Book: Online Security for The Business Traveler

WC_IntroTravel is considered one of the mandates of the executive suite.  Whether going to conferences, internal sales meetings, external client visits, travel always includes an element of risk.  But today’s high-paced executives are also high-tech enabled.  When they travel they travel with their smartphones, tables, laptops, powerbooks, health sensors, Google Glass, and more.  These new technologies bring along new risks.

Each of these devices offer productivity and efficiency through enhanced mobility and access to important documents and resources via applications and programs specifically designed to assist these executives in managing their complex and multi-leveled strategic goals. But these devices and apps can also become the weak link in security leading to breaches of data and putting the executive and his firm in danger of material, financial, legal, and physical loss.

This book provides an overview of this mainly overlooked problem, explores some examples and cases highlighting specific security issues, and offers some practical advice on what to do differently to ensure your security while you travel and continue to engage on online activity.

Chapters:

  • Chapter 1: To Travel or Not (Digital Alternatives)
  • Chapter 2: Planning, Logistics & Security
  • Chapter 3: Pre-Departure & Departure
  • Chapter 4: Arrival and Duration (in Destination)
  • Chapter 5: Return to Home Base

Highlights include:

  • Security & Risk Management Travel Checklists
  • Best Practices for Safety & Data Protection
  • Apps for Travel Security & Productivity
  • Special Apps for Women Travelers
  • And more

Title: Online Security for the Business Traveler

Author: Deborah Gonzalez

Publisher: Butterworth-Heinenman

Available: September 1, 2014

For more information send an email to:  book@law2sm.com.

 

Managing Online Risk’s Monthly Recap (May 2014) – Stories Relating to Online Security & Risk

