On the 18th of October, the Mayo Clinic Center for Social Media announced the publication of “Bringing the Social Media #Revolution to Health Care” (Mayo Clinic) – for those involved in the health care vertical and with social media responsibilities you owe it to yourself to get this book. More than 20 individual contributors made ...
Last updated byat .
17 October 2011 (#NCSAM – National Cyber Security Awareness Month) Encryption: To encrypt or not encrypt, that is the question (a hat tip to the Bard of Avon). In this day and age of digital data thefts, careless loss of hardware and infusion of crimeware / malware, in my opinion it pays to encrypt. When ...Tags: #NCSAM, crimeware, cyber security, encryption, full disk encryption, magnetic hard drive, malware, national cyber security awareness month, security, solid state drive, ssdInformation Security, News, Online Safety, Safety & Security
Those who have followed my writing on the subject of Wi-Fi security know my passion for taking seemingly basic steps to keep one’s wireless activity safe and secure. In a recent survey conducted by the Wi-Fi Alliance 86% of all respondents had taken the appropriate steps to secure their routers, but only 56% had taken the step to create a “hard” password, thus making themselves vulnerable to dictionary attacks or the like. So take three basic steps to keep yourself Wi-Fi secure:Tags: #NCSAM, cyber security, encryption, https, national cyber security awareness month, NCSAM 2011, network, online safety, passwords, public networks, routers, safety, security, WI-FI, wi-fi alliance, wirelessNews, Online Safety, Safety & Security
What’s SMISH? SMISH is Short Message Service (SMS) Phish or in the lexicon of the day, Text Message Phishing. What’s phishing? Phishing is a criminal action where you are engaged by a third-party with the specific goal of you providing private and sensitive information for nefarious purposes. The difference between SMISH (SMS Phish) and Email Phish (Phish) is only the avenue by which you are engaged by the criminal. How does it work?Tags: #NCSAM, bank, credit card, Crime, criminal, mobile, national cyber security awareness month, online safety, Phish, safety, security, smish, sms, text, textingNews, Online Safety, Safety & Security
If you don’t maintain the health of your device then you should expect that your device will at some point in the future become compromised in some way, shape or form. What type of compromises may occur? How often? What can you do? Let’s answer these in order…Tags: #NCSAM, Crime, cyber security, data, Facebook, family, friends, internet, internet safety, iPad, iPhone, IPod, location based services, malware, mobile, national cyber security awareness month, online safety, PEW, privacy, safety, security, sexting, smartphone, sms, texting, videoNews, Online Safety, Safety & Security
Do you or your children participate in online gaming, using your PC, smart phone or game box? Then you need to make sure you understand what’s going on, especially behind the curtain, when you configure your “game” settings. Here are eight online security tips to keep you safe and secure.Tags: #NCSAM, cyber security, Facebook, family, friends, game-id, in-real-life, malware, national cyber security awareness month, online gaming, online safety, passwords, players, privacy, safety, security, userid, webcamNews, Online Safety, Safety & Security
Location based services are here to stay, have great viability and absolutely increase the interaction between individuals and merchants, as well as serve to identify individuals with similar interest. Know that well intentioned services have a positive side, but also may also be used to your detriment. If you are satisfied with the answers to the questions in today’s post, then make your decision to share or not to share.Tags: #NCSAM, cyber security, family, friends, internet, location based services, national cyber security awareness month, online safety, privacy, safety, securityNews, Online Safety, Safety & Security
Today marks the start of National Cyber Security Awareness Month (NCSAM) in the United States. If you’re reading this piece you are on a social network and have a modicum of interest in your online security. Throughout the month (as I have for the past few years) I will be publishing snack size tips that you may wish to share (family, friends, colleagues, or whomever) so that all have a leg-up on keeping their online activities enjoyable, but also safe and secure.Tags: #NCSAM, cyber security, Facebook, family, friends, national cyber security awareness month, online safety, privacy, safety, securityNews, Online Safety, Safety & Security
In my research, I found it interesting that, with the ubiquitous nature of wireless connectivity within our homes and businesses, I was unable to find an example of where a Neighborhood Watch had integrated the identification of insecure wireless access points within their neighborhoods. I advocate including a wireless scan capability into Neighborhood Watch programs. Most people who have a wireless access point do nothing more than simply pull it out of the box, and plug it into the wall and their broadband service provider. Neighbors can help neighbors stay safe by letting them know when their wireless access point is in an open or insecure state.
