Tag Archives: US-CERT

Guidelines for Publishing Information Online

Why is it important to remember that the Internet public? Because the Internet is so accessible and contains a wealth of information, it has become a popular resource for communicating, for researching topics, and for finding information about people. It … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , , , , , , | Leave a comment

Evaluating Your Web Browser’s Security Settings

Why are security settings for web browsers important? Your web browser is your primary connection to the rest of the internet, and multiple applications may rely on your browser, or elements within your browser, to function. This makes the security … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Uncategorized | Tagged , , , , , , , | Leave a comment

Choosing and Protecting Passwords

Why do you need a password? Think about the number of personal identification numbers (PINs), passwords, or passphrases you use every day: getting money from the ATM or using your debit card in a store, logging on to your computer … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Hacked, Information Security, isecurity, Network Security, Software Security Risks, Uncategorized | Tagged , , , , , , , | Leave a comment

Good Security Habits

How can you minimize the access other people have to your information? You may be able to easily identify people who could, legitimately or not, gain physical access to your computer—family members, roommates, co-workers, members of a cleaning crew, and … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, Software Security Risks, Uncategorized | Tagged , , , , , , , , | Leave a comment

Staying Safe on Social Networking Sites

What are social networking sites? Social networking sites, sometimes referred to as “friend-of-a-friend” sites, build upon the concept of traditional social networks where you are connected to new people through people you already know. The purpose of some networking sites … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Uncategorized | Tagged , , , , , , , , , | Leave a comment

G:7-Security Launches Cyber Security iPhone App

Latest update: G7 Security’s Cyber Tools module successfully completed it’s beta phase and is now live after the release candidate 2 finalized earlier this week. Continue reading

Posted in Computer Security, Cyber Security, Information Security, Network Security, Technology | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Cyber security: Can the Senate make the Internet safe?

Author: Michael Kassner Two new bills have been introduced in the Senate. One would create a new cabinet-level position of national cybersecurity advisor. The second gives that person sweeping powers to control cyberspace. Sound like a good idea? You tell … Continue reading

Posted in Cyber Security, Information Security | Tagged , , , , , , , , , | Leave a comment