Category Archives: Uncategorized

Protecting Your Privacy

How do you know if your privacy is being protected? Privacy policy – Before submitting your name, email address, or other personal information on a website, look for the site’s privacy policy. This policy should state how the information will … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, isecurity, Uncategorized | Tagged , , , , | Leave a comment

Evaluating Your Web Browser’s Security Settings

Why are security settings for web browsers important? Your web browser is your primary connection to the rest of the internet, and multiple applications may rely on your browser, or elements within your browser, to function. This makes the security … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Uncategorized | Tagged , , , , , , , | Leave a comment

Understanding Internationalized Domain Names

What are internationalized domain names? To decrease the amount of confusion surrounding different languages, there is a standard for domain names within web browsers. Domain names are included in the URL (or web address) of web site. This standard is … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Uncategorized | Tagged , , , , , , | Leave a comment

Understanding Your Computer: Web Browsers

How do web browsers work? A web browser is an application that finds and displays web pages. It coordinates communication between your computer and the web server where a particular website “lives.” When you open your browser and type in … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Uncategorized | Tagged , , , | Leave a comment

Understanding Web Site Certificates

What are web site certificates? If an organization wants to have a secure web site that uses encryption, it needs to obtain a site, or host, certificate. There are two elements that indicate that a site uses encryption (seeProtecting Your … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Hacked, Information Security, isecurity, Software Security Risks, Uncategorized | Tagged , , , , , , | Leave a comment

Protecting Portable Devices: Data Security

Why do you need another layer of protection? Although there are ways to physically protect your laptop, PDA, or other portable device (seeProtecting Portable Devices: Physical Security for more information), there is no guarantee that it won’t be stolen. After … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Uncategorized | Tagged , , , , , | Leave a comment

Securing Wireless Networks

How do wireless networks work? As the name suggests, wireless networks, sometimes called WiFi, allow you to connect to the internet without relying on wires. If your home, office, airport, or even local coffee shop has a wireless connection, you … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Network Security, Software Security Risks, Uncategorized | Tagged , , , , , | Leave a comment