Kids and Their “Digital Footprints”

By | August 20th, 2014|Uncategorized|

backtoschool_082014This guest blog post is a part of our cyberSAFE blog series focusing on back-to-school security, privacy and identity topics. It comes to us from Diana Graber, co-founder of CyberWise, the go-to-to source for busy adults who want to learn how to embrace digital media fearlessly, and the CyberWise Certified online learning program (check out the course on “Online Reputation Management”). She developed and teaches middle school “Cyber Civics” at Journey School in Aliso Viejo, CA. Diana has an M.A. in Media Psychology and Social Change and is a regular contributor to the Huffington Post.

My daughter, who is busy preparing to go off to college, burst into my office yesterday with a question, “Why in the world did you ever let me get a Facebook page in 8th grade?”

The reason for her outburst was that she’d just received an email from her university telling her the names of her future roommates… you can imagine what every student does the moment they receive this information—they look each other up on Facebook. She anguished over silly and embarrassing posts on her page from 8th grade. She felt that the mistakes she made as a tween were tarnishing her online reputation as a young adult.

Understanding the impact of one’s online reputation—or, “digital footprint”— is challenging, even for those of us who have been online for a long time. We see examples of adults being digitally disastrous every day and we certainly can think of someone who has shared too much information or posted a photo that makes us cringe. So, imagine the difficulty of trying to introduce the concept of a “digital footprint,” and its future ramifications, to kids who are just starting to make their online reputations take shape.

That’s what I do in 6th grade Cyber Civics™ classes at Journey School in Aliso Viejo, CA. To teach this concept I use a lesson from Common Sense Media and adapt it to make it particularly relevant to my students. For example, one class had just completed a very successful pie-making/selling fundraiser called “Sweetie Pies,” so I told these students that as “owners” they were going to hire a national spokesperson for their thriving venture. In this engaging experience, the children consider two applicants, Jason and Linda, by reviewing their “digital footprints.”

After conducting this digital background check, the students were asked to consider which candidate they should hire based on the following criteria: Who was more honest and who worked well with others? They broke into small groups to ponder this decision and after considering all the online evidence (not so good), most groups decided not to hire either candidate.

The best part of this lesson, however, is the follow-up activity: students were given a blank footprint and told that it represented their “digital footprint.” Their task was to think about what they wanted it to say in 10 years by filling it in with words and images that described their future selves.

These students designed footprints that said they’d be professional soccer players, artists, scientists, musicians, gamers, fashion stylists and more. Some footprints indicated that these kids were going to win the Nobel Peace prize, the Heisman trophy, feed the homeless and perform hundreds of pet rescues.

Of course only a fraction of these digital dreams will come true, but the point is this: it gives kids the idea that they can, and should, shape their own online reputations, or “digital footprints” and be proud of the online self they show to the world.

Back-To-School Online Safety Tips for Families

By | August 19th, 2014|Uncategorized|

Back to SchoolThis guest blog post is a part of our cyberSAFE blog series focusing on back-to-school security, privacy and identity topics. It comes to us from Kara Wright, the Digital Media Coordinator for the National Cyber Security Alliance. She assists the operation and development of the STOP. THINK. CONNECT. and National Cyber Security Awareness Month campaigns and works with other NCSA staff to increase the campaigns’ footprint and reach and social and digital properties.

As the new school year approaches, it is important for families to brush up on online safety and ensure they are staying safe online. Here are a few ways you can protect yourself and your family this school year.

Be Safe When Doing Your Back-To-School Shopping
Buying school supplies online? Check out these tips first:

  • Connect with care, and when shopping, be sure the site you are using is security-enabled. Look for a web address with https:// or “shttps://” instead of https:// (or a closed padlock on your web browser’s address bar) to know the site takes extra measures to help secure your information.
  • If you are considering buying from a seller you have never used before, collect your own research on the seller first to make sure the site is legitimate. Some attackers try to trick you by creating malicious websites that appear legitimate, so you should verify the site before supplying information. Do this by searching for customer reviews and noting the company’s phone number and physical address.
  • Protect your personal information and be alert to the kinds of information being collected when you are making a purchase online. Check the website’s privacy policy before providing personal or financial information, and make sure you understand how your information will be stored and used. Remember that you only need to fill out required fields on a checkout form, and make sure that the information requested seems necessary.
  • Turn off your computer when you’re finished shopping and using your computer. Leaving your computer connected to the Internet when it’s not in use gives scammers 24/7 access to install malware and commit cyber crimes. To be safe, turn off your computer when it’s not in use.

