Don't Leave Your Email Naked


 Don't Leave Your Email Naked

This may seem like an obvious one, but too many people end up leaving their emails unprotected. Whether you're uploading your resume and forgetting to put your email on it or forgetting your password, a lot of information can be at risk without proper protection. You should always (and I mean always) be vigilant with protecting yourself and secure your inbox by using something like the free email service ProtonMail where there is no need for remembering passwords or being captured by phishing scams that often target high-profile individuals.

Article: Why the World Needs a New Threat Model
The traditional threat model has been conditioned over time to consider industrial organizations as targets of adversaries, and its focus on traditional security issues such as getting a patch in time or anticipating a cyber-attack is no longer sufficient for understanding and addressing the scale of today's threats. There are hundreds of new threats emerging all the time and it is critical that we start adjusting our models to reflect this reality. It is not just about securing software and systems, but also about figuring out how to take advantage of these emerging trends and break out from our current security limitations.

Article: Sami Yli-Olliomaa, Chief Research Officer, F-Secure: "The ‘Fix’ for Cybersecurity"
The security industry is broken. The traditional model of firewalls and anti-virus software failed to keep us safe and we are living in a world where cyber criminals can make millions with just one hack. The industry has been busy building products that don’t work, selling them as the solution to all problems and then fixing them with even more products. How did we get here? Why are we stuck now? And how do we fix it? Join us to learn there is a better way forward.

Article: Why Every Software Project Requires Agile Testing
If you make a mistake or your code changes, the cost of getting it right can be huge. Agile software development approaches have been successful in reducing this risk and offering a means to continuously improve software products. But most security testing methods are still based on building test case sets and running them against a big body of code (code coverage tools). This approach was developed over the course of years when random testing was done as an afterthought – and it’s not fit for purpose to help rapidly develop new software with high quality.

Article: How to Protect the Internet of Things
The Internet of Things (IoT) represents a significant increase in the number of intelligent, connected devices entering our lives and it is estimated that by 2020 there will be 33 billion connected devices. This growth is raising concerns among security experts about the threats that these ‘things’ pose because many have very limited protection from attackers. Join us to learn how we can protect IoT devices from attacks that are being used today.

Article: When Cybersecurity Goes Nuclear: Be Prepared for Cyber-Attack Meltdowns
Today, cybersecurity isn’t just about preventing data breaches, it’s increasingly about helping companies understand what has happened when they’ve been breached.

As we've seen, security has become a huge issue in today's world. The world is constantly changing and advancing, and as it does so various new threats arise. The key to dealing with these threats will be to develop better techniques of dealing with and identifying them. Whether they're technological, or simply humanistic, new developments are needed to speed up the process of handling instances of hacking and data breaches. All these articles lay out ways that this could happen, whether it's through improving the security infrastructure itself (with better tools), or by incorporating new methods into the way we handle security. Hopefully these points have provided some food for thought and an insight into how you can improve your own cybersecurity leading into 2017.

Post a Comment