More than 40 percent of government employees are putting themselves and their agencies at risk with their mobile device habits, according to Cisco and the Mobile Work Exchange’s report “The 2014 Mobilometer Tracker: Mobility, Security, and the Pressure In Between.” As part of the study, an assessment tool called the Secure Mobilometer was developed to understand mobile (in)security and vulnerabilities. The tool provided insight into the mobile device habits of government agency employees. The results show one singular truth: government employees and agencies need to take significant steps to secure confidential data.
Tagged: Cloud Security
The UK government has recently released a new Cyber Streetwise website which aims to change the way consumers and small businesses view online safety by providing the skills and knowledge needed to address cyber security.
The tide is changing online, and companies need to make a commitment to users that their information is just that, theirs. Helping with this promise is the Electronic Frontier Foundation (EFF). They have released an annual report titled, “Who Has Your Back?” taking a closer look at the privacy policies of major Internet companies. Read on to learn which companies are protecting your privacy.
How did hackers steal 40 million credit card numbers from Target customers? How much money are the cards selling for on the black market? And what’s the best way to prevent your computer from getting infected with malware — and avoid becoming an identity theft victim?
Keep reading to learn the answers to those questions, as well as how to make it harder for cybercriminals to get their hands on your private data.
Are you one of the millions of people who rely heavily on the cloud-based features of Dropbox and Evernote?
The two services make data available no matter where a user is located, but the programs are apparently not safe from the same kind of hacking and data breaches that afflict banks, schools, and every-day consumers. Click to find out what kinds of breaches recently affected both companies.
The movement of personal and business data to “the cloud” is attracting hackers who can exploit weaknesses in cloud-computing laws, and that’s why Minnesota Senator Amy Klobuchar plans to introduce a bill to make cloud computing a little safer. This article and video on a local CBS news affiliate explains that social media sites like Facebook and Gmail are among the most popular cloud services, storing data and programs on data centers connected through the cloud.
Back from the recent CTIA Wireless conference, CEO Kent Lawson tackles the trends and technologies shaping our future. He says things such as cloud computing are moving so quickly that “we will soon be accustomed to very large-scale capabilities which we will be carrying around in our pockets or purses.”
Did you know that Facebook claims legal ownership of whatever we upload to them? Turns out you have no right to retrieve your information or any ability to permanently delete it. As CEO Kent Lawson reports in this article, that is just one example of a “downside” to sharing data, photos, or other sensitive personal information via “the cloud,” which is simply a metaphor for the Internet. Not ready to lose control of your personal information? Then keep reading to learn more about “the cloud” — where it’s been and, more importantly, where it’s going.
If you’ve ever shared your Google calendar or created a Google document, for example, you have been “on the cloud,” an effort to create shared documents from any location. But there are major security risks to sharing documents over a public cloud network, and that’s why a government agency has issued its own set of security warnings.
A computer programmer has allegedly figured out how to break into Amazon.com’s cloud computing network to effectively hack into other people’s computers. According to news agency Reuters, the researcher uses specialized software to “test 400,000 potential passwords per second using Amazon’s high-speed computers.” For better protection against hackers, remember not to use simple passwords to secure your network.