↓

Online CISO

Cyber Security and Common Sense

Online CISO
Home Menu ↓
Skip to primary content
Skip to secondary content
Home→Published 2016 → February

Monthly Archives: February 2016

Social Media Paranoia

Posted on February 29, 2016 by Ted Lloyd
Reply

Technology has managed to creep up on us and before we as a society have managed to alter our laws and societal norms, public space as we’ve known it for thousands of years has changed before our eyes.

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in Data Privacy, Data Security, Privacy | Tagged data privacy | Leave a reply

Business Cyber-Insurance

Posted on February 10, 2016 by Ted Lloyd

While a business can never totally eliminate risk, there are three things which can be done about the risk:  (1) Mitigate the risk, (2) accept the risk, or (3) transfer the risk.  Larger companies have greater resources and access to … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in cyber-insurance

Link

Worst Passwords

The shocking fact is that this password does not change much from year to year.  Read the report for 2015.  

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook

Posted on February 8, 2016 by Ted Lloyd

Become Rich and Stay Rich

Posted on February 8, 2016 by Ted Lloyd
Reply
Cyber Incident

Entrepreneur.com had an interesting article of value to any business titled: “The Only 5 Ways You Can Become Rich.”  One of those five points inspired me to think in terms of how how to become rich and stay rich. As … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in risk management | Leave a reply

Political Cyberspeak

Posted on February 5, 2016 by Ted Lloyd

My hat is off to our politicians since as a general rule, they have an amazing gift of speaking without really conveying any substance.  Simply watch any political speech or news conference and leave still having the questions unanswered despite … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in cybersecurity | Tagged Comstock, Cyberspeak

Is Artificial Intelligence The Answer to Cybercrime?

Posted on February 4, 2016 by Ted Lloyd
Cyber Incident

Just about every company involved in the cybersecurity industry is looking at artificial intelligence, (AI), as a means to win the war against cybercrime and address the human element which has been attributed to 70% of IT breaches.  Many of … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in AI, Cybercrime, Uncategorized | Tagged AI, artificial intelligence

Tor in The Workplace

Posted on February 1, 2016 by Ted Lloyd
Reply
Cyber Incident

The Tor browser is enticing, because it is a fantastic tool for remaining anonymous on the Internet.  We are constantly monitored and tracked at almost every site we visit, and of course, we never know when governments are snooping on … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in risk, Security threats | Tagged Tor | Leave a reply
© 2023 - Online CISO Proudly powered by WordPress  Aspen by WP Weaver
↑