Concept of Hand with Electronic Fingerprints

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: eBay data breach; cyber security certification; China’s hacker army; 12 tips to cope with a data breach; more on net neutrality; selfies boosting mobile security; 11 essentials to enterprise security; FFIEC & cyber security assessments; DropBox leaking data on Google; White House releases Big Data Report; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • State attorneys general commence probe of eBay data breach that hit 145 million users: Tech Times http://ow.ly/xiXKH
  • Interview W Federal Trade Commission’s Edith Ramirez, Who Is Fighting for Data Security & Privacy http://ow.ly/xiX2l
  • What The EBay Data Breach Will Signal About The Future Of Cyber Security | http://Investing.com http://ow.ly/xgQ0l
  • 10 tips on how to protect your personal data online, AsiaOne Digital1 News http://ow.ly/xgPqU
  • Password Do’s & Don’ts: 6 Ways to Stay Safe Online – NBC http://News.com http://ow.ly/xgPk2
  • Belgium Desperately Seeking Cybersecurity Czar – Digits – WSJ http://ow.ly/xdUb8
  • Magid: Internet security is a global issue that requires global cooperation http://ow.ly/xdU7j
  • IT Security Journal | How to Evaluate a Cyber Security Certification Program http://ow.ly/xcyNV
  • Bill lets schools create cyber-bullying policies – http://chicagotribune.com http://ow.ly/xcwvk
  • A Surveillance Bill That Falls Short – http://NYTimes.com http://ow.ly/xbc0E
  • U.S. Case Offers Glimpse Into China’s Hacker Army – http://NYTimes.com http://ow.ly/xbbv9
  • Facebook Fights Malware With Free Security Software – InformationWeek http://ow.ly/xbaT0
  • PasswordBox Wins 2014 Appy Award for Best Privacy/Online Security App – MarketWatch http://ow.ly/xbaLo
  • IoT, cloud computing, nation-state threats redefining enterprise security, panelists say | PCWorld http://ow.ly/xb9Kv
  • 12 Tips to Cope With a Data Breach | Law Technology News http://ow.ly/xb9no
  • Big Data Security Analytics Meets Identity and Access Management http://ow.ly/x2Xn4
  • Edward Snowden ally says he’ll reveal more GCHQ secrets | Mail Online http://ow.ly/x2Xdz
  • U.S. Charges Five Chinese Military Officers With Spying – Bloomberg http://ow.ly/x2X4R
  • Does a Mobile Internet Demand a New Regulatory Scheme | Law Technology News http://ow.ly/x2X0R
  • Online Retail Security Breaches, Mobile Malware Threats Grow http://ow.ly/x0l0K
  • Google readies automated tool for those wanting to disappear from search results | Security – InfoWorld http://ow.ly/x0kPa
  • Bipartisan support growing in support of federal data protection legislation http://ow.ly/x0kIL
  • LifeLock Pulls Wallet App And Deletes Data Over Security Concerns http://ow.ly/x0g4X
  • What’s Next for Net Neutrality? – Room for Debate – http://NYTimes.com http://ow.ly/wUXaF
  • Searching for Fairness on the Internet – http://NYTimes.com http://ow.ly/wUX5P
  • Security in the Internet of Things :: Smarter Computing :: Midsize Insider http://ow.ly/wUWnu
  • How the “selfie” is boosting mobile security http://ow.ly/wSieB
  • Pulling Big Brother’s Strings Instead – Video – http://NYTimes.com http://ow.ly/wPIYi
  • Further security issues keep Facebook under a microscope – Binghamton online marketing | http://Examiner.com http://ow.ly/wPIhj
