↓

Online CISO

Cyber Security and Common Sense

Online CISO
Home Menu ↓
Skip to primary content
Skip to secondary content
Home→Author Ted Lloyd - Page 2 << 1 2 3 4 … 7 8 >>

Author Archives: Ted Lloyd

Post navigation

← Older posts
Newer posts →

Sell Me Your Password

Posted on March 31, 2016 by Ted Lloyd
Reply

Would you agree to sell your account password at home or at work? According to Investors Business Daily, 20% of you would based on a study by SailPoint which surveyed 1000 employees. … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in Uncategorized | Leave a reply

Securing Cloud Collaboration

Posted on March 14, 2016 by Ted Lloyd

Cloud collaboration, online storage, other cloud services and Bring Your Own Device (BYOD) adoption have all contributed to increased productivity and lower IT costs for most small businesses. Over half of companies surveyed now store data at a third party … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in access control, Cloud Security | Tagged Cloud Security, DLP

Social Media Paranoia

Posted on February 29, 2016 by Ted Lloyd
Reply

Technology has managed to creep up on us and before we as a society have managed to alter our laws and societal norms, public space as we’ve known it for thousands of years has changed before our eyes.

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in Data Privacy, Data Security, Privacy | Tagged data privacy | Leave a reply

Business Cyber-Insurance

Posted on February 10, 2016 by Ted Lloyd

While a business can never totally eliminate risk, there are three things which can be done about the risk:  (1) Mitigate the risk, (2) accept the risk, or (3) transfer the risk.  Larger companies have greater resources and access to … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in cyber-insurance

Link

Worst Passwords

The shocking fact is that this password does not change much from year to year.  Read the report for 2015.  

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook

Posted on February 8, 2016 by Ted Lloyd

Become Rich and Stay Rich

Posted on February 8, 2016 by Ted Lloyd
Reply
Cyber Incident

Entrepreneur.com had an interesting article of value to any business titled: “The Only 5 Ways You Can Become Rich.”  One of those five points inspired me to think in terms of how how to become rich and stay rich. As … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in risk management | Leave a reply

Political Cyberspeak

Posted on February 5, 2016 by Ted Lloyd

My hat is off to our politicians since as a general rule, they have an amazing gift of speaking without really conveying any substance.  Simply watch any political speech or news conference and leave still having the questions unanswered despite … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in cybersecurity | Tagged Comstock, Cyberspeak

Is Artificial Intelligence The Answer to Cybercrime?

Posted on February 4, 2016 by Ted Lloyd
Cyber Incident

Just about every company involved in the cybersecurity industry is looking at artificial intelligence, (AI), as a means to win the war against cybercrime and address the human element which has been attributed to 70% of IT breaches.  Many of … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in AI, Cybercrime, Uncategorized | Tagged AI, artificial intelligence

Tor in The Workplace

Posted on February 1, 2016 by Ted Lloyd
Reply
Cyber Incident

The Tor browser is enticing, because it is a fantastic tool for remaining anonymous on the Internet.  We are constantly monitored and tracked at almost every site we visit, and of course, we never know when governments are snooping on … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in risk, Security threats | Tagged Tor | Leave a reply

If it Isn’t Broke, It Still May Need Fixed

Posted on January 29, 2016 by Ted Lloyd
Reply

The security issue discovered last month with Juniper ScreenOS, (CVE-2015-7755) shatters the ageless wisdom of “if it isn’t broke, then don’t fix it.” In the wild age of cybercrime in which we live and do business, technology may still operate, … Continue reading →

Share this:

  • Share
  • LinkedIn
  • Twitter
  • Pinterest
  • Facebook
Posted in patching | Tagged CVE-2015-7755 | Leave a reply

Post navigation

← Older posts
Newer posts →
© 2023 - Online CISO Proudly powered by WordPress  Aspen by WP Weaver
↑