Protect Your Family from Cyberbullying Once School Starts
Every age group is vulnerable to cyberbullying, but teenagers and young adults are common victims. Cyberbullying is a growing problem in schools thanks to the Internet’s fairly anonymous nature, but these steps can help you protect your family members from cyberbullying:

  • Limit where you and your family members post personal information. Be careful who can access your family members’ contact information and details about interests, habits or employment to reduce exposure to bullies; this may limit the risk of you or one of your family members becoming a victim and may make it easier to identify the bully if someone is victimized.
  • Own your online presence. When available, set the privacy and security settings on websites to your comfort level for information sharing; it’s OK to limit how you share information.
  • Safer for me, more secure for all. What you do online has the potential to affect everyone – at home, at work and around the world. Practicing good online habits benefits the global digital community.
  • Post only about others as you would have them post about you.

Raise Good Digital Citizens
The Internet is a great place to learn and get entertainment, but it can pose dangers if precautions are not taken. Allowing free access puts your family members, your computer and your personal data at risk. It is important for parents to remain positively engaged, paying attention to the online environments their children use and showing interest in their friends. Additionally, parents are encouraged to support their children’s good choices online and expand their autonomy when developmentally appropriate. Keep a clean machine by protecting all family computers with security anti-virus, anti-spyware and firewall programs that are set to update automatically, keeping operating systems, web browsers and other software current and backing up computer files on a regular basis.

For more information and tips mentioned above, visit NCSA’s website. As always, let us know what you think on Twitter and Facebook, and be sure to check out our Tumblr for the latest industry news stories.

Cyber Protection Tips for Small Businesses

By | August 14th, 2014|Uncategorized|

Guest Post_081114This post is part of our cyberSAFE series focusing on SMB financial and reputational risks. You can learn more about the financial and reputational risks SMBs face during every phase of business growth by taking a look at our SMB Security For Every Phase of Growth webinar.

This cyberSAFE guest blog post comes to you from Sandra Mills, a freelance tech, online safety and security writer.

Cyber protection is something that should be top of mind for every small business. Since small businesses likely don’t have the staff or the capital that larger businesses have, it is crucial for small businesses to ensure that their business does not fall victim to cyber criminals.

Here’s a look at cyber protection tips every small business should employ:

Strong Passwords
The first thing every small business should do is confirm that employees are using best password practices. Passwords are first level security, so creating them to be strong is of vital importance. It should go without saying that employees should never use numbers or words that can be easily guessed, like names, birthdates, etc. For even more peace of mind, utilize two-factor authentication – which often involves having a text message sent to your cell phone with a unique code each time you log on – whenever possible.

Preventing Computer Viruses
Viruses can inadvertently be downloaded from the Internet or included in email links and attachments. This is why an anti-virus program should always be used to scan emails and downloads before an employee opens them on a company computer. Anti-virus software must be updated on a regular basis since failure to update can make a business vulnerable to new Internet viruses, which are always being created.

Firewalls
Making sure you use a firewall on business computers is also a crucial part of your cyber protection plan. You may think of firewalls as an annoying blockade between you and your favorite social networking site, but they serve a very important purpose of filtering out what you don’t want on your server. Firewalls can be useful both at home and at the office. You can never be too careful when it comes to keeping a business’ network safe.

Data Backup
If you lose important information off of your business computer, you may find that you quickly lose business from inconvenienced clients. For this reason, it is crucial that you back up all your important files in the event that a virus does make it into your computer system, and causes damage to your computer’s hard drive.

The tighter a ship you run when it comes to your cyber protection, the better.

