Managing Online Risk’s Monthly Recap (May 2016) – Stories Relating to Online Security & Risk

Virus Trojan Spyware Signpost Showing Internet Or Computer Threats

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: alleviate top stressors in IT systems; 6 stages of incidence response; the role of online security insurance; is biometric data private; mobile security challenges; crafting a winning risk assessment; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a monthly recap. Some have links that will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Others you need to go directly to our Twitter account to view. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • What Is the Future of Mobile App Development? – DZone Mobile
  • Australia to auction seized Bitcoins – CSO ‪ 
  • How to Alleviate the 15 Top Stressors in IT Systems
  • Millennials Could Learn From Baby Boomers When It Comes To Security ‪ 
  • Social Media Compliance a Challenge for Enterprises
  • Clone Kimber new book: Legal Guidelines for Employers and Employees Dealing with CyberLaw Issues ‪ 
  • Recommendations for Evaluating Your Organization’s Use of Social Media ‪ 
  • The Six Stages of Incident Response ‪ 
  • What is Email Security? Data Protection 101 ‪ 
  • The role of online security insurance in business ‪ 
  • Google Innovates Online Security Measure, No More Passwords By The End Of This Year
  • How Should Companies Handle Data From Employees’ Wearable Devices? ‪ 
  • Social Media: The Digital Footprint to Fraud ‪ 
  • Are YOU Hiring Robots Yet? | Global Sales Growth
  • 5 Essential Steps To Take After A Data Security Breach ‪ 
  • 10 Mobile Security Vulnerabilities and How to Address Them
  • Five Resources to Help You Deploy an Effective Mobile Security Strategy
  • Why a staggering number of Americans have stopped using the Internet the way they used to
  • Biometric data: security and ease negate passwords, but is it private?
  • Data security mistakes to avoid at all costs
  • Social Media Posts Now Fair Game in Security Clearance Process
  • Security through the entire life cycle
  • How to protect your business from 5 big data security threats
  • Report: Security and Privacy Fears Can Affect Internet Use
  • Industry Associations Publish Principles on International Cyber Security, Data & Technology
  • Mobile Security Challenges: You’re Not Alone
  • Mobile security updates are a mess. The FCC and FTC want to know why.
  • Almost half of companies don’t teach staff data security
  • When Twitter Cut Off The US Intelligence Community: Social Media And Surveillance
  • Social Media Crisis Management: How to Prepare and Execute a Plan
  • 9 Important Elements to Corporate Data Security Policies that Protect Data Privacy
  • Social Media: Things You Might Not Have Thought About
  • Russian Hacker Trades Millions of Stolen Records for Social Media Likes
  • 7 Password Experts on How to Lock Down Your Online Security
  • FFIEC Releases Guidance on Risk Management for Mobile Financial Services ‪ 
  • We Tested 50+ Free Security Tools so You can Use Them for Your Online Protection
  • Warning issued over fake online ads for puppies and kittens
  • Rethinking security for the Internet of Things ‪ 
  • Continuing Data Security Lessons from the SEC | JD Supra
  • Five most common myths about Web security
  • Building the Case for Law Firm Data Security (Infographic)
  • Analytics, Predictive Insight and Agility Can Stop Data Breaches Before They Begin
  • IoUC’s Monthly Recap (Apr. 2016) – Stories Relating to the Internet of Unintended Consequences ‪ 
  • Managing Online Risk’s Monthly Recap (Apr. 2016) – Stories Relating to Online Security & Risk
  • Law2sm Monthly Recap: Social Media & the Law 5/1/16 ‪ 
  • Using Data To Secure Networks: Optimizing Individual Privacy While Achieving Strong Security ‪ 
  • Cybersecurity Insurance: Facing Hidden Risks and Uncertainty
  • Five Common Mobile App Security Vulnerabilities And How to Fix Them
  • Technology in Focus: Monetizing the Internet of Security Things ‪ 
  • Craft a winning risk assessment analysis in five steps
Buy Managing Online Risk Now button

Leave a Reply

Your email address will not be published. Required fields are marked *