cybersecurity posts, articles, and infographics | Social Media Today
Sign up | Login with →

cybersecurity

6 Free, Easy WordPress Security Safeguards: Don't Let Pirates Drop Anchor in Your Lagoon!

February 5, 2014 by Carrie Morgan

WordPress security safeguards.

My blog isn’t huge but, thanks to social sharing and a little syndication, it is beginning to gain a bit of traction. I’m proud to say that traffic grew by 1,685 percent in 2013. Like every serious blogger, growth brings content theft issues that have pushed me to make some security changes along the way.[read more]

The Continuum of Risk

September 28, 2013 by Mark Risher

In working with site owners and developers, one of the most common requests is “Can you tell me which users to block”? But while Impermium has been providing real-time account risk ratings for years, we actually try to answer this question “No.”[read more]

Top 10 Internet Security Tips for Small Business

August 5, 2013 by Daniel Kehrer
1

Internet security tips

All your online speed and efficiency can come at a stiff price if your website, financial information, social media accounts, business or customer data fall victim to cyber thieves or troublemakers. Here are 10 tips from the cyber security experts at the Federal Communications Commission.[read more]

Hacked! Protect Yourself Against Social Media Hackers

June 6, 2013 by Miriam Hara

Most marketing communications departments have a process for internal or external crisis – but how many people ever face the actuality their Twitter or Facebook account might get hacked!? Why wouldn’t you think that? It’s the internet and that’s what the “bad guys” use the internet for causing havoc and unleashing giant, man eating crabs![read more]

Giant ATM Fraud Highlights Need to Accelerate EMV Standards in US

May 16, 2013 by Bill Hanifin

Last week, a gang of cyber criminals perpetrated a $45 Million fraud by hacking their way into prepaid card systems at several banks and extracting their take via ATM machines in 26 countries. The US portion of the scam took place courtesy of ATM’s mostly in the Northeast, giving too much publicity to the ensuing spending spree and clearly illustrating the risk that needs to be addressed via the EMV standard.[read more]

Google, FIDO and the Future of Account Security

May 15, 2013 by Mark Risher
1

Instead of relying on exclusively on locks–and waiting for the new locks to be installed—companies need to invest in proactive monitoring to complement the locks. Just like in the physical world, this virtual “police force” looks for suspicious patterns and attempts in the neighborhood and, by learning how the criminals behave across multiple locations, can stop them before they even reach your door.[read more]

Steps to Protect Your Social Media Account from Getting Hacked

May 14, 2013 by Rebecca Her

As you may have heard by now, The Onion recently became the latest in a string of large news organizations to be attacked and have their Twitter hacked by the Syrian Electronic Army. They were able to regain control fairly quickly, but in a surprising twist, they also decided to publish a blog post detailing how their security was breached.[read more]

Can Your Social Networking Profile Steal Your Identity?

May 3, 2013 by Joy Mali

Social networking isn’t just a trend that is going to go away – it is here to stay. Learn how to keep yourself protected from outside threats while still using the social networking sites you know and love. It is always important to monitor your credit so that you know if you have been targeted by identity thieves.[read more]

Cybersecurity: What Marketers Need To Know

March 8, 2013 by Lisa Arthur
1

Last month, President Obama energized the national dialogue by highlighting cybersecurity in his State of the Union address and by issuing an executive order that directs federal regulators to provide better cybersecurity for banking, telecommunications, energy and other industries.[read more]

Twitter Urges Members to Change Passwords Following Security Breach

February 4, 2013 by

“This attack was not the work of amateurs, and we do not believe it was an isolated incident,” stated Bob Lord, Twitter director of information security. “The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked.”[read more]

exclusive

The BlackBerry 10: Can It Reclaim the Business Market?

January 31, 2013 by Deborah Sweeney

With the announcement of BlackBerry 10, many are wondering if the company can, once again, offer businesses something that no other phone can. BlackBerry has always offered a level of security that many businesses felt was worth investing in. Even if the phones were annoying and cumbersome, the fact that BlackBerry encrypted e-mails meant that company secrets were less likely to leak out.[read more]

exclusive

Facebook and Twitter Most Unsafe Social Networking Sites in 2010

January 7, 2011 by Steve Olenski
7

In its report, PandaLabs referred to social media sites as being "a “perfect working environment” for cybercriminals because Internet users, for now, place more trust in these sites than other online tools, like email.[read more]

5 Steps to Bridge Social Media and Security

February 3, 2010 by Cindy Kim
2

As businesses move at a rapid pace to integrate social media as part of their overall corporate strategy to engage, build brand awareness and drive thought leadership, unfortunately, security has taken a back seat leaving businesses wide open to these Web 2.0 threats. The use of Web 2.0 has opened new risk channels for the bad guys to...[read more]

You... Vulnerable Now! Cybersecurity Soft in Web 2.0 Election Year...

September 18, 2008 by Doug Woodall

Ever get the feeling that the bow of the ship is slipping under the waves? clipped from www.msnbc.msn.com U.S. Cybersecurity Is Weak, GAO Says Five years after the Homeland Security Dept. took charge of the team as a critical safeguard against threats to national security, US-CERT “still does not exhibit...[read more]

 
Logo