  • One law to rule all data breaches — but let’s make it a real law | ITworld http://ow.ly/wPDYW
  • Five Essential Tips for Small Business Data Security | Guy Chiarello http://ow.ly/wPDMl
  • A Long Way to Privacy Safeguards – http://NYTimes.com http://ow.ly/wJR4Q
  • What keeps senior IT security pros up at night? It’s not what you think http://ow.ly/wJQwA
  • Infosecurity – Twitter Tweaks Password Security as Account Hacks Continue http://ow.ly/wJQ2w
  • The 11 Essentials of Enterprise Security http://ow.ly/wIuya
  • Bitly says users are safe after its data breach, 2-factor logins coming soon – The Next Web http://ow.ly/wIuo6
  • Social media poses grave danger to companies’ confidential information http://ow.ly/wHeqB
  • 7 Surprising Findings From Check Point’s 2014 Security Report http://ow.ly/wHe1m
  • Aligning Compliance Risk Management to Business Priorities – Deloitte Risk & Compliance – WSJ http://ow.ly/wFxwk
  • FFIEC Plans Cybersecurity Assessments – BankInfoSecurity http://ow.ly/wFxkv
  • Cloud Infographic: Corporate IT Security Stats – http://CloudTweaks.com : Cloud Information http://ow.ly/wFx1L
  • Dropbox Leaking Sensitive Data on Google – The State of Security http://ow.ly/wA1F9
  • 5 ways the new EU data protection regulations will affect your business – Computer Business Review http://ow.ly/wA1rr
  • Connections: Artificial Intelligence, Online Security, and Tracking Trends on Twitter | WXXI News http://ow.ly/wwTrh
  • How to present cyber security issues to the board – CIO http://ow.ly/wwSOH
  • IBM Advances Fight against Cyber Threats with Comprehensive Threat Protection System and Critical Data Protection Services – MarketWatch…
  • Behind The Blackphone: The Future Of Mobile Security? – Page: 1 | CRN http://ow.ly/wt2j3
  • Will This Fly?: A Primer on Drone Laws http://ow.ly/wt2gP
  • When Hitting ‘Find My iPhone’ Takes You to a Thief’s Doorstep – http://NYTimes.com http://ow.ly/wt216
  • Research Report on Smartphone Security Market Trends and Forecast, 2012-2018 – Digital Journal http://ow.ly/wt1Wy
  • Apple, Google, Microsoft Increase Transparency Of Government Data Demands http://ow.ly/wt1Nx
  • Call for Limits on Web Data of Customers – http://NYTimes.com http://ow.ly/wp6JT
  • Cyber security insurance: Insuring success – SC Magazine http://ow.ly/wp5CV
  • IoT security requirements will reshape enterprise IT security programs http://ow.ly/wp5uJ
  • Missing Links in the Proposed EU Data Protection Regulation and Cloud Computing Scenarios: A Brief Overview — jipitec http://ow.ly/wp5oH
  • White House releases Big Data Report | The Secure Times http://ow.ly/wp4S8
  • Kentucky Enacts Data Breach Notice Law That Adds Extra Protection for Student Information while inBloom Withers : Privacy and Security…
  • Most Enterprises Lack Basic Assets to Fight Off Data Theft http://ow.ly/wp4Kc
  • Organizations no more certain of data security in the cloud than on-premise, says Ponemon – FierceEnterpriseCommunications…
  • ‘G20+20 Cyber Stability Board’. Interesting proposition to deal with potential #cyber shocks http://ow.ly/weAtP  via @AtlanticCouncil
  • Happy May! Check out our April monthly roundup of security news: #Heartbleed, #Banking malware, #WindowsXP and more http://ow.ly/wngt2
  • Infosecurity – Infosecurity Europe 2014; Big Data is No Universal Solution for Security Intelligence http://ow.ly/wmJ8r