Bully Bullying Cyberbullying Bullycide – These four words continue to appear with ever greater frequency in the lexicon of the modern American family. We hear these words on the evening news, in our newspapers, and online in all forums. We live in 2011, but to see how we treat one and other from afar, you’d think perhaps the calendar had rolled back a few centuries. You see – individuals be they young or not-so-young are bullied both at school and at work. The tragedy is, our youth of today, by and large are not prepared for today’s always-on world, even though they live it 24/7. The fact that in 2010 we lost 34 children where bullying was a principal issue in their decision to end their lives speaks volumes. There were 33 who committed suicide. Then there was one young man who was killed while trying to extricate his sibling from two bullies who were pummeling his sibling, he was shot and killed. Each of them has a story, I share these…
The following appeared in the Canadian online magazine Security Matters: Location Based Services: Do you know where your data is? Do you know where your data is? By Christopher Burgess Everywhere you look, retailers and other entities are offering to collect your data using one of the many location-based services available to collate your whereabouts ...
In October, I had the pleasure of being the guest on Talk2Cisco and to discuss social media and cyber security. Here is the write-up and recap of the event: Talk2Cisco . I took a moment and watched the video, and thought, this is something beneficial to small, medium and large businesses. I also think the ...Tags: christopher burgess, Cisco, Cisco Security, Information Technology, Infosec, security, Social Engineering, social media, Social Network, Talk2CiscoInformation Security, Safety & Security
My 2010 speaking schedule took me to all corners of the world. I traveled to Hong Kong, where I was honored to be an industry plenary speaker at the Interpol/Hong Kong Customs Intellectual Property Crime conference, also visited Canada, Toronto specifically, where I spoke at the Ontario government’s town hall, and not far from home, I was pleased to be asked to ...Tags: Arkansas, Canada, Cisco, CSI, Global Threat, Hong Kong, Identity, Intellectual Property, Interpol, IT, Mons, NATO, Ontario, security, SMCSEA, social media, Speaker, TorontoPresentations
By Christopher Burgess When you access your email each day, do you do so at a distance of 15 paces because you’re just not sure what might jump out of that inbox? You can just about anticipate an email detailing how another user has caused a “blip” that will stretch your capabilities to protect both ...Tags: christopher burgess, Cisco, Cisco Security, Connected World Report, Consumerization, IT Policy, security, Security Thought Leadership, social media, Social Network, Technology NewsInformation Security, News, Safety & Security
Today marks the beginning of National Cyber Security Awareness Month in the United States. I urge you to take a moment each day to educate yourself, your family, your colleagues on the need to be vigilant, proactive and engaged with respect to protecting your online persona and also your business. Your personal data and privacy ...
I recently spoke at an event in Seattle on the security aspects of Social Media, both from the business and personal perspective. One question which I fielded surrounded whether or not there is risk to children via the various social media networks (i.e., Facebook) or should one accept that if someone really wants to hurt ...Tags: children, Facebook, family, online safety, parents, privacy, security, social media, social networks, TwitterNews, Online Safety, Safety & Security
Five stars to Jakobsson & Ramzan for a most useful guide to understanding the underbelly of the internet. The strength exhibited by this book lies within the all-star lineup of contributors and the thorough dissection of the numerous forms of crimeware. Their book is a must read for anyone who has responsibility or an interest in protecting Personal Identifying Information (PII), Private Consumer Information (PCI) or Intellectual Property (IP).Tags: christopher burgess, Crime, crimeware, cyber secruity, education, Information Technology, Infosec, Intellectual Property, IP, malware, Online crime, online safety, pci, personal identifying information, pii, private consumer information, security, Security Thought Leadership, ThreatNews, Reviews
Miles and miles proved to be the mantra of 2009, as I traveled to all corners of the world again, speaking to industry and government on a wide variety of topics. The book, Secrets Stolen, Fortunes Lost proved to be a prognostication piece, as world events showed the threat vectors highlighted in the book, all ...Tags: christopher burgess, Corportae Espionage, Delaware, Industrial Espionage, Intellectual Property, IP, IP Theft, Rotman, security, Security Strategy, social media, TelusPresentations
The guide is a professional guide, with exemplars which can be used in a sandbox, or to assist you in noodling through specific infrastructure monitoring issues – such as “tuning” so the incident logs tell you the story, and don’t drown you in event data. This book should be in every incident responset team’s professional library.Tags: christopher burgess, cyber secruity, incident response, Information Technology, Infosec, infrastructure, monitoring, online security, security, security monitoring, ThreatInformation Security, News, Reviews
In 2008, the publication of Secrets Stolen, Fortunes Lost, proved to be the entree to a great many speaking engagements. Once again, I was invited to NATO’s information assurance conference, and to the AFIO annual intelligence symposium. All in all 2008, saw a diverse and exiciting schedule of events, all of which served to continue ...Tags: AFIO, ASIS, Burton Group, CASP, Crime, FIRST, HTCIA, Information Technology, Infosec, Intellectual Property, ISACA, ISSA, IT Risk, NATO, Risk Management, Secrets Stolen Fortunes Lost, security, Security Awareness, Security Education, Social Engineering, ThreatPresentations