June Recap: Expert Webinars and a Little Bit of Fun

By | July 2nd, 2014|Uncategorized|

In true CSID fashion, we stayed busy both inside and outside of the office this month. At the beginning of the month, we hosted another edition of our cyberSAFE webinar series coupled with a #cyberSAFEchat, as well as published some great content to support them both, including a white paper and infographic. The second half of the month, some CSID team members went to the World Cup, attempted to break world records and more!

cyberSAFE Webinar: SMB Security For Every Phase of Growth
Earlier in June we hosted another edition of our cyberSAFE webinar series – this one on small business security for every phase of growth. We were honored to host panelists Byron Acohido of the Last Watchdog and Aaron Hanson of Symantec. Be sure to check out our recap of the webinar on the blog and corresponding content.

Another Edition of #cyberSAFEchat
To gear up for our cyberSAFE webinar about SMB security, we hosted a #cyberSAFEchat Twitter chat on the same topic. We welcomed a range of experts, including @aaron_hanson, @symantec, @byronacohido, @gingerhill13 and @knolinfos, and discussed how small businesses can up their security game. Thanks to call who joined! Catch up on the transcript of the chat on Storify.

Survey of SMB Security Owners
Last month we surveyed 500 small business owners about their practices when it comes to cyber security and their perspectives on the security risks that their businesses face. The results were eye-opening—download the report for more information.

Carl's Ride MapCSID-er Attempts a World Record
One of CSID’s own is going for the Guinness Book of World Records’ longest journey by motorcycle in a single country – and he’s doing it for a great cause! Carl Davies is riding to raise money for LifeWorks Austin and Max’s Ride for ALS. For more information and to support his ride, visit https://www.maxals.org/.

CSID at the World Cup
Here’s another fun update! One of our own is at the World Cup right now and snapped a photo of the USA vs Portugal match. Go team USA!

Joe Ross in the Huffington Post
Joe Ross shared a fascinating new article in his Huffington Post column about “SMB Cyber Security Basics and Breach Response.” Catch up on his column for more industry related articles.

CSID on the Sand Volleyball Court
Last, but certainly not least, we took a break from the office and caught some sun while playing volleyball outside. In an effort to continue to keep our employees healthy, we held a couple of friendly volleyball tournaments to kick off the summer months. Check out the photos on our Facebook page.

What are you looking forward to in July? Let us know on Facebook, Twitter or LinkedIn and be sure to keep up with our Tumblr for up-to-date security new stories.

Be Your Own Hero Against Cyber Criminals

By | June 6th, 2014|Uncategorized|

Guest Post 5This post is part of our cyberSAFE series focusing on SMB financial and reputational risks. You can learn more about the financial and reputational risks SMBs face during every phase of business growth by registering for our upcoming webinar on June 10th at 12 PM CT.

This cyberSAFE guest blog post comes to you from Ginger Hill, Associate Content Editor at Security Today Magazine.

Small and medium-size businesses (SMBs) are extremely valuable as they play a vital role in creating new jobs and making sales to help stabilize the economy. As such, cyber criminals find small businesses very intriguing. Here are a few reasons why cybercriminals target SMBs:

SMBs data is more valuable than they think. Most SMBs think that because they are a small business, cyber criminals won’t be interested in their data. Wrong! Even if you have only 5 employees, you have stored their personal data somewhere. Cyber criminals would love to get their hands on that information, along with the business’ bank account information and other data deemed valuable.

Attacking a SMB is very low risk. Cybercriminals attack SMBs because they typically represent the path of least resistance. Companies with poor defenses, lack of security skills and vulnerable end-users have the perfect formula for a cyber-attack. Plus, the risk is low and the payout is high as SMBs have valuable data.

SMBs are an easy target. Enterprises have the means to provide layers upon layers of security, making them harder for cybercriminals to penetrate. SMBs, however, may not have the capital to invest in highly sophisticated security measures. Plus, the majority of SMBs do not have any data security policies. Remember, cybercriminals always take the easy path.

