Tuesday, August 4

Tools Apps Software

State Government Technology Response to COVID-19
Free, Guide, How-to Tips, Internet Crime, Jobs, Resources, Reviews, Social Media, Tools Apps Software, Virus

State Government Technology Response to COVID-19

How have government technology organizations responded to the global pandemic? What security actions were implemented in state government to address increasing COVID-19 cyberattacks? Where is this overall situation heading next as states begin to reopen? To answer these questions and much more, I can think of no better technology and cybersecurity leaders than Craig Orgeron and Jay White — the current CIO and CISO in Mississippi state government. Dr. Craig Orgeron was selected as...
Secure Development Without Sacrificing Innovation and Speed
Free, How-to Tips, Internet Crime, Resources, Reviews, Tools Apps Software

Secure Development Without Sacrificing Innovation and Speed

If you know the term “nightly build,” chances are you’ve been a part of that process before. A nightly build - or code compiled overnight from previously checked code - is a foundational way to find flaws or issues that arise from changes made during long build processes. But while a staple in DevOps, nightly builds also present a problem: if new bugs are discovered the following morning after the build, everything slows down. Additionally, such activity only heightens the wall between development and security by compartmentalizing the tasks developers and security professionals must undertake every day (or night). The history of the divide between security and development doesn’t fall solely on nightly builds, of course. It comes from a place of misconception, where developers fea...
Online Tips – Keeping Kids Safe [Video]
Dr Don, Free, Guide, How-to Tips, Internet Crime, Jobs, Marketing, Resources, Reviews, Scams Fraud, Social Media, Tools Apps Software, Virus

Online Tips – Keeping Kids Safe [Video]

Online Tips -Top cybersecurity tips for keeping kids safe online If you’re among the millions of people working from home while also trying to entertain and educate your kids during the coronavirus pandemic, we imagine things have been pretty chaotic. Were it not for the option of sitting your kids in front of a laptop for a few hours to do their schoolwork or play games, things might be even worse. But while the technology gives you a break, do you have complete peace of mind about your children’s safety online? The Internet can be a dangerous place, which is why we talk so often about the importance of secure browsing. We’re not only talking about parental controls, which, although they help you limit the kinds of activities that kids do online, don’t address a ...
How to conduct an ISO 27001 internal audit
Free, Guide, How-to Tips, Internet Crime, Make Money, Resources, Reviews, Tools Apps Software

How to conduct an ISO 27001 internal audit

If your organisation is to remain compliant with ISO 27001, you need to conduct regular internal audits. An ISO 27001 internal audit will check that your ISMS (information security management system) still meets the requirements of the standard. Regular audits can be beneficial, since they enable continual improvement of your framework. This post will explain how to audit ISO 27001. What is an internal audit? An ISO 27001 internal audit involves a thorough examination of your organisation’s ISMS to ensure that it meets the Standard’s requirements. Unlike a certification review, it’s conducted by your own staff, who will use the results to guide the future of your ISMS. The requirements of an internal audit are described in clause 9.2 of ISO 27001. Get started wit...
7 steps to a successful ISO 27001 risk assessment
Free, Guide, How-to Tips, Internet Crime, Resources, Reviews, Tools Apps Software

7 steps to a successful ISO 27001 risk assessment

Risk assessments are at the core of any organisation’s ISO 27001 compliance project. They are essential for ensuring that your ISMS (information security management system) – which is the result of implementing the Standard – addresses the threats comprehensively and appropriately. What is an information security risk assessment? In the context of information risk management, a risk assessment helps organisations assess and manage incidents that have the potential to cause harm to your sensitive data. The process involves identifying hazards – whether they are vulnerabilities that a cyber criminal could exploit or mistakes that employees could make. You then determine the level of risk they present and decide on the best course of action to prevent them from happ...
Free, How-to Tips, Internet Crime, Resources, Reviews, Scams Fraud, Tools Apps Software

BYOD: A trend rife with security concerns

Researchers explored the implications of allowing employees to bring their own devices for sensitive work tasks. Image: marchmeena29, Getty Images/iStockphoto A new report from cloud security company Bitglass found that employers are losing control of their enterprise's cybersecurity reins due to the explosion of the bring your own device (BYOD) trend.  Researchers surveyed IT professionals and cybersecurity workers to explore how organizations are dealing with the move toward allowing employee-purchased devices to be used within the workplace. Nearly 70% of re...
Free, How-to Tips, Internet Crime, Jobs, Marketing, Resources, Reviews, Tools Apps Software, Virus

Microsoft Cloud App Security: This software can help you to manage shadow IT and boost productivity

How to use shadow IT discovery in Microsoft Cloud App Security to help remote workers stay secure and save bandwidth. With so many people working from home due to COVID-19, cloud applications have become the way to stay connected and get work done, whether that's with Teams, Office 365, Salesforce, Zoom, virtual desktops – or something you've never heard of that an employee has found for themselves and started using. Even more than in an office, the proliferation of cloud apps can turn into a shadow IT security worry – and depending on how access to company data is set up, it might impact home internet bandwidth. The cloud app discovery tools i...
Free, How-to Tips, Internet Crime, Jobs, Tools Apps Software

Cloud environments are making the security alert overload problem worse

Companies say that automation helps ease the burden but most have a long way to go to reach full implementation, according to new survey. A new survey commissioned by Sumo Logic found that most companies have started to automate the triage of security alerts but most are at the beginning of this transformation. Image: Sumo Logic Slow-moving automation efforts and an increase in cloud environments are intensifying the alert overload crisis for security teams, according to a new study.The "2020 State of SecOps and Automation" report found that IT infrastructure is changing faste...
Free, How-to Tips, Internet Crime, Resources, Reviews, Social Media, Tools Apps Software

Microsoft warns organizations of consent phishing attacks

In this type of phishing campaign, attackers trick people into giving a malicious app consent to access sensitive data, says Microsoft. Image: weerapatkiatdumrong, Getty Images/iStockphoto Phishing campaigns are a common tactic in which cybercriminals impersonate a well-known company, product, or brand to steal account credentials, financial information, or other data from unsuspecting victims. A typical phishing attack convinces the user to directly enter their password and login credentials, which are then captured by the attacker.But a more specialized type of campaign kno...
Free, Guide, How-to Tips, Internet Crime, Jobs, Resources, Reviews, Tools Apps Software

Highest-paying tech jobs: Where to find them

Find out what tech jobs and skills are most in-demand and where the positions are located. Image: Getty Images/iStockphoto Tech jobs remain in demand, with some positions offering hefty compensation. According to a Global Knowledge survey, IT professionals in the US are experiencing their highest ever average salary at $113,639. Global Knowledge's IT Skills and Salary Report determined the average IT salaries in the US, Canada, and Europe, uncovering the highest-paying and lowest-paying locations. SEE: IT job and salary guide: Highest tech salaries, top-paying cities, and compensation-boosting tips (TechRepublic Premium)Of course, a...