This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Find out more here

Hide
Jump to navigation

Cybersecurity Tips

Effective cybersecurity depends on co-ordinated, integrated preparations for rebuffing, responding to and recovering from, a range of possible cyber attacks.

In an Internet environment where a substantial number of initial attacks are automated, and any assault on critical national infrastructure ('CNI') is likely to be widespread, all organisations need to take steps to prepare themselves.

In the US, every October is been National Cybersecurity Awareness Month, a national campaign to encourage individuals to protect their computers at home, school and at work.

Organised by the National Cyber Security Alliance (NCSA), this information is available on the StaySafeOnline.org website (www.staysafeonline.org)

 

To endorse and demonstrate our support for National Cyber Security Awareness Month (NCSAM), IT Governance provide relevant information security tips every day ...

Effective Cybersecurity Tips:

Today's Tip: "Backup your personal information to the web. Not only is does it protect your information; it provides piece of mind should your hard drive or flash drive be lost or stolen. Consider using web backup utilities to provide offsite backup." - Kevin T. McDonald, Author Above the Clouds, Managing Risk in the World of Cloud Computing.

Check back daily for new tips. Get automatic updates throughout October by following us on Twitter and subscribe to our newsletter!

Tip
Too many passwords? - Read this article about password vaults; datavault for i-kit.
The world’s most popular passwords - www.nytimes.com/2010/01/21/technology/21password.html, and also www.dragonresearchgroup.org/insight/sshpwauth-cloud.html - and more guidance from IT Governance on what a good password should be.
Be aware what you share. - Many social media attacks and email spam campaigns are successful because they create the illusion that the target knows and should trust the attacker.
Social Media governance – Dealing effectively with social media requires a joined-up approach that is aligned with the objectives and risk appetite of the business - a governance approach.
Managing Information Security – the role of ISO27001 - Downloadable our Introductory Briefing!
Cyber defences – the role of penetration testing - Download our FAQs/White Paper for more information on Security (Penetration) Testing and ISO27001.
Data Protection Awareness – protect personal information and meet compliance obligations – Data Protection Awareness posters.
PCI Awareness – dealing with payment card risk - e-learning by ITG
Mobile media, laptops, USB sticks and risk - Free Technical Briefing Paper.
Using posters to raise awareness.
The role of training in combating cybercrime.
The Insider Threat – understand the threat from insiders.
Cyber crime – how can individuals protect themselves?
Keep Safe Online - Home owners' and small business online security awareness.
Cyber crime and compliance? New EU Cybercrime Directive.
How serious is the cyber crime threat?
The world wide crime web
Computer Crime & Intellectual Property Section - United States Department of Justice.
What’s the current state of threatened cyberwar?
Stuxnet worm hits Iran nuclear plant staff computers
Over half of global hacking attacks from China.
It’s CyberSecurity month – find out what it’s really all about – read our authoritative text on this subject:
Cyber Risks for Business Professionals: A Management Guide
CyberWar, CyberTerror, CyberCrime.

Check back daily for new tips. Get automatic updates by following us on Twitter and subscribe to our newsletter!

BUY Cyber-Security BOOKS

CyberWar, CyberTerror, CyberCrime

Buy now

+44 (0) 845 070 1750
live chat support software