 

Managing Online Risk’s Monthly Recap (Apr. 2014) – Stories Relating to Online Security & Risk

MP900387794

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: 9 rules of risk management; 3 sides to data security; a look at the cyber-arms race; 2013 was the year of the mega breach; SEC & FBI on cyber security; empowering women in IT security; Heartbleed; corporate security threats; IoT & security; hackers lurking within soda machines; ransomware; World Backup Day; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • 9 Rules of Risk Management | The Reformed Broker http://ow.ly/wkdk7
  • Florida Legislature Seeks to Overhaul Existing Data Security Law | The National Law Review http://ow.ly/wkcRq
  • The Three Sides To Data Security — Firmology http://ow.ly/whJJy
  • How Is Digital Security Changing With The Rise Of Mobile? http://ow.ly/weN5O
  • Former CIA Tech Chief: Inside Look At Cyberarms Race, Snowden Leaks, Amazon Cloud Contract | CRN http://ow.ly/weL3r
  • ISACA launches cyber-security skills programme http://ow.ly/weJlE
  • 2013 was ‘year of the mega breach’ – Internet security threat study | SciTech | GMA News Online http://ow.ly/weJ3w
  • Lobbying Efforts Intensify After F.C.C. Tries 3rd Time on Net Neutrality – http://NYTimes.com http://ow.ly/w9BSr
  • Physicians Find Security In The Cloud – InformationWeek http://ow.ly/w9BfR
  • Mobile Devices Still Unsecured in the Workplace http://ow.ly/w9B4v
  • F.B.I. Informant Is Tied to Cyberattacks Abroad – http://NYTimes.com http://ow.ly/w77N7
  • F.C.C., in a Shift, Backs Fast Lanes for Web Traffic – http://NYTimes.com http://ow.ly/w77zH
  • Data Security Outlook Remains Uncertain Despite Flurry of Bills | Bloomberg BNA http://ow.ly/w4CZy
  • SEC Takes on Cybersecurity | Law Technology News http://ow.ly/w4CBJ
  • Empowering Women in Information Security – The State of Security http://ow.ly/w29L4
  • SEC seeks data on cyber security policies at Wall Street firms – Computerworld http://ow.ly/w29Cw
  • Heartbleed Will Require Rehab – InformationWeek http://ow.ly/w29wE
  • ‘BYOS’ Should Replace BYOD – InformationWeek http://ow.ly/w1Kmo
  • 7 Must-Have Cloud Security Controls for Every Company | Egnyte Blog http://ow.ly/w1JWN
  • Cyber insurance protects against data breach damage http://ow.ly/w1JRC
  • Compliance can pay cyber security dividends – Business Technology http://ow.ly/vZcUR
  • Ensuring security in the digital age | Columbia Daily Herald http://ow.ly/vZcK1
  • U.S. Promotes Network to Foil Digital Spying – http://NYTimes.com http://ow.ly/vZbRn
  • To prevent data theft, businesses race to adopt new technology http://ow.ly/vZavD
  • $110 BN LOST IN CYBERCRIMES | Oman Observer http://ow.ly/vZalI
  • Revamped Verizon security report to help funnel funds into the right holes http://ow.ly/vZagT
  • Adrianne Wadewitz, 37, Wikipedia Editor, Dies After Rock Climbing Fall – http://NYTimes.com http://ow.ly/vX431
  • Michaels Stores’ Breach Involved 3 Million Customers – http://NYTimes.com http://ow.ly/vX3XN
  • White House Updating Online Privacy Policy http://ow.ly/vX3IJ
  • Twitter app downloads could put users at risk | PCWorld http://ow.ly/vX3Dp
  • Your Internet security relies on a few volunteers – Apr. 18, 2014 http://ow.ly/vX3lg
  • Mobile App Development: 5 Worst Security Dangers – InformationWeek http://ow.ly/vX3dA
  • Mobility: Who Bears The Brunt Of Data Security & Privacy http://ow.ly/vX39a
  • Social Media Explodes as Twitter Users Issue Bomb Threats | Security Management http://ow.ly/vQzSC
  • 7 signs of Internet security trouble | IT World Canada Slideshow http://ow.ly/vQzNC
  • Corporate Security Threats http://ow.ly/vL8tl
  • Obama allows NSA to keep some Internet security flaws secret, officials say – Nation – The Boston Globe http://ow.ly/vL88Q
  • Court reverses conviction of US “security hacker” (Update) http://ow.ly/vJAmY
  • Federal Court Upholds FTC’s Authority To Bring Enforcement Actions Over Data-Security Standards; Will Class Actions Follow? | Class…
  • The Internet of Things: An exploding security minefield | CSO Online http://ow.ly/vJAiu
