Safer Internet Day – social media best practices for young people

Safer Internet Day – social media best practices for young people

On February 9, 2021, the world will celebrate the 18th iteration of Safer Internet Day. It’s an opportunity for everyone to recognize the importance of staying safe online. It’s also a reminder that all of us play a part in making the web a safer place. One of the ways we can observe Safer Internet Day is by helping children and teens navigate social media. Young people might assume that these platforms exist in a…

Read More

Top 5 reasons not to use fear to encourage security compliance

Top 5 reasons not to use fear to encourage security compliance

Security is important in any organization, but getting employees to follow protocol can be a challenge. Tom Merritt offers five reasons why using fear-based motivation techniques is not ideal. Oh, these people who are using insecure passwords, clicking open phishing emails and installing malicious apps–why don’t they understand? We’ll show them, right? If you don’t follow the security protocols, you’re in for it. “Fear will keep the local systems in line.” Wait… Grand Moff Tarkin…

Read More

How to easily check if an email is legit or a scam, and protect yourself and your company

How to easily check if an email is legit or a scam, and protect yourself and your company

Use these practical guidelines to determine if something’s a great deal or too good to be true. Image: Vladimir Obradovic, Getty Images/iStockphoto I spend a few minutes every morning blocking and unsubscribing from lists that send irrelevant messages. Because my email address is public, most of these messages are unsolicited; a few might even be dangerous. Fortunately, the more we take advantage of the internet, the better equipped we are to deal with messages that…

Read More

How to block point-to-point file transfers in Skype for Business using PowerShell

How to block point-to-point file transfers in Skype for Business using PowerShell

There are situations where you want to block P2P file transfers to people outside the organization during a video conference meeting. You’ll need to issue a global policy. Image: iStock/AndreyPopov Users of the online version of Microsoft 365 are well aware that Skype for Business has been incorporated into Microsoft Teams and is, therefore, not a separate standalone application anymore. However, that does not mean that Microsoft 365 administrators cannot control certain aspects of Skype…

Read More

CFP for DockerCon LIVE 2021 Now Open! – Docker Blog

CFP for DockerCon LIVE 2021 Now Open! – Docker Blog

Ahoy! You can now submit your talk proposal for DockerCon LIVE 2021! Taking place May 27, 2021, DockerCon brings together the entire community of Docker developers, contributors and partners to share, teach, and collaborate to grow the understanding and capabilities of modern application developers. The Docker community is growing fast and is incredibly diverse, and our aim is to have a conference that reflects this growth and diversity. To that end, we’re announcing the CFP…

Read More

Paralegal’s Pal Admits Outing Witnesses

Paralegal’s Pal Admits Outing Witnesses

A woman from Iowa has admitted obtaining confidential information about a drug-trafficking operation from her paralegal friend and then releasing it on social media. Rachel Manna, of West Des Moines, pleaded guilty on February 4 to using a former Department of Justice contractor’s government computer to access government records and to obtain sensitive, non-public law enforcement information. In the spring of 2018, 33-year-old Manna asked her friend Danielle Taff to access details about certain defendants in a…

Read More

DevOps Technology: Everything as Code – VMware Cloud Community

DevOps Technology: Everything as Code – VMware Cloud Community

Application developers have long known the benefits of maintaining application code and configuration variables in a standardized text format – allowing efficient code sharing, versioning, and reuse. Modern infrastructure tooling has evolved to similarly drive the management and configuration of infrastructure components “as code”. But what does this mean, and why is it an essential capability of The Cloud Operating Model? Back in the day In my first IT role, to install a server, switch,…

Read More

Law Firm Data Breach Impacts UPMC Patients

Law Firm Data Breach Impacts UPMC Patients

A cyber-attack on a Pennsylvania law firm has potentially exposed the personal health information (PHI) of more than 36,000 patients of University of Pittsburgh Medical Center (UPMC). Law firm Charles J. Hilton & Associates P.C. (CJH), which provides legal services to UPMC, discovered suspicious activity in its employee email system in June 2020. An investigation determined that hackers had gained access to several employee email accounts between April 1, 2020, and June 25, 2020. In…

Read More

Cognitive agility can help solve some

Cognitive agility can help solve some

Using psychology can help improve the odds of success against a cybercriminal’s digital incursion. Image: iStockphoto/nicescene Emergency responders practice continually so that their response during a crisis is inherent and automatic. This approach is also used by many cybersecurity teams, and with good reason: In an emergency, time to think, gather information, and consider all options is limited. Practice builds in an element of unconscious response, along with the ability to be guided by intuition….

Read More
1 2,411 2,412 2,413 2,414 2,415 2,550