You are viewing 'Internet Security'

eSymposium: Privacy and Security

Zach Holt

May 19, 2016 - Posted by Zach Holt to

Privacy and Security

These days, it’s difficult to discuss security without mentioning privacy. As the amount of data being collected on everything from social media to advertising to medical records shows no signs of stopping, commercial entities and malicious actors alike increasingly look to these information gold mines as sources of data ripe for the taking. The use of this information can be leveraged in a number of ways, from simple customer demographics to highly targeted advertising campaigns, or even something more malicious. After all, wouldn’t a mailing list of recently hacked retailers make for some potentially vulnerable users?

After pondering on that thought for a moment, it may come as no surprise that the average user is becoming increasingly concerned about their privacy. A recent study by the... read more >

Basics of Internet of Things (IoT): Device Configuration and Installation

Vance Baker

February 25, 2016 - Posted by Vance Baker to Security Insight

Internet of Things

In my recent blog, “Introduction to Internet of Things (IoT) Security” we discussed why IoT devices can be a threat and how to create a safe IoT environment to connect IoT devices and use them safely. In this blog, we’ll discuss the IoT device itself and the basics of IoT device configuration and installation. We’ll then cover entertainment/communications and home automation IoT device configurations and security precautions to watch out for.

Turning our attention to IoT devices, we’ll find we can build on home router protections to create a safe environment. Before getting too deeply into this discussion, let’s consider the IoT devices likely to be installed within the home. Generally, IoT devices will fall into two categories, namely entertainment/communications and home automation. Each category represents a unique risk footprint, requiring unique protection methods. One of the features to... read more >

A Valentine Love Letter from Your IoT-enabled Device

7 things you can do to secure our relationship

Aaron Perkins

February 11, 2016 - Posted by Aaron Perkins to Security Insight

IoT Love

To the one who holds the key to my heart,

We have known each other for nearly two months now. We met on Christmas, and I still remember it like it was yesterday.

Your eyes lit up as you held me close, and you knew this was just the beginning of a beautiful relationship between a human and his Internet of Things (IoT)-enabled device.

And indeed it has been just that – a beautiful relationship. But as we make our way through this “month of love”, where flowers and chocolates abound, I feel I really need to share my heart with you – what I’m really feeling.

It’s no secret that we complete each other. In fact, it seems we were made for each other, and... read more >

Halloween Cyberspooktacular

Tips to keep your family safe and secure online

Robert Clauff

October 30, 2015 - Posted by Robert Clauff to Security Insight

I can say without a doubt that Halloween is my favorite holiday. I love the feeling of fall, the pumpkin carving, the apple cider, the delicious candy, the crazy costumes and the ability to really scare someone for one night a year.

I used to love being scared, and scaring those in return. Although, that all changed this year. My two kids, who are 7 and 8, are now getting to the age where they are starting to use computers, apps, and the dreaded Internet. My son is exceptionally advanced when it comes to technology as well, which doesn’t help. This is the scariest thing I have experienced in quite some time — knowing what it is like in cyberspace and all the... read more >

InfoSec Tips from the Federal Trade Commission

Bob Bybee

July 30, 2015 - Posted by Bob Bybee to Security Insight

Federal Trade Commission

“The nine most terrifying words in the English language are, ‘I'm from the government, and I'm here to help!’” goes the old joke. I’ll be the first to agree that most government agencies are not efficient or effective. But every now and then, old Uncle Sam can be a treasure trove of information about nearly any subject imaginable, including information security. And it’s free.

Federal Trade Commission's Articles of Interest

Start here, on the Federal Trade Commission’s (FTC) Data Security page. Reading down the page, you’re almost certain to see links of interest. At the bottom of the page are several videos, and in the right margin you’ll find links to related articles from their blog. Such as:  

Did you know that your photocopier is probably loaded with secrets, such as... read more >

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Older Entries >>

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)

LATEST TWEETS