Burglars don’t usually depend upon the light of the moon to break into homes; they depend on the daylight—because that’s when they know most homes are empty! The kids are in school, the adults are at jobs or shopping…duhhh, even a halfwit burglar knows this is an opportune time!
Therefore, you should get a home security system that’s designed to repel robbers in both the dead of day, not just night. This includes while you’re home. And when you are home, a burglary…Continue
Added by Robert Siciliano on April 30, 2015 at 3:56pm — No Comments
Added by Enrique Suarez on April 29, 2015 at 5:31pm — No Comments
Yes, it’s possible: preventing fraudsters from getting you via online trickery and other stealthy actions. Yes, it’s possible to be thinking one step ahead of cyber criminals. Let’s begin with e-mails—the conduit through which so many cyber crimes like ID theft occur.
Added by Robert Siciliano on April 29, 2015 at 4:19pm — No Comments
Well, you know that old saying: The viciousness of an online bully’s attack is inversely proportional to the size of his (you fill in the blank), I was thinking ego.
Many online bullies are female, but in the case of former Red Sox pitcher Curt Schilling’s daughter, the trolls are collectively male.
Recently Schilling tweeted how proud he was that his daughter, Gabby, will be playing softball as a pitcher for Salve Regina University. Schilling got a lot of…Continue
Added by Robert Siciliano on April 28, 2015 at 4:19pm — No Comments
Risk Leadership: What is the purpose of a policy or a framework?
I have seen many, many corporate policies and frameworks in my time. The one great…Continue
Added by Bryan Whitefield on April 28, 2015 at 1:00am — No Comments
Enrique Suarez Introducing:
Prof. Dr. MUJAHID KAMRAN is Vice Chancellor, University of the Punjab, Lahore,…Continue
Added by Enrique Suarez on April 27, 2015 at 12:29am — No Comments
It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate.
Added by Robert Siciliano on April 26, 2015 at 8:43pm — No Comments
“On the Internet, you can be ANYBODY!”
Not quite. Remaining anonymous in cyber space isn’t as easy as it used to be. Your browsing habits can be tracked, leading to your true identity. But there are things you can do to remain as anonymous as possible.
Added by Robert Siciliano on April 22, 2015 at 3:36pm — No Comments
You have a master password, from your password manager, for 28 accounts. Life has been so easy since!
But then you lose this master password. First off, you can’t fix this like you would if you forgot your password for PayPal or your credit card’s site. Plus, each password manager service has a different solution.
Yet how do you lose a master password in the first place? If it’s impossible to remember,then it may not be a good master password, regardless it…Continue
Added by Robert Siciliano on April 21, 2015 at 3:39pm — No Comments
Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses, varicella replicates itself, spreading though the body, and eventually appearing as itchy red blisters all over the body. But the virus doesn’t stop there; it can spread to other people through physical contact and through the air when an infected person coughs or sneezes. It’s not a very fun illness to have.
Viruses don’t just affect…Continue
Added by Robert Siciliano on April 20, 2015 at 3:48pm — No Comments
Added by Enrique Suarez on April 20, 2015 at 6:03am — No Comments
Added by Enrique Suarez on April 20, 2015 at 4:27am — No Comments
Edwards Deming described the purpose of an organization in New Economics, on page 51, as:
"The aim proposed here for any organization is for everybody to gain - stockholders, employees, suppliers, customers, community, the environment - over the long term."
Added by Enrique Suarez on April 20, 2015 at 4:17am — No Comments
Gee, it sounds like something out of one of those 1970s TV shows about government spies, but it’s reality: Plug this little thing into a wall socket and it records the keystrokes of a person nearby typing into a Microsoft wireless keyboard. The little gadget sends the information back to the gadget’s owner over the Internet.
The device looks like a USB wall charger, and this “KeySweeper” can be created with instructions from Samy Kamkar, a hardware hacker and…Continue
Added by Robert Siciliano on April 19, 2015 at 4:42pm — No Comments
Spring is in the air (if you’re in the northern hemisphere) and it’s traditionally a time to clean every nook and cranny and get rid of excess stuff in your house. But it’s also a good time to clean up your digital life. Just like your house, your digital life needs a good cleaning once in a while, but sometimes this can seem like a daunting task, so here’s some tips for you to get started.
First, begin by emptying your trash or recycle bin on your computer and…Continue
Added by Robert Siciliano on April 18, 2015 at 3:56pm — No Comments
The Baker/baker complex, as illustrated in Joshua Foer’s Moonwalking with Einstein, states that if you ask one person to remember a baker and another to remember a man named Baker; the person asked to remember the proper noun will struggle far more than the person asked to recall the bread maker.
Same word, two very different outcomes because one provides…Continue
Added by Steven Minsky on April 16, 2015 at 6:30pm — No Comments
The RIMS Risk Maturity Model, co-developed by LogicManager CEO, Steven Minsky, and the RIMS Risk Management Society, has been adopted by yet another governance body in an attempt to formalize how organizations achieve risk management competency.
Added by Steven Minsky on April 16, 2015 at 6:30pm — No Comments
WARNING: Removing this video surveillance camera to kill evidence of your robbery will do you chickenfeed because the video of you is being stored in the cloud!
Today’s security systems are so much more evolved than they were 20 years ago, even 10 years ago.
We’ve all heard of the bright light that goes on over the garage when someone steps onto the driveway. That’s so old that some burglars aren’t miffed by this in the least. However…such a motion…Continue
Added by Robert Siciliano on April 16, 2015 at 3:39pm — No Comments
What’s it called if, for example, someone runs up your credit card line without your permission? Identity theft. ID theft isn’t necessarily someone going around impersonating you. But it is considered someone taking over your accounts.
Account takeover is also someone hacking into your computer and getting the password for your PayPal account, then sucking it dry. ID theft is an extremely common occurrence. The damage incurred by ID theft runs along a continuum, from…Continue
Added by Robert Siciliano on April 15, 2015 at 3:38pm — No Comments