC, smart phone or game box? Then you need to make sure you understand what’s going on, especially behind the curtain, when you configure your “game” settings. ... Read More

Location, Location, Location

Location based services are here to stay, have great viability and absolutely increase the interaction between individuals and merchants, as well as serve to identify individuals with similar interest. Know that well intentioned services have a positive side, but... Read More

Cyber Security Awareness: Are you?

Today marks the start of National Cyber Security Awareness Month (NCSAM) in the United States. If you’re reading this piece you are on a social network and have a modicum of interest in your online security. Throughout the... Read More

Online Safety: Neighborhood Watch Programs – WiFi

In my research, I found it interesting that, with the ubiquitous nature of wireless connectivity within our homes and businesses, I was unable to find an example of where a Neighborhood Watch had integrated the identification of insecure wireless access... Read More

Bullying: The 34 we lost in 2010 to Bullycide

Bully Bullying Cyberbullying Bullycide - These four words continue to appear with ever greater frequency in the lexicon of the modern American family. We hear these words on the evening news, in our newspapers, and online in all forums.... Read More

Do You Know Where Your Data Is?

The following appeared in the Canadian online magazine Security Matters:  Location Based Services: Do you know where your data is? Do you know where your data is? By Christopher Burgess  Everywhere you look, retailers and other entities are offering to... Read More
12