  • Internet security flaw, Heartbleed bug, puts millions at risk | Local News – Home http://ow.ly/vJA7o
  • NSA reportedly used Heartbleed glitch to obtain data for more than two years | The Portland Press Herald / Maine Sunday Telegram…
  • Glenn Greenwald and Laura Poitras Are Among the Recipients of the Polk Award – http://NYTimes.com http://ow.ly/vJzLQ
  • A Gentle Reminder about Security – ProfHacker – Blogs – The Chronicle of Higher Education http://ow.ly/vGBrj
  • Massive Internet Security Vulnerability – Here’s What You Need To Do – Forbes http://ow.ly/vGB4D
  • Cloud Infographic: Data Security Risk And Prevention – http://CloudTweaks.com : Cloud Information http://ow.ly/vEia8
  • Judge Rules FTC Can Sue Wyndham Over Cyber Security Lapses | Fox Business http://ow.ly/vEi4T
  • Video: How significant is security bug Heartbleed? | Watch PBS NewsHour Online | PBS Video http://ow.ly/vEhV7
  • Overturned data retention law will hamper the NSA, but won’t kill mass surveillance | ZDNet http://ow.ly/vB9cm
  • The Target Data Breach: A Risk Management Industry Perspective – The Epoch Times http://ow.ly/vB73t
  • Bill Clinton discusses privacy, national security | Mail Online http://ow.ly/vB6NM
  • Experts Find a Door Ajar in an Internet Security Method Thought Safe – http://NYTimes.com http://ow.ly/vB5Fv
  • Do Robots Have Rights | Law Technology News http://ow.ly/vB5qO
  • Robots 2014 | a University of Miami School of Law blog http://ow.ly/vB5ma
  • Real Threats in Real Time: Kaspersky Lab Launches Worldwide Interactive Cyberthreat Map | http://NEWS.GNOM.ES http://ow.ly/vyxV1
  • Fake Social Media Accounts Have Flourished In The Wake Of The Malaysian Airline Disappearance http://ow.ly/vyxiz
  • Smartphone fingerprint technology and its implications for data security | Information Age http://ow.ly/vyxd0
  • The 2013 Internet Security Threat Report: Year of the Mega Data Breach | Symantec Connect Community http://ow.ly/vyx7b
  • Reputation: The Hardest Risk to Manage http://ow.ly/vywZW
  • Technology’s Man Problem – http://NYTimes.com http://ow.ly/vyrzi
  • Snowden to Receive Truth-Telling Prize – http://NYTimes.com http://ow.ly/vyqpJ
  • Eight (No, Nine!) Problems With Big Data – http://NYTimes.com http://ow.ly/vypLz
  • Hackers Lurking in Vents and Soda Machines – http://NYTimes.com http://ow.ly/vymlQ
  • Financial firms and social media remain top Phishing targets | CSO Online http://ow.ly/vqxOd
  • Over cyber security Billions spent but much of it wasted http://ow.ly/vqxvJ
  • If security is hampering your business, you need to look at your security policy | http://ITProPortal.com http://ow.ly/vqxkW
  • Understanding Mobile Security in the BYOD Era – Dataquest http://ow.ly/vqwMg
  • Getting Ready to Microchip the Entire Human Race : Natural Society http://ow.ly/vox9n
  • New Privacy Guidance for Security Tech – DataBreachToday http://ow.ly/vowDy
  • IT Security Journal | Computer Security Products, Technologies and Best Practices » A Fistful of (Crypto) Dollars: Bitcoin and the Future…
  • How to write your company’s IT security policy | Enterprise | Real World Computing | PC Pro http://ow.ly/vov08
  • Ransomware Article Explains a Growing Data Security Threat – Press Release – Digital Journal http://ow.ly/vouJw
  • Stolen Social Media Account Info Is Worth More Than Credit Cards http://ow.ly/vkY8K
  • A better approach to online security: Think of the cloud as someone else’s computer | ITworld http://ow.ly/vkXWN
  • Reg and risk burdens up year over year – ABA Banking Journal http://ow.ly/vkXIR
  • SEC Struggles on Cyber-Security – TBG Security – IT Security Specialists http://ow.ly/vkXu5
  • Security in 2014 – Bigger Threats, Better Defences – The Information http://Daily.com http://ow.ly/vkXiK
  • A Revolution in Money – http://NYTimes.com http://ow.ly/vkWyY
  • Businesses unaware of social media legal risks, warns SocialSafe – Press Release – Digital Journal http://ow.ly/vjh88
  • On Restoring Trust After a Data Breach | The State of Security http://ow.ly/vhyK4
  • Rand Secure Data Highlights Importance of Data Backup and Recovery on World Backup Day – MarketWatch http://ow.ly/vhyGN

