Managing Online Risk Chapter 2 Add. Resources

headshot of young blonde woman with moble phone

Internal and External Risks

These are resources are to help you apply some of the concepts, best practices, and lessons learned from the content in each chapter. Most of them are in addition to what are already listed in the book and serve to complement the highlighted resources in the chapters. Post in the comments others that you would recommend.

  1. Alien Vault: 5 Mobile Device Security Policies to Help You Sleep at Night (Nov 2014) https://www.alienvault.com/blogs/security-essentials/5-mobile-device-security-policies-to-help-you-sleep-at-night
  2. Consumer Reports Guide to Internet Security http://www.consumerreports.org/cro/electronics-computers/guide-to-internet-security/index.htm
  3. National Cyber-Security Alliance http://www.staysafeonline.org
  4. Google Online Security Blog http://googleonlinesecurity.blogspot.com
  5. Lookout, Inc. Mobile Security https://www.lookout.com
  6. Roger Kay for Forbes: Mobile Security Takes Center Stage (Sept. 2014) http://www.forbes.com/sites/rogerkay/2014/09/16/mobile-security-takes-center-stage/
  7. CBS News: Mobile security tips: How to protect or hide data on your smartphone (Sept. 2014) http://www.cbsnews.com/news/mobile-security-tips-protect-hide-data-on-smartphone/
Buy Managing Online Risk Now button

Leave a Reply

Your email address will not be published. Required fields are marked *