SMBs aren’t in the know. SMBs take a huge amount of time investment to make them successful. Therefore, owners are limited in the amount of time they have to dedicate to protecting their data. With this time constraint also comes the lack of time to learn about and keep up with all the cyber threats lurking around the corner. Cybercriminals realize this, choosing to prey on the weak.

Feel helpless against cybercriminals? Don’t! Here are a few ways cost-effective ways SMBs can become a hard-to-target entity:

Go beyond antivirus protection to develop layers of protection. Protect data with unique passwords, PINs, biometrics, etc. Consult with an ethical security integrator for suggestions.

Encrypt your data. This will make it very difficult for hackers to read your data, taking the ease out of gaining access to your valuable information.

Dedicate time to education. Set aside weekly time to learn about the cyberattacks that are taking place in this day and age. The more you know, the more effectively your can fight against these attacks to further protect your data.

6 Tips To Make Your SMB More Secure

By | June 5th, 2014|Uncategorized|

guest blog 4This post is part of our cyberSAFE series focusing on SMB financial and reputational risks. You can learn more about the financial and reputational risks SMBs face during every phase of business growth by registering for our upcoming webinar on June 10th at 12 PM CT.

This cyberSAFE guest blog post comes to you from Emily, the Director of Digital Strategy and Awareness Campaigns at the National Cyber Security Alliance, an awareness group that educates and empowers our digital society to use the Internet safely and securely at home, work and school, protecting the technology individuals use, the networks they connect to and our shared digital assets.

Small and medium-sized businesses have become bigger targets for cybercriminals. Why? Because the bad guys know small businesses (SMBs) have fewer defense resources than large enterprises and hold just as much personal and financial information.

Even if your company doesn’t have the financial capacity or bandwidth of a large corporation, you can still protect your business, employees and customers from threats.

Here are 6 ways to make your small-to-medium-sized business safer and more secure:

  • Assess your risks. Take an inventory of your current business practices: What steps are you taking to secure your devices, networks, email, Wi-Fi, etc.? How do you protect the data you collect?
  • Monitor threats. You don’t need to be a cyber security expert to ensure that your business is protected, but it’s critical that you understand the online threats to your company’s network. Awareness of key threats—like spam and phishing—will help you employ practices and behaviors that limit your company’s risk.
  • Implement a cyber security plan. The Federal Communications Commission created the Small Biz Cyber Planner to help businesses evaluate their current cyber security state and create a plan.
  • Train your employees. It’s important for employees to understand basic cyber security hygiene, including keeping a clean machine, following good password practices, backing up their work, not clicking on suspicious links and speaking up if they notice strange activity on company computers. A good way to start the conversation is with STOP. THINK. CONNECT., the national cyber security education and awareness campaign, where you can download free tip sheets, posters and other resources.
  • Protect your customers. Following a few simple practices can help protect your business from incurring expensive and dangerous data breaches, and give your customers piece of mind.
    • Have (and follow) a privacy policy – your website should have a privacy policy that explains what customer information you collect, and how you store and use it.
    • Know what you have – you should be aware of all the personal information you have about customers, where you store it, who has access to it and how to protect it.
    • Keep the customer data you need and delete what you don’t.
  • Report cyber attacks. If your business has been victimized, you should notify the appropriate authorities. Learn what organizations you should contact on StaySafeOnline.org.

For more information about making your small biz cyber-secure, check out the National Cyber Security Alliance’s Business Safe Online section.

Small Restaurant Owners Should be Concerned About Breaches

By | June 4th, 2014|Uncategorized|

This post is part of our cyberSAFE series focusing on SMB financial and reputational risks. You can learn more about the financial and reputational risks SMBs face during every phase of business growth by registering for our upcoming webinar on June 10th at 12 PM CT.

guest blog 3This cyberSAFE guest blog post comes to you from Eva Velasquez, the President/CEO at the Identity Theft Resource Center, a non-profit organization which serves victims of identity theft. Ms. Velasquez previously served as the Vice President of Operations for the San Diego Better Business Bureau and spent 21 years at the San Diego District Attorney’s Office.

