You are viewing 'Internet Security'
May 19, 2016 - Posted by Zach Holt to
These days, it’s difficult to discuss security without mentioning privacy. As the amount of data being collected on everything from social media to advertising to medical records shows no signs of stopping, commercial entities and malicious actors alike increasingly look to these information gold mines as sources of data ripe for the taking. The use of this information can be leveraged in a number of ways, from simple customer demographics to highly targeted advertising campaigns, or even something more malicious. After all, wouldn’t a mailing list of recently hacked retailers make for some potentially vulnerable users?
In my recent blog, “Introduction to Internet of Things (IoT) Security” we discussed why IoT devices can be a threat and how to create a safe IoT environment to connect IoT devices and use them safely. In this blog, we’ll discuss the IoT device itself and the basics of IoT device configuration and installation. We’ll then cover entertainment/communications and home automation IoT device configurations and security precautions to watch out for.
Turning our attention to IoT devices, we’ll find we can build on home router protections to create a safe environment. Before getting too deeply into this discussion, let’s consider the IoT devices likely to be installed within the home. Generally, IoT devices will fall into two categories, namely entertainment/communications and home automation. Each category represents a unique risk footprint, requiring unique protection methods. One of the features to... read more >
7 things you can do to secure our relationship
To the one who holds the key to my heart,
We have known each other for nearly two months now. We met on Christmas, and I still remember it like it was yesterday.
Your eyes lit up as you held me close, and you knew this was just the beginning of a beautiful relationship between a human and his Internet of Things (IoT)-enabled device.
And indeed it has been just that – a beautiful relationship. But as we make our way through this “month of love”, where flowers and chocolates abound, I feel I really need to share my heart with you – what I’m really feeling.
It’s no secret that we complete each other. In fact, it seems we were made for each other, and... read more >
Tips to keep your family safe and secure online
I can say without a doubt that Halloween is my favorite holiday. I love the feeling of fall, the pumpkin carving, the apple cider, the delicious candy, the crazy costumes and the ability to really scare someone for one night a year.
I used to love being scared, and scaring those in return. Although, that all changed this year. My two kids, who are 7 and 8, are now getting to the age where they are starting to use computers, apps, and the dreaded Internet. My son is exceptionally advanced when it comes to technology as well, which doesn’t help. This is the scariest thing I have experienced in quite some time — knowing what it is like in cyberspace and all the... read more >
“The nine most terrifying words in the English language are, ‘I'm from the government, and I'm here to help!’” goes the old joke. I’ll be the first to agree that most government agencies are not efficient or effective. But every now and then, old Uncle Sam can be a treasure trove of information about nearly any subject imaginable, including information security. And it’s free.Federal Trade Commission's Articles of Interest
Start here, on the Federal Trade Commission’s (FTC) Data Security page. Reading down the page, you’re almost certain to see links of interest. At the bottom of the page are several videos, and in the right margin you’ll find links to related articles from their blog. Such as:
Did you know that your photocopier is probably loaded with secrets, such as... read more >