Managing Online Risk’s Monthly Recap (Mar. 2014) – Stories Relating to Online Security & Risk

working like a dog

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: banking safely online; 6 cyber security myths; ISACA launches digital badges; this drone can steal what is on your phone; security & metadata; cyber security skills; Digital Life 2025; data breach notification requirements; the Snowden phone; Colbert explains cloud fog; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • 10 Simple Tips to Bank Safely Online | Robert Siciliano http://ow.ly/v9Yec
  • Journalists “need to wake up” to online security | Media news http://ow.ly/v9Ybh
  • Fandango, Credit Karma Settle FTC Charges Over Data Security – http://WSJ.com http://ow.ly/v9Y5r
  • 6 greatest cybersecurity myths and why you should not trust them — Defense Systems http://ow.ly/v2ZA0
  • FTC Renews Call for Data Security Legislation – ACA International http://ow.ly/v2Zla
  • FDAnews Announces: Software and Cybersecurity Risk Management for Medical Devices, May 21-22 – Press Release – Digital Journal…
  • Info sec industry still struggles to attract women – CSO Online – Security and Risk http://ow.ly/uZ7OA
  • White House, Treasury officials to appear at SEC cyber security event | Reuters http://ow.ly/uWmfE
  • Obama to Call for End to N.S.A.’s Bulk Data Collection – http://NYTimes.com http://ow.ly/uWl4r
  • Infosecurity – ISACA Launches Digital Badges for Credential Verification http://ow.ly/uTFwS
  • European hackers gather in Geneva to test their skills – Taipei Times http://ow.ly/uTEJ3
  • Be Your Family’s Chief Security Officer | Robert Siciliano http://ow.ly/uTDNQ
  • Big data analytics boosts security | ITWeb http://ow.ly/uTDBw
  • Five reasons why risk managers should be social http://ow.ly/uTDli
  • The Illustrated History of Twitter http://ow.ly/uTBfO
  • This drone can steal what’s on your phone – Mar. 20, 2014 http://ow.ly/uQRNq
  • Full-Disclosure Listserv Suspends Operations: Very Sad Day for Internet Security http://ow.ly/uQREt
  • How to Secure Your Social Media Accounts – News – Wicked Local West Roxbury – Needham, MA http://ow.ly/uQQG9
  • Don’t shun the Internet of Things over privacy and security worries- The Inquirer http://ow.ly/uQQzT
  • New data protection guidance for app developers | Briefings | The Lawyer http://ow.ly/uQQwv
  • Security, Privacy and Metadata – The Data Center Journal http://ow.ly/uKgkt
  • Internet Of Things Meets Cars: Security Threats Ahead – InformationWeek http://ow.ly/uKg4F
  • Nearly half of identity thefts involve medical data – MarketWatch http://ow.ly/uKfIj
  • Eight cyber security tips I learned from The Walking Dead http://ow.ly/uHM6f
  • Help bring online/mobile privacy laws into the 21st century. Sign petition to get action on updating ECPA http://ow.ly/rGAge
  • A recent report found “small investments in cybersecurity preparedness can yield significant risk reductions” http://smg.io/1cR1XIt
  • ‘No business is too small to be at threat from cybercriminals’: @emm_david blogs for @HuffPostUKTech http://www.huffingtonpost.co.uk/david-emm/no-business-too-small-to-be-at-threat-from-cybercriminals_b_4965491.html … #SMB #security