The number of data breach incidents occurring in the U.S. is continuing to rise. In 2013, the Identity Theft Resource Center (ITRC) recorded 30% more breaches than the number tracked in 2012. Data breaches can affect any entity or business in any industry sector – including restaurants. In fact, according to Visa, from 2009 to 2011 there was a large increase in the percentage of breaches in the restaurant industry, from a reported 29% in 2009 to 73% in 2011. Additionally, the 2013 Verizon Data Breach Incident Report indicated that retail environments and restaurants represented 24% of the 621 breaches included in that report. Restaurants are vulnerable for multiple reasons: employees have the ability to use skimmers to collect the personal information of customers; a high level of risk for POS intrusions (Point of Sale), which makes them a target for cyber criminals; and, large volumes of transaction records, which cyber criminals view as valuable. The fallout from a breach at your small business can be widespread and devastating. The trust factor of restaurant patrons can be negatively impacted when a restaurant is breached. In late 2013, when a large restaurant chain was breached in Boston, local restaurant goers spoke with news stations stating they would be switching to cash in order to protect themselves. However, this is not as convenient as being able to use credit cards and patrons may choose to go to a different restaurant if your business has had a reported breach.

The cost factor involved in a data breach incident can also prove to be very expensive. Associated expenses can include the cost of notifying individuals who have had their information breached or potentially compromised, credit monitoring for those affected, investigation efforts to determine the cause, and implementation of information security measures to minimize future risk. In addition, restaurants may have to engage in public relations to mitigate the backlash from a breach. Finally, there may be fines or civil actions for lack of safeguards, which could have prevented the breach.

However, the picture is not completely bleak for restaurant owners. There are a few ways these small businesses can be proactive against a breach. First, they can begin accepting ‘Chip and Pin’ cards. Chip and Pin cards have proven to be much more fraud resistant than either chip and signature cards, or those which hold the user’s information on the magnetic strip. While this technology is widely used in Europe, it has not become commonplace in the U.S. Restaurants should also make sure they are PCI-DSS compliant. Vendors can receive help from the PCI Security Standards Council to ensure they are compliant.

Second, restaurant owners should work with their payment system provider to make sure they are following best practices for security, and that any third-party service provider has sufficient data security protocols and security measurements in place. Small actions such as changing default credentials on payment system software or stronger password management can have a big effect on minimizing an organization’s risk of being breached.

And lastly, restaurant owners should train all employees on how to protect customers’ data and inform them as to why this is important. If a restaurant values its customers, it should also value their personal information and keep it safe. So, if there is a breach, how should a small business react to protect its customers and itself? All restaurants should have a written data breach incident response plan. This plan, with established protocols, will help establishments be prepared to effectively address the situation whenever it occurs. A breached restaurant should be honest with the public and communicate quickly and truthfully with those who may have been affected. They should also work actively with law enforcement to investigate the incident and obtain as much information about the breach as possible. This way, small restaurant owners can inform their customers and know how to stay protected in the future. They should also provide credit monitoring to their affected patrons and work with the ITRC to assist their customers who may need help or have questions.

Your Small Business is Big Business for Cybercriminals

By | June 3rd, 2014|Uncategorized|

public wifiThis post is part of our cyberSAFE series focusing on SMB financial and reputational risks. You can learn more about the financial and reputational risks SMBs face during every phase of business growth by registering for our upcoming webinar on June 10th at 12 PM CT.

This cyberSAFE guest blog post comes to you from Kent Lawson, founder and CEO of Private Communications Corporation and creator of its flagship software PRIVATE WiFi. In 2010, after 12 years of retirement, Kent became interested in Internet privacy and security issues and the vulnerability of wireless communications in WiFi hotspots. He created Private Communications Corporation to protect consumers and corporations from privacy and security breaches on the Internet. PRIVATE WiFi, the company’s first product, protects individuals and business people while using laptops and other mobile devices at public WiFi hotspots.

