Category Archives: isecurity

Guidelines for Publishing Information Online

Why is it important to remember that the Internet public? Because the Internet is so accessible and contains a wealth of information, it has become a popular resource for communicating, for researching topics, and for finding information about people. It … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , , , , , , | Leave a comment

Protecting Your Privacy

How do you know if your privacy is being protected? Privacy policy – Before submitting your name, email address, or other personal information on a website, look for the site’s privacy policy. This policy should state how the information will … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, isecurity, Uncategorized | Tagged , , , , | Leave a comment

Understanding Your Computer: Operating Systems

What is an operating system? An operating system (OS) is the main program on a computer. It performs a variety of functions, including determining what types of software you can install coordinating the applications running on the computer at any … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security | Tagged , , , , | Leave a comment

Risks of File-Sharing Technology

What is file sharing? File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , | Leave a comment

Understanding Voice over Internet Protocol (VoIP)

What is voice over Internet protocol (VoIP)? Voice over Internet protocol (VoIP), also known as IP telephony, allows you to use your Internet connection to make telephone calls. Instead of relying on an analog line like traditional telephones, VoIP uses … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Software Security Risks | Tagged , , , , , , | Leave a comment

Understanding Web Site Certificates

What are web site certificates? If an organization wants to have a secure web site that uses encryption, it needs to obtain a site, or host, certificate. There are two elements that indicate that a site uses encryption (seeProtecting Your … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Hacked, Information Security, isecurity, Software Security Risks, Uncategorized | Tagged , , , , , , | Leave a comment

Cybersecurity for Electronic Devices

Why does cybersecurity extend beyond computers? Actually, the issue is not that cybersecurity extends beyond computers; it is that computers extend beyond traditional laptops and desktops. Many electronic devices are computers—from cell phones and tablets to video games and car … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Software Security Risks, Uncategorized | Tagged , , , , , | Leave a comment