  • System Accounts: #Password Dos and Don’ts
  • @FidSecSys http://www.threatgeek.com/2014/03/system-accounts-password-dos-and-donts–1.html …
  • 4 female leaders in the #tech industry: http://ow.ly/uBIiu
  • Check out this #infographic from the McAfee Labs Threats Report: Fourth Quarter 2013: http://ow.ly/uFMbz via @McAfee
  • WhatsApp flaw allows hackers to steal private Chats on Android devices http://lnkd.in/d44R94g
  • Experian security lapse have just exposed over 200 mn consumer IDs : BIZ TECH : Tech Times http://ow.ly/uAmmy
  • Cybersecurity Skills Haves and Have Nots http://ow.ly/uAmfa
  • Cyber Security Rises as Concern in Risk: Survey – The CFO Report – WSJ http://ow.ly/uAm9b
  • Sophisticated Mobile Apps Are Reshaping Campus Safety – Technology – The Chronicle of Higher Education http://ow.ly/uAl33
  • Here’s What The Internet Could Look Like In 2025 http://ow.ly/uxRZX
  • Terebrate: Books You Should Have Read By Now on Security http://ow.ly/uxRHG
  • Full List of Information Security Conferences in 2014 http://ow.ly/uvd1k
  • Elray Gaming Provides Security Outline for Bitcoin and Virtual Currency Holdings – http://WSJ.com http://ow.ly/uvceB
  • Businesses need federal terrorism risk insurance reauthorized – Richmond Times-Dispatch: Economic News http://ow.ly/uvc39
  • Data Breach Consumer Notification Requirements Vary | Law Technology News http://ow.ly/uvb90
  • Best Practices For Gramm-Leach-Bliley Compliance Re: Data Security and Customer Privacy | The National Law Review http://ow.ly/usNoC
  • Cyber-Security Creates New Pressures for IT Pros http://ow.ly/usLFV
  • 10 Ways to Build a Better Big Data Security Strategy – CSO Online – Security and Risk http://ow.ly/usKT5
  • Cyber Security Risk: Perception vs. Reality in Corporate America | Innovation Insights | http://Wired.com http://ow.ly/usK0Y
  • Barrett Brown hyperlink charges dropped | Naked Security http://ow.ly/ulom5
  • IT security for the daily life: Withdrawing money at cash machines with Google Glass | Science Codex http://ow.ly/ulkyI
  • Our 10 most important security takeaways from the RSA Conference | http://ITProPortal.com  http://ow.ly/ulkjr
  • FreedomPop Snowden Phone 10 Facts About This Secure Handset http://ow.ly/ulkgG
  • Bitcoin’s Mysterious Creator Is Said to Be Identified – http://NYTimes.com http://ow.ly/ulfJi
  • Maintaining Electronically Stored Information Forever Is Risky Business | Law Technology News http://ow.ly/uiJ0U
  • 10 Things You Need to Know About Digital Security http://ow.ly/ugj95
  • Has Privacy Become a Luxury Good? – http://NYTimes.com http://ow.ly/udBtJ
  • Hackers stole $473M of ‘Tinker Toy currency’ bitcoins | New York Post http://ow.ly/udBll
  • Daily Report: Lax Data Security a Problem for Many Start-Ups – http://NYTimes.com http://ow.ly/udAXX
  • Meet the seven people who hold the keys to worldwide internet security – HITC Tech http://ow.ly/ubdKJ
  • Can we protect ourselves from online privacy threats? – The Globe and Mail http://ow.ly/ubddn
  • Stephen Colbert explains Cloud Fog: part cloud, part fog, all security http://ow.ly/ubd2d