Do you think your business is too small to have data that’s valuable to hackers? If that’s the case, you may be unknowingly exposing it to cyber threats that could spell disaster for your business. A whopping 42 percent of SMBs said they experienced a cyber attack within the past year, according to the 2013 Risk of an Uncertain Security Strategy study by the Ponemon Institute. Yet, despite that hair-raising statistic, 58 percent of the SMBs surveyed said senior management doesn’t consider cyber attacks a significant risk to their organizations. How’s that for denial?

It’s not surprising that cyber security complacency continues to make SMBs prime targets for cybercrime. Small and midsize businesses are lagging behind in their cyber security efforts, according to Symantec’s Internet Security Threat Report 2014. As a result, SMBs experienced the highest number of targeted attacks overall last year, nearly double the number from 2012. Even worse, those attacks lasted longer than ever.

Granted, it’s hardly a level playing field when it comes to SMBs and cyber security. Smaller businesses may not have a full-time IT staff like larger companies. They might not have a company network or maintain a corporate VPN. To control costs and improve productivity, SMBs may allow employees to use their personal mobile devices for work. But without a strong BYOD policy, the blurred line between personal and professional time opens the door to compromising company data.

SMBs and Mobile Devices: Who’s Minding the Store at WiFi Hotspots?

Nowhere is that security vulnerability more obvious than when employees connect to public WiFi hotspots. Since most WiFi hotspots aren’t encrypted, the data traveling them can literally be grabbed out of thin air. As a result, data theft is rampant. But that threat hasn’t stopped workers from routinely logging into hotspots. A 2013 survey by GFI Software revealed that over 95% of workers admitted using public WiFi connections at least once a week during their commutes to carry out work-related tasks, such as sending and receiving email, reviewing and editing documents and accessing company servers. More than one-third (34.2 percent) reported that they accessed public WiFi at least 20 times per week.

Think of it this way: Every time an employee accesses company information on a WiFi hotspot, the likelihood that your business will be the victim of a cyber attack goes up. For many SMBs, that risk isn’t hypothetical. More than 40 percent of small businesses report that they have been victims of a cyber attack that cost them thousands of dollars, according to a 2013 survey conducted by the National Small Business Association. Have you considered how much a cyber attack could cost your business? For many, the cost was too high: 72 percent of small businesses that suffered a major data loss shut down within 24 months. Make sure it doesn’t happen to you.

These are the simple steps you can take to protect every mobile device that touches your business.

How SMBs Can Secure the Mobile Workplace

  • Make sure to install firewall and anti-malware apps on all mobile devices used for your business, and promptly install app and OS updates.
  • Use strong passwords of upper and lower case letters, numbers and symbols and different passwords for each site. And uncheck the box that automatically saves them.
  • Check before connecting to hotspots with strange names. Watch out for unusual variations in the logo or name of the establishment that appears on the login-page. That could mean it’s a fake hotspot designed to steal your data.
  • Disable features that automatically connect your device to any available network. This will prevent you and your employees from accidentally connecting to a fake WiFi hotspot or a stranger’s computer.
  • Disable printer and file sharing options before connecting to a hotspot.
  • Limit your employees’ access to company data to include only what they must have to do their jobs. Also, make sure all the mobile devices used to conduct business – laptops, smartphones, and tablets – are protected by a VPN. VPNs like PRIVATE WiFi encrypt the data traveling to and from your mobile devices, which makes it invisible to hackers.

Employee Social Media Use Can Affect Small Business Reputation

By | June 2nd, 2014|Uncategorized|

Social guest postThis post is part of our cyberSAFE series focusing on SMB financial and reputational risks. You can learn more about the financial and reputational risks SMBs face during every phase of business growth by registering for our upcoming webinar on June 10th at 12 PM CT.

This cyberSAFE guest blog post comes to you from Jasmine McNealy, Assistant Professor at the University of Kentucky and privacy and law blogger at Unmasking Doe.

Social media has proven an indispensable tool for businesses of all sizes. It’s used by organizations to manage customers, respond to complaints, and to build social capital. And social media can certainly can build or ruin a reputation. This is, no doubt, one of the reasons that over 15 million businesses, companies and organizations have pages on Facebook.

