Posts tagged with: security

Bringing the Social Media #Revolution to Health Care (Mayo Clinic)

On the 18th of October, the Mayo Clinic Center for Social Media announced the publication of “Bringing the Social Media #Revolution to Health Care” (Mayo Clinic) – for those involved in the health care vertical and with social media responsibilities […]

Encrypt or not to encrypt, that is the question

17 October 2011 (#NCSAM – National Cyber Security Awareness Month) Encryption: To encrypt or not encrypt, that is the question (a hat tip to the Bard of Avon). In this day and age of digital data thefts, careless loss of […]

Wi-Fi: Three steps to stay safe when connecting via wireless

Those who have followed my writing on the subject of Wi-Fi security know my passion for taking seemingly basic steps to keep one’s wireless activity safe and secure. In a recent survey conducted by the Wi-Fi Alliance 86% of all respondents had taken the appropriate steps to secure their routers, but only 56% had taken the step to create a “hard” password, thus making themselves vulnerable to dictionary attacks or the like.
So take three basic steps to keep yourself Wi-Fi secure:

SMISH smash, don’t let your accounts take a Phish bath

What’s SMISH? SMISH is Short Message Service (SMS) Phish or in the lexicon of the day, Text Message Phishing. What’s phishing? Phishing is a criminal action where you are engaged by a third-party with the specific goal of you providing private and sensitive information for nefarious purposes. The difference between SMISH (SMS Phish) and Email Phish (Phish) is only the avenue by which you are engaged by the criminal.
How does it work?

Mobile – Daily risks mitigated

If you don’t maintain the health of your device then you should expect that your device will at some point in the future become compromised in some way, shape or form.
What type of compromises may occur? How often? What can you do?
Let’s answer these in order…

Game On! Eight tips to stay safe while playing online games

Do you or your children participate in online gaming, using your PC, smart phone or game box? Then you need to make sure you understand what’s going on, especially behind the curtain, when you configure your “game” settings. Here are eight online security tips to keep you safe and secure.

Location, Location, Location

Location based services are here to stay, have great viability and absolutely increase the interaction between individuals and merchants, as well as serve to identify individuals with similar interest. Know that well intentioned services have a positive side, but also may also be used to your detriment. If you are satisfied with the answers to the questions in today’s post, then make your decision to share or not to share.

Cyber Security Awareness: Are you?

Today marks the start of National Cyber Security Awareness Month (NCSAM) in the United States. If you’re reading this piece you are on a social network and have a modicum of interest in your online security. Throughout the month (as I have for the past few years) I will be publishing snack size tips that you may wish to share (family, friends, colleagues, or whomever) so that all have a leg-up on keeping their online activities enjoyable, but also safe and secure.

Online Safety: Neighborhood Watch Programs – WiFi

In my research, I found it interesting that, with the ubiquitous nature of wireless connectivity within our homes and businesses, I was unable to find an example of where a Neighborhood Watch had integrated the identification of insecure wireless access points within their neighborhoods. I advocate including a wireless scan capability into Neighborhood Watch programs. Most people who have a wireless access point do nothing more than simply pull it out of the box, and plug it into the wall and their broadband service provider. Neighbors can help neighbors stay safe by letting them know when their wireless access point is in an open or insecure state.

Bullying: The 34 we lost in 2010 to Bullycide

Bully Bullying Cyberbullying Bullycide – These four words continue to appear with ever greater frequency in the lexicon of the modern American family. We hear these words on the evening news, in our newspapers, and online in all forums. We live in 2011, but to see how we treat one and other from afar, you’d think perhaps the calendar had rolled back a few centuries. You see – individuals be they young or not-so-young are bullied both at school and at work. The tragedy is, our youth of today, by and large are not prepared for today’s always-on world, even though they live it 24/7. The fact that in 2010 we lost 34 children where bullying was a principal issue in their decision to end their lives speaks volumes. There were 33 who committed suicide. Then there was one young man who was killed while trying to extricate his sibling from two bullies who were pummeling his sibling, he was shot and killed. Each of them has a story, I share these…

Do You Know Where Your Data Is?

The following appeared in the Canadian online magazine Security Matters:  Location Based Services: Do you know where your data is? Do you know where your data is? By Christopher Burgess  Everywhere you look, retailers and other entities are offering to […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on Do You Know Where Your Data Is?

Social Media and Cyber Security (Talk2Cisco)

In October, I had the pleasure of being the guest on Talk2Cisco and to discuss social media and cyber security.  Here is the write-up and recap of the event: Talk2Cisco .  I took a moment and watched the video, and […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on Social Media and Cyber Security (Talk2Cisco)
  • Cisco

2010 – Presentations by Christopher Burgess

My 2010 speaking schedule took me to all corners of the world.  I traveled to Hong Kong, where I was honored to be an industry plenary speaker at the Interpol/Hong Kong Customs Intellectual Property Crime conference, also visited Canada, Toronto specifically, where I spoke at the […]

By: | News, Presentations| Tags: | Comments: Comments Off on 2010 – Presentations by Christopher Burgess

Out of Control User = Frenetic IT

By Christopher Burgess When you access your email each day, do you do so at a distance of 15 paces because you’re just not sure what might jump out of that inbox? You can just about anticipate an email detailing […]

By: | Safety & Security, News, Information Security| Tags: | Comments: Comments Off on Out of Control User = Frenetic IT

Online Safety: Today Begins National Cyber Security Awareness Month

Today marks the beginning of National Cyber Security Awareness Month in the United States. I urge you to take a moment each day to educate yourself, your family, your colleagues on the need to be vigilant, proactive and engaged with […]

Our Family Is Our Responsibility

I recently spoke at an event in Seattle on the security aspects of Social Media, both from the business and personal perspective.  One question which I fielded surrounded whether or not there is risk to children via the various social […]

By: | Safety & Security, News, Online Safety| Tags: | Comments: Comments Off on Our Family Is Our Responsibility
  • Crimeware

Crimeware – a book review by Christopher

Five stars to Jakobsson & Ramzan for a most useful guide to understanding the underbelly of the internet. The strength exhibited by this book lies within the all-star lineup of contributors and the thorough dissection of the numerous forms of crimeware. Their book is a must read for anyone who has responsibility or an interest in protecting Personal Identifying Information (PII), Private Consumer Information (PCI) or Intellectual Property (IP).

By: | Reviews, News| Tags: | Comments: 1

2009 – Presentation by Christopher Burgess

Miles and miles proved to be the mantra of 2009, as I traveled to all corners of the world again, speaking to industry and government on a wide variety of topics.  The book, Secrets Stolen, Fortunes Lost proved to be […]

By: | News, Presentations| Tags: | Comments: Comments Off on 2009 – Presentation by Christopher Burgess
  • Security Monitoring

Security Monitoring – a book review by Christopher

The guide is a professional guide, with exemplars which can be used in a sandbox, or to assist you in noodling through specific infrastructure monitoring issues – such as “tuning” so the incident logs tell you the story, and don’t drown you in event data. This book should be in every incident responset team’s professional library.

By: | Reviews, News, Information Security| Tags: | Comments: Comments Off on Security Monitoring – a book review by Christopher

2008 – Presentations by Christopher Burgess

In 2008, the publication of Secrets Stolen, Fortunes Lost, proved to be the entree to a great many speaking engagements.  Once again, I was invited to NATO’s information assurance conference, and to the AFIO annual intelligence symposium.  All in all […]

By: | News, Presentations| Tags: | Comments: Comments Off on 2008 – Presentations by Christopher Burgess