Managing Online Risk’s Monthly Recap (Feb. 2014) – Stories Relating to Online Security & Risk

network security

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: call for new cyber security laws; regulating Bitcion; investigating Internet crimes; password security tips form experts; FCC & net neutrality; social media is new online security battleground; NIST security framework; connected cars & liability; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • Lawmakers Call for New Cyber Security Laws | DoD Buzz http://ow.ly/u5ZfS
  • China’s President Will Lead a New Effort on Cybersecurity – http://NYTimes.com http://ow.ly/u5YNL
  • HootSuite Launches Managed Social Media Security & Compliance Service for Enterprises – BWWGeeksWorld http://ow.ly/u3CRE
  • Computer Fraud With Digital Identity Theft Or Improper Use. Italian Law – Data Protection – Italy http://ow.ly/u3C7q
  • Now, Nations Mull the Ways to Regulate Bitcoin – http://NYTimes.com http://ow.ly/u3B2p
  • How to Secure Your Mac From Potential Theft http://ow.ly/u3Axu
  • Securing Your Mac Against Theft – ProfHacker – Blogs – The Chronicle of Higher Education http://ow.ly/u3Asn
  • Know and Control the Information About You in Big Data | Law Technology News http://ow.ly/u3Aj4
  • Apple Getting a Handle on Security Problems | Law Technology News http://ow.ly/u3A9J
  • Why The Next Wave Of Cyber Attacks Will Be Much Harder To Stop – Business Insider http://ow.ly/tYAlT
  • Social media users’ tips to avoid STIs | The Citizen http://ow.ly/tYzUA
  • The F.C.C. Tries Again – http://NYTimes.com http://ow.ly/tUhFm
  • Book Excerpt: Investigating Internet Crimes http://ow.ly/tToi2
  • Weapons of mass data destruction | IT PRO http://ow.ly/tT7Q2
  • 5 Simple Password Security Tips from Experts – Digits – WSJ http://ow.ly/tR7Ty
  • Data Security In 4 (Relatively) Easy Steps — Dark Reading http://ow.ly/tR7ks
  • Microsoft: Social Media Reputation Repair Costing Users Billions http://ow.ly/tR795
  • The Privacy/Security Clash’s Unexpected Consequence | Law Technology News http://ow.ly/tR5mS
  • F.C.C. Seeks a New Path on ‘Net Neutrality’ Rules – http://NYTimes.com http://ow.ly/tOLvT
  • Hackers Make Off With 300,000 Personnel Records at U. of Maryland – The Ticker – Blogs – The Chronicle of Higher Education…
  • Homeland: E-Security – http://DAWN.COM http://ow.ly/tMoSN
  • [Infographic] The Alarming Rate of Data Breaches | The Art of Data Protection http://ow.ly/tMowv
  • Why retailers aren’t protecting you from hackers – Feb. 18, 2014 http://ow.ly/tMo9x
  • Social media: The new Internet security battleground | http://ITProPortal.com http://ow.ly/tJS1P
  • Tightening up Security Is Everyone’s Responsibility | Robert Siciliano http://ow.ly/tJRmq
  • Smart cities are here today — and getting smarter – Computerworld http://ow.ly/tHBJT
  • Data Security Dos & Donts From The Target Breach – InformationWeek http://ow.ly/tHAVr
  • The Securitization of Social Media in China | Modern Tokyo Times http://ow.ly/tHAqS
  • Infographic: Drivers And Barries To BYOD Investing http://ow.ly/tHAaj
  • How the NIST cybersecurity framework can help secure the enterprise | PCWorld http://ow.ly/tHzdP
  • Types of Internet Security Threats and Its Prevention http://ow.ly/tHyy3
  • Ninth Circuit Rules Against Spokeo On FCRA Claim – Data Protection – United States http://ow.ly/tHydn
  • Bitcoin triggers security startups | The Journal Gazette http://ow.ly/tHxMx
  • FIDO Alliance Standard to Boost Authentication, Eliminate Passwords http://ow.ly/tHxI1
  • Why security pros should care about Bitcoin's troubles – CSO Online – Security and Risk http://ow.ly/tHxBU
  • “Connected cars” phenomenon raises data ownership and liability issues, says expert http://ow.ly/tHx02
  • Google Buys Another Security Startup SlickLogin To Protect Internet Users In New Ways : News : Headlines & Global News…
  • Android vs. iOS Security http://ow.ly/tHvpz
  • Kickstarter confirms data stolen in security breach – Tech News – Digital Spy http://ow.ly/tHv02
  • Is Social Media Putting Your Credit Card Data at Risk? http://ow.ly/tHuxD
  • Cybersecurity Framework http://ow.ly/tHs91
  • The Day the Internet Fights Back | Law Technology News http://ow.ly/txYpo
  • 10 Mobile Security Issues That Should Worry You http://ow.ly/txXJw
  • Building the security bridge to the Millennials – CSO Online – Security and Risk http://ow.ly/tvtzJ
  • Former NSA Security Architect Pushes Email Encryption For The Masses – Forbes http://ow.ly/tvt46
  • Personal Data Protection and Breach Accountability Act of 2014 would enact criminal penalties for “intentionally or willfully”
  • Reddit, Mozilla, Tumblr and Wikia to join anti-NSA online protest tomorrow http://ow.ly/tsDpr
  • Target, Neiman-Marcus, Michaels: How PCI data security standards are failing us | VentureBeat | Security | by Slava Gomzin, security and…
  • Mobile security from heartbeat to be used by Bitcoin – QR Code Press http://ow.ly/trxVE
  • FTC Approves Final Order Settling Charges Against TRENDnet, Inc http://ow.ly/trxHc
  • The 7 Deadly Sins of Application Security – InformationWeek http://ow.ly/tnNgQ
  • Security tips for social media sites | http://ITProPortal.com http://ow.ly/tlxKl
  • Social Media Security Infographic http://ow.ly/tlwHj
  • FTC Testifies on Data Security before Senate Banking Subcommittee http://ow.ly/tltqy