But it is not solely corporate use of social media tools and sites that should be of concern when building a business reputation. Employee social media habits – including inappropriate posts and insecure password practices – can affect an organization both positively or negatively. Many social media users display affiliation information in their online bios, and tools like LinkedIn make it easy for anyone to find out the name of a user’s workplace. Usually, this affiliation information or the ability to find an individual’s employer is benign, and the employee’s use of social media has no effect on company reputation. Yet, when that employee is involved in or says something untoward on social media, or a hacker gets hold of an employee’s credentials, there can be consequences for their employer as well.

One need only consider the recent Justine Sacco tweet scandal for an illustration of this. In December 2013, Sacco, then a corporate communications professional at leading Internet company IAC, tweeted, “Going to Africa. Hope I don’t get AIDS. Just kidding. I’m white!” before embarking on a many hours long plane trip to South Africa. Twitter reaction was swift and brutal, with the hashtags #JustineSacco and #HasJustineLandedYet trending for hours while watchers waited for her plane to land. Although Twitter’s reaction to her, individually, was considerable, the response of her employer was also significant. The company fired Sacco, but not before being contacted via Twitter, phone, email and other social media inquiring about its reaction to its employee making such statements.

It would be nice to say that incidents like that of Sacco are few and far between. Yet the continuing growth in social media outlets and use make all organizations vulnerable to having to go into crisis communication mode as a result of an employee’s comments. Here are a few tips that may help to mitigate this concern:

  • If you encourage employee social media use, consider requiring that employees make separate personal and professional accounts.
  • Require that social media passwords must be different from work logins. Employees should not reuse their work emails and passwords for personal sites. This serves as a barrier of protection for work accounts, in case an employee’s social media account is hacked into.
  • Make sure that the corporate social media accounts are the most popular. In this way customers and other consumers may recognize the organization’s statements as reflective of corporate conscious.
  • Never attempt to censor employees. Instead, offer social media training that increases their information literacy, and allows them to understand that actions (or speech) have consequences. Let them know what is appropriate to post on social media and what is sensitive company information.

May Recap: Keeping Up the Hard Work

By | June 1st, 2014|Uncategorized|

This month we focused big-time on preparing for our upcoming cyberSAFE webinar series and survey. Among the planning and research, we found plenty of time to take part in a few themed industry weeks, and we even found some time to relax! This is what we were up to last month:

Privacy Awareness Week
We were so excited to join in conversations and efforts around Privacy Awareness Day this month, an initiative of the Asia Pacific Privacy Authorities (APPA) to promote online privacy. In honor of the day, we published a blog post featuring some of our favorite privacy resources, tips and more. Did you do anything to participate?

National Small Business Week
We kicked off Small Business Week this May by announcing our upcoming cyberSAFE webinar – all about small business security during different stages of company growth. Throughout the week we shared security tips for small businesses, took part in Twitter chats, and gathered ideas for our webinar discussions. We were happy to honor all the small businesses out there that are doing a great job with their security and privacy efforts!

VolleyballVolleyball Tournament at CSID HQ
Our Austin office knows how to have fun! We took a break one sunny Wednesday this month for a volleyball tournament. Who doesn’t love a little exercise and Vitamin D? Scroll through all of the photos on our Facebook page.

Joe Ross in the Huffington Post
Joe Ross shared a fascinating new article in his Huffington Post column about “The Dark Web and the Power of Anonymity.” Catch up on his Huffington Post column for more industry related articles.

What’s Coming Up in June
We’re looking forward to hosting another edition of our cyberSAFE webinar series on June 10th – this one is on small business security. Register today to attend. We’ll be releasing an infographic, whitepaper and more on the topic after the webinar airs. We’ll also be hosting our next #cyberSAFEchat Twitter chat on the same topic, this June 9th at 1 PM CT. Join us by following and tweeting using the #cyberSAFEchat hashtag during the chat. For more information, including Twitter chat questions, visit the CSID blog. Hope to see you there!

Let us know what you’re most looking forward to this month on Facebook, Twitter or LinkedIn and be sure to keep up with our Tumblr for up-to-date security news stories.

Load More Posts