Security Corner:

Security best practices


August 26, 2014  6:45 PM

Don’t blame the victim

Ken Harthun Ken Harthun Profile: Ken Harthun
Cybercrime prevention, Security, Security awareness, Security best practices

Bruce Schneier said, "Blaming the victim is common in IT: users are to blame because they don't patch their systems, choose lousy passwords, fall for phishing attacks, and so on." So true, and something that I have come to (reluctantly) refrain from doing. Face it, people do things they...

June 30, 2014  2:37 AM

Highly effective security: Lock your screen

Ken Harthun Ken Harthun Profile: Ken Harthun
Screen savers, Security best practices

Do you know who's playing around on your computer when you're not there? Think it won't (or doesn't) happen? Think again: It can and does happen all the time. I'm sure you trust the people you work with, and rightfully so, but what about the maintenance crew and the janitorial service personnel?...

May 19, 2014  7:52 PM

Introducing 10 highly effective security habits

Ken Harthun Ken Harthun Profile: Ken Harthun
Disk Encryption, Mobile device security, Security best practices, Security policy, Social media security, Wifi security

We all have our preferred security habits (at least, I hope so!) Some of them are for our own comfort and some of them are actually highly effective. In my next few posts, I am going to discuss the ones I consider are most effective. I plan to outline the pros and cons